The nodes can freely join or leave the P2P network, which will lead to much false routing information that can cripple the performance of P2P network. Many hackers also utilize the weaken point to attack the P2P network. We propose a safety routing algorithm for P2P network to resist the routing attack. The algorithm adopts the multiple-encryption detecting technology. The node which launches the communicating connection will periodically detect every node in its routing path by sending some multiple-encryption detecting packets. By the responding message of the detected nodes, the malicious or disable nodes in its routing path will be accurately located and kicked out of the routing table. Simulation experiments demonstrate the algorithm c...
Opportunistic Networks (OppNets) are exposed to a variety of attacks, among them are packet dropping...
It is crucial for large-scale communication networks such as the internet to be resilient against at...
Abstract—To proactively defend against intruders from readily jeopardizing single-path data sessions...
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routi...
Fully distributed systems offer the highest level of freedom for the users. For this reason, in toda...
Peer-to-Peer (P2P) protocols underlie multiple networked applications given that the P2P decentraliz...
Ad-hoc networks are established voluntarily without the use of any framework or centralized manageme...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...
In networks such as the IP-based networks that run the Internet, nodes trust one another to properly...
Abstract: Node churn is a hindrance to construction of P2P-based anonymous networks, which makes ano...
A self-configured network forming an arbitrary topology of mobile routers through wireless connectio...
Securing the confidential data transferred via wireless network remains a challenging problem. It is...
Future IP networks demand increased resilience. We present two new routing algorithms which provide ...
The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempste...
This DTN routing should naturally support unicast and multicast routing strategies. A network node c...
Opportunistic Networks (OppNets) are exposed to a variety of attacks, among them are packet dropping...
It is crucial for large-scale communication networks such as the internet to be resilient against at...
Abstract—To proactively defend against intruders from readily jeopardizing single-path data sessions...
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routi...
Fully distributed systems offer the highest level of freedom for the users. For this reason, in toda...
Peer-to-Peer (P2P) protocols underlie multiple networked applications given that the P2P decentraliz...
Ad-hoc networks are established voluntarily without the use of any framework or centralized manageme...
ABSTRACT Most research related to secure routing in sensor networks has focused on how to detect and...
In networks such as the IP-based networks that run the Internet, nodes trust one another to properly...
Abstract: Node churn is a hindrance to construction of P2P-based anonymous networks, which makes ano...
A self-configured network forming an arbitrary topology of mobile routers through wireless connectio...
Securing the confidential data transferred via wireless network remains a challenging problem. It is...
Future IP networks demand increased resilience. We present two new routing algorithms which provide ...
The routing attacks are created in order to damage the network in Mobile Ad-hoc. Previously, Dempste...
This DTN routing should naturally support unicast and multicast routing strategies. A network node c...
Opportunistic Networks (OppNets) are exposed to a variety of attacks, among them are packet dropping...
It is crucial for large-scale communication networks such as the internet to be resilient against at...
Abstract—To proactively defend against intruders from readily jeopardizing single-path data sessions...