2015
DOI: 10.1002/dac.3036
|View full text |Cite
|
Sign up to set email alerts
|

Structural‐based tunneling: preserving mutual anonymity for circular P2P networks

Abstract: Summary Many methods are suggested to preserve anonymity of users for peer‐to‐peer (P2P) networks. Most of these methods, by relying on established anonymous solutions on client/server applications, are presented for unstructured P2P networks. However, structured overlays, by using distributed hash tables for their routing, do not resemble traditional paradigms. Therefore, current anonymous methods cannot be implemented for them easily. In this paper, we introduce structural‐based tunneling (SBT) to provide mu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 36 publications
0
7
0
Order By: Relevance
“…Nodes with ill intent can cause harm through mishandling functions of the system. In many instances, this causes total network collapse [23].…”
Section: Attacks On Underlay Networkmentioning
confidence: 99%
“…Nodes with ill intent can cause harm through mishandling functions of the system. In many instances, this causes total network collapse [23].…”
Section: Attacks On Underlay Networkmentioning
confidence: 99%
“…Random walk [36] and Flooding are the most commonly used searching techniques in unstructured networks [3,15,12]. Unstructured networks are less scalable, produce high network overhead and have lower search precision (due to queries being directed to irrelevant peers) compared to their structured counterparts [17,35,28,29]. Search precision also depends upon the number of hops a query travels.…”
Section: Related Workmentioning
confidence: 99%
“…Keeping intact the network partitioning conditions, their approach provided a stable topology formation between the UAVs. Naghizadeh et al provided an approach for mutual anonymity using structure‐based tunneling. In their approach, selection of an appropriate‐sized tunnel provides less overheads, efficient management of route cost, and enhanced maintenance.…”
Section: Related Workmentioning
confidence: 99%