浏览全部资源
扫码关注微信
1. 嘉兴学院数理与信息工程学院,浙江 嘉兴 314001
2. 嘉兴学院建筑工程学院,浙江 嘉兴 314001
3. 上海师范大学信息与机电工程学院,上海 200234
4. 绍兴文理学院计算机科学与工程系,浙江 绍兴 312000
[ "李攀攀(1983-),男,博士,嘉兴学院数理与信息工程学院讲师,主要研究方向为社交网络、网络安全、云计算等。" ]
[ "谢正霞(1982-),女,嘉兴学院建筑工程学院工程师,主要研究方向为社交网络、智能算法、云计算等。" ]
[ "乐光学(1963-),男,博士,嘉兴学院数理与信息工程学院教授,主要研究方向为多云融合与协同服务、无线mesh网络与移动云计算、混成与嵌入式系统等。" ]
[ "马柏林(1961-),男,博士,嘉兴学院数理与信息工程学院教授,主要研究方向为调和分析与小波分析、信号分析等。" ]
[ "陈丽(1975-),女,博士,嘉兴学院数理与信息工程学院讲师,主要研究方向为移动通信、移动感知网络及机器学习等。" ]
[ "刘建华(1978-),男,博士,上海师范大学信息与机电工程学院副教授,绍兴文理学院计算机科学与工程系副教授,主要研究方向为无线传感器网络、云计算、网络与信息安全等。" ]
网络出版日期:2018-11,
纸质出版日期:2018-11-20
移动端阅览
李攀攀, 谢正霞, 乐光学, 等. SSDHT:基于社交网络的DHT安全增强机制[J]. 电信科学, 2018,34(11):10-20.
Panpan LI, Zhengxia XIE, Guangxue YUE, et al. SSDHT:social network-based secure DHT mechanism[J]. Telecommunications science, 2018, 34(11): 10-20.
李攀攀, 谢正霞, 乐光学, 等. SSDHT:基于社交网络的DHT安全增强机制[J]. 电信科学, 2018,34(11):10-20. DOI: 10.11959/j.issn.1000-0801.2018276.
Panpan LI, Zhengxia XIE, Guangxue YUE, et al. SSDHT:social network-based secure DHT mechanism[J]. Telecommunications science, 2018, 34(11): 10-20. DOI: 10.11959/j.issn.1000-0801.2018276.
P2P系统在文件共享等领域中得到了广泛的应用,但DHT(distributed hash table)网络无中心、无认证、缺乏节点身份验证机制,使得现有的基于DHT的P2P系统易受到Sybil攻击等外部攻击。提出一种基于社交网络的DHT安全增强机制,将社交网络中节点的信任关系引入DHT网络中提高对Sybil节点的识别能力。以KAD(Kademlia)算法为例进行了实验验证,基于Facebook和Twitter数据集的实验结果表明本文提出的安全机制适用于大规模动态的网络,能够有效防御Sybil攻击。
P2P systems have been widely used in the field of file sharing
etc.However
DHT (distributed hash table) networks have no center
no authentication
and lack of node authentication mechanism
making existing DHT-based P2P systems vulnerable to external attacks such as Sybil attacks.A DHT security enhancement mechanism based on social network was proposed
which introduced the trust relationship of nodes in the social network into the DHT network to improve the recognition ability of Sybil nodes.The KAD (Kademlia) algorithm was used as an example to verify the experiment.Experimental results based on Facebook and Twitter datasets show that the proposed security mechanism is suitable for large-scale dynamic networks and can effectively defend against Sybil attacks.
中国互联网络信息中心 . 第41次《中国互联网络发展状况统计报告》 [R ] . 2018 .
CNNIC . The 41st “Statistical report on the development of China’s internet” [R ] . 2018 .
史建焘 , 张宏莉 . KAD网络负载均衡技术研究 [J ] . 电信科学 , 2012 , 28 ( 6 ): 68 - 72 .
SHI J T , ZHANG H L . Study on load balancing of KAD network [J ] . Telecommunications Science , 2012 , 28 ( 6 ): 68 - 72 .
CHAN C , CHAN S . Distributed hash tables:design and applications [M ] // Handbook of Peer-to-Peer Networking . Berlin:Springer Science , 2010 : 257 - 280 .
DOUCEUR J R . The Sybil attack [J ] . Lecture Notes in Computer Science , 2002 , 65 ( 1 ): 251 - 260 .
肖禄 , 黄韬 , 刘江 , 等 . 一种基于物理拓扑的 DHT 物联网解析机制 [J ] . 电信科学 , 2012 , 28 ( 6 ): 25 - 32 .
XIAO L , HUANG T , LIU J , et al . A novel resolution service for internet of things based on physically topological DHT [J ] . Telecommunications Science , 2012 , 28 ( 6 ): 25 - 32 .
JAN M A , NANDA P , HE X , et al . A Sybil attack detection scheme for a forest wildfire monitoring application [J ] . Future Generation Computer Systems , 2018 ( 80 ): 613 - 626 .
WANG C , ZHU L , GONG L , et al . Accurate sybil attack detection based on fine-grained physical channel information [J ] . Sensors , 2018 , 18 ( 3 ):878.
BOTT J , MILKAU U . Towards a framework for the evaluation and design of distributed ledger technologies in banking and payments [J ] . Journal of Payments Strategy & Systems , 2016 , 10 ( 2 ): 153 - 171 .
WANG G , MUSAU F , GUO S , et al . Neighbor similarity trustagainst sybil attack in P2P E-commerce [J ] . IEEE Transactions on Parallel and Distributed Systems , 2015 , 26 ( 3 ): 824 - 833 .
ZHENG Y , LIN F , YANG Y , et al . Adaptive resource scheduling mechanism in P2P file sharing system [J ] . Peer-to-Peer Networking and Applications , 2016 , 9 ( 6 ): 1089 - 1100 .
JAN M A , NANDA P , HE X , et al . A Sybil attack detection scheme for a forest wildfire monitoring application [J ] . Future Generation Computer Systems , 2018 ( 80 ): 613 - 626 .
RAJA K N , BENO M M . Secure data aggregation in wireless sensor network-Fujisaki Okamoto (FO) authentication scheme against sybil attack [J ] . Journal of medical systems , 2017 , 41 ( 7 ):107.
FREEDMAN M J , MORRIS R . Tarzan:a peer-to-peer anonymizing network layer [C ] // The 9th ACM Conference on Computer and Communications Security,November 17-21,2002,Washington,DC,USA . New York:ACM Press , 2002 : 193 - 206 .
RAJA K N , BENO M M . Secure data aggregation in wireless sensor network-Fujisaki Okamoto (FO) authentication scheme against sybil attack [J ] . Journal of Medical Systems , 2017 , 41 ( 7 ):107.
MARTI S , GANESAN P , GARCIA-MOLINA H . DHT routing using social links [M ] . Berlin : Springer Berlin HeidelbergPress , 2005 : 100 - 111 .
DANEZIS G , LESNIEWSKI-LAAS C , KAASHOEK M , et al . Sybil-resistant DHT routing [C ] // The 10th European Symposium on Research in Computer Security,September 12-14,2005,Milan,Italy . Berlin:Springer , 2005 : 305 - 318 .
YU H , KAMINSKY M , GIBBONS P B , et al . Sybilguard:defending against sybil attacks via social networks [J ] . IEEE/ACM Transactions on Networking , 2008 , 16 ( 3 ): 576 - 589 .
YU H , GIBBONS P B , KAMINSKY M , et al . Sybillimit:a near-optimal social network defense against Sybil attacks [J ] . IEEE/ACM Transactions on Networking , 2010 , 18 ( 3 ): 885 - 898 .
BOYD S , GHOSH A , PRABHAKAR B , et al . Gossip algorithms:design analysis and applications [C ] // IEEE INFOCOM 2005,March 13-17,2005,Miami,FL,USA . Piscataway:IEEE Press , 2005 .
FLAXMAN A D . Expansion and lack thereof in randomly perturbed graphs [J ] . Internet Mathematics , 2007 , 4 ( 2-3 ): 131 - 147 .
TRAN N , MIN B , LI J , et al . Sybil-resilient online content voting [C ] // The 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI’09),April 22-24,2009,Boston,Massachusetts,USA . New York:ACM Press , 2009 : 15 - 28 .
LESNIEWSKI-LAAS C , . A Sybil-proof one-hop DHT [C ] // The First Workshop on Social Network Systems (SocialNets’08),April 1,2008,Glasgow,Scotland,UK . New York:ACM Press , 2008 : 19 - 24 .
LESNIEWSKI-LASS C , KAASHOEK M F . Whanau:aSybil-proof distributed hash table [C ] // 7th USENIX Symposium on Network Design and Implementation,April 28-30,2010,San Jose,California,USA . New York:ACM Press , 2010 : 3 - 17 .
MITTAL P , CAESAR M . X-Vine:secure and pseudonymous routing using social networks [J ] . Corr , 2012 .
LIU B , WEI T , ZHANG C , et al . Improving lookup reliability in KAD [J ] . Peer-to-Peer Networking and Applications , 2015 , 8 ( 1 ): 156 - 170 .
REZVANIAN A , MEYBODI M R . Sampling algorithms for weighted networks [J ] . Social Network Analysis and Mining , 2016 , 6 ( 1 ):60.
KWAK H , LEE C , PARK H , et al . What is Twitter,a social network or a news media? [C ] // The 19th International Conference on World Wide Web,April 26-30,2010,Raleigh,NC,USA . New York:ACM Press , 2010 : 591 - 600 .
0
浏览量
801
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构