2020
DOI: 10.5121/ijnsa.2020.12201
|View full text |Cite
|
Sign up to set email alerts
|

Security Consideration in Peer-to-peer Networks with A Case Study Application

Abstract: Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 13 publications
(17 reference statements)
0
1
0
Order By: Relevance
“…LDEPTH is an interest based, scalable, hierarchal peer-to-peer system that provides efficient data lookup operations and fault tolerance. Most of the structured P2P systems use Distributed Hash Table (DHT) to provide efficient data insertion and lookup services, but LDEPTH employs linear Diophantine equation (LDE) to realize the hierarchal P2P architecture [8]. LDE provides a lightweight mechanism to create and maintain peer-to-peer architecture as compared to DHT.…”
Section: Introductionmentioning
confidence: 99%
“…LDEPTH is an interest based, scalable, hierarchal peer-to-peer system that provides efficient data lookup operations and fault tolerance. Most of the structured P2P systems use Distributed Hash Table (DHT) to provide efficient data insertion and lookup services, but LDEPTH employs linear Diophantine equation (LDE) to realize the hierarchal P2P architecture [8]. LDE provides a lightweight mechanism to create and maintain peer-to-peer architecture as compared to DHT.…”
Section: Introductionmentioning
confidence: 99%