Enhancing Rumor Riding protocol in P2P network with Cryptographic puzzle through challenge question method. (January 2018)
- Record Type:
- Journal Article
- Title:
- Enhancing Rumor Riding protocol in P2P network with Cryptographic puzzle through challenge question method. (January 2018)
- Main Title:
- Enhancing Rumor Riding protocol in P2P network with Cryptographic puzzle through challenge question method
- Authors:
- Christo, Mary Subaja
Meenakshi, S. - Abstract:
- Abstract: This research seeks is to investigate the Peer to Peer network topology and its custom behavior. The habitual effect of Peer to Peer network includes considering all the connected nodes as peers and these peers head-on with other peers to effectuate the tasks assigned to each one of them. The entire embrace of this network topology clings on to the heterogeneous sphere. Due to its comprehensive network topology and penchant features, the network is vulnerable to many castigating attacks. Furthermore, the possession attributed to the security traits of the network is comparatively tiny. Thus, this network topology is subjected to copious attacks. Rumor Riding (RR) is an anonymous and non-path based protocol. In this protocol, three nodes (including the Initiator, Intermediate, and Responder) are involved in sharing the information or searching the file. In some cases, the named three nodes may act as attackers leading to initiator attacks, intermediate attacks and responder attacks. The reason behind the argument is that RR protocol is based on an anonymous method that tends to hide the information from source to destination without authentication. Hence, the network performance gradually becomes ineffective. The main intent of this paper is to explore the ways and means to prevent all the stated onslaughts. To achieve this, we have developed an attack prevention protocol. The protocol involves the Reliable Rumor Riding Protocol in P2P Network through theAbstract: This research seeks is to investigate the Peer to Peer network topology and its custom behavior. The habitual effect of Peer to Peer network includes considering all the connected nodes as peers and these peers head-on with other peers to effectuate the tasks assigned to each one of them. The entire embrace of this network topology clings on to the heterogeneous sphere. Due to its comprehensive network topology and penchant features, the network is vulnerable to many castigating attacks. Furthermore, the possession attributed to the security traits of the network is comparatively tiny. Thus, this network topology is subjected to copious attacks. Rumor Riding (RR) is an anonymous and non-path based protocol. In this protocol, three nodes (including the Initiator, Intermediate, and Responder) are involved in sharing the information or searching the file. In some cases, the named three nodes may act as attackers leading to initiator attacks, intermediate attacks and responder attacks. The reason behind the argument is that RR protocol is based on an anonymous method that tends to hide the information from source to destination without authentication. Hence, the network performance gradually becomes ineffective. The main intent of this paper is to explore the ways and means to prevent all the stated onslaughts. To achieve this, we have developed an attack prevention protocol. The protocol involves the Reliable Rumor Riding Protocol in P2P Network through the Cryptographic Puzzle attributed to the Challenge Question Method. Furthermore, we have augmented the performance and measured. Hence, in this quintessential way, the network operation is proved to be secured and authenticated. … (more)
- Is Part Of:
- Computers & electrical engineering. Volume 65(2018)
- Journal:
- Computers & electrical engineering
- Issue:
- Volume 65(2018)
- Issue Display:
- Volume 65, Issue 2018 (2018)
- Year:
- 2018
- Volume:
- 65
- Issue:
- 2018
- Issue Sort Value:
- 2018-0065-2018-0000
- Page Start:
- 122
- Page End:
- 138
- Publication Date:
- 2018-01
- Subjects:
- Peer-to-Peer -- Security -- Challenge question -- Reliable rumor riding protocol -- Cryptographic puzzle -- Malicious node
Computer engineering -- Periodicals
Electrical engineering -- Periodicals
Electrical engineering -- Data processing -- Periodicals
Ordinateurs -- Conception et construction -- Périodiques
Électrotechnique -- Périodiques
Électrotechnique -- Informatique -- Périodiques
Computer engineering
Electrical engineering
Electrical engineering -- Data processing
Periodicals
Electronic journals
621.302854 - Journal URLs:
- http://www.sciencedirect.com/science/journal/00457906/ ↗
http://www.elsevier.com/journals ↗ - DOI:
- 10.1016/j.compeleceng.2017.02.008 ↗
- Languages:
- English
- ISSNs:
- 0045-7906
- Deposit Type:
- Legaldeposit
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library DSC - 3394.680000
British Library DSC - BLDSS-3PM
British Library HMNTS - ELD Digital store - Ingest File:
- 11328.xml