High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

A-Gossip: Secure Routing in unstructured Peer to Peer Network


Anubhava Srivastava , United College of Engineering and Research; Dharmendra Kumar, United College of Engineering and Research; Anurag Kumar Pandey; Himanshu Srivastava; Anuja Maheshwari


Peer-to-Peer networks, distributed hash table, Un-structured P2P network; Gossip-based Protocols; Hub Attack; Paralyse


Over the Internet today, computing and communi-cations environments are signicantly more complex and chaotic than classical distributed systems, lacking any centralized organization or hierarchical control. There has been much in-terest in emerging Peer-to-Peer (P2P) network overlays because they provide a good substrate for creating large-scale data sharing, content distribution and application-level multicast applications. These P2P networks try to provide a long list of features such as: selection of nearby peers, redundant storage, efficient search/location of data items, data permanence or guarantees, hierarchical naming, trust and authentication, and anonymity. P2P networks potentially offer an efficient routing architecture that is self-organizing, massively scalable, and robust in the wide-area, combining fault tolerance, load balancing and explicit notion of locality. P2P network have mainly two types, they are structured and unstructured. The structured P2P overlays have defined topology, such as ring topology in Chord [2]. These protocols are maintained by distributed hash table (DHT). On the other hand, unstructured overlays are changing their overlay and have no structure. Random peer sample (RPS) mechanism is efficient to maintain these overlays. The RPS mechanism focuses on exchanging a random set of neighbours for updating the overlay connections, such as in Cyclon [22] or updating while searching a file, such as in FreeNet[3]. Such types of overlays are badly affected by few attacker nodes, which are described in TooLate [18], SPSS [17], etc. We proposed a A-Gossip security protocol. The comparative performance will be done by Peersim simulator [23]. Further, we will analyze the security issue in unstructured P2P routing in FreeNet [21] After that analysis, we will apply our proposed A-Gossip protocol on FreeNet [21] for enhancing its security.

Other Details

Paper ID: IJSRDV3I60391
Published in: Volume : 3, Issue : 6
Publication Date: 01/09/2015
Page(s): 698-703

Article Preview

Download Article