1st International ICST Conference on Communications and Networking in China

Research Article

Secure Routing in Structured Peer to Peer File-Sharing Networks

  • @INPROCEEDINGS{10.1109/CHINACOM.2006.344855,
        author={Samaneh  Navabpour and Negin F. Nejad Asl and Maghsoud  Abbaspour and Akbar  Behzadi},
        title={Secure Routing in Structured Peer to Peer File-Sharing Networks},
        proceedings={1st International ICST Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2007},
        month={4},
        keywords={File Sharing Peer-to-Peer Routing Security},
        doi={10.1109/CHINACOM.2006.344855}
    }
    
  • Samaneh Navabpour
    Negin F. Nejad Asl
    Maghsoud Abbaspour
    Akbar Behzadi
    Year: 2007
    Secure Routing in Structured Peer to Peer File-Sharing Networks
    CHINACOM
    IEEE
    DOI: 10.1109/CHINACOM.2006.344855
Samaneh Navabpour1,*, Negin F. Nejad Asl1,*, Maghsoud Abbaspour1,*, Akbar Behzadi2,*
  • 1: Electrical and Computer Department, Shahid Beheshti University and the Network Department of Institute for Studies in Theoretical Physics and Mathematics, P.O. Box 19395-1795, Tehran, Iran
  • 2: Network Department of Institute for Studies in Theoretical Physics and Mathematics, P.O. Box 19395-1795, Tehran, Iran
*Contact email: navabpour_s@iranet.ir, fathollahnejad-n@iranet.ir, maghsoud@ipm.ir, akbar@iranet.ir

Abstract

Structured P2P protocols have recently become the ultimate solution in creating large-scale distributed networks, because they provide a powerful platform for providing various decentralized services. Structured P2P protocols have created file sharing networks with high fault tolerance, but still lack security in routing. Messages can still be corrupted, incorrectly routed, and can be responded by illegitimate nodes. Because of their decentralized characteristics insecure routing can destroy the networks' integrity. This paper studies attacks aimed at correct routing in structured P2P file sharing networks and presents techniques for defenses against them. This paper will fully describe and prove the validation of these techniques and evaluate them in the end.