A New CR-Chord Based P2P Protocol in the Presence of Malicious Nodes

Musa Milli


As is known, P2P networks work differently from traditional server-client architecture. Each node can act both a server and a client role. Traditional structural P2P systems are not architectures developed with security in the foreground. Therefore, there are many security vulnerabilities, and when malicious nodes are present in the system, P2P can adversely affect the functioning of the system. With the proposed method, secure nodes are kept in a specific table, taking into account the security gaps in structured peer-to-peer (P2P) networks, and subsequent queries are made over these secure nodes. In addition to the CR-Chord algorithm, half cycles were used to find more reliable cycles in dense malicious environments and increase lookup performance. This enabled P2P network to operate more robust. The lookup performance of the developed method was compared with Cyclic-Routing Chord algorithm in OverSim simulation environment. According to the obtained results, the developed Half Cyclic Routing Chord (HCR-Chord) algorithm was observed to give better results.

Keywords: P2P Networks, Chord, Malicious Node, HCR-Chord

DOI: 10.7176/JSTR/5-12-31

Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

ISSN (online) 2422-8702