2010 2nd International Workshop on Intelligent Systems and Applications 2010
DOI: 10.1109/iwisa.2010.5473277
|View full text |Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…The IP addresses of both nodes are exposed to each other, which creates another opportunity for abuse. Once the identity of the peer is revealed, further attacks can be carried out [ 96 ].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The IP addresses of both nodes are exposed to each other, which creates another opportunity for abuse. Once the identity of the peer is revealed, further attacks can be carried out [ 96 ].…”
Section: Resultsmentioning
confidence: 99%
“…Structured P2P systems (eg, P2P IHE [ 51 ], our proposed PHS architecture [ Figure 3 ], Chord, and Kademlia [ 35 ]) are vulnerable to poison attacks [ 95 ], although resource discovery is under the control of data structures (eg, DHT). In routing table poisoning , the poison attacker exploits the fact that each peer in a DHT-based P2P system maintains the routing tables of its neighbors [ 47 , 56 , 73 , 77 , 95 , 96 ]. Each entry in the table includes the neighbor’s identifier, IP address, and port number.…”
Section: Resultsmentioning
confidence: 99%