Improved Approach of Address Propagation for F2F Networks

In a distributed hash table (DHT) peer-to-peer (P2P) network, members of the P2P network communicate with each other using unique identifiers that are used to fetch the actual addresses from a DHT. The node lookup is used to find the equivalent communication address of a given identifier. The lookup time of finding the communication address of a node cause delay on P2P networks. This issue becomes more important in friend-to-friend (F2F) networks in which the nodes have to be able to access a set of trusted friend nodes at any time. In this paper, we propose an address propagation model in order to ensure propagating the addresses in a way that a node has the current up-to-date address of the required nodes at any time during system operation. The proposed model also minimizes the added traffic overhead to the network. Some test results are presented as well.

[1]  Thomas E. Anderson,et al.  Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.

[2]  Maher Khemakhem,et al.  A novel replication technique to attenuate churn effects , 2016, Peer Peer Netw. Appl..

[3]  Zheng Ming-hui,et al.  Improved Multi-secret Sharing Scheme Based on One-Way Function , 2014 .

[4]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[5]  Guillaume Pierre,et al.  A survey of DHT security techniques , 2011, CSUR.

[6]  David R. Karger,et al.  Looking up data in P2P systems , 2003, CACM.

[8]  Gade Krishna,et al.  A scalable peer-to-peer lookup protocol for Internet applications , 2012 .

[9]  Siren: Secure data sharing over P2P and F2F networks , 2015 .

[10]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[11]  Manaf Zghaibeh,et al.  d-SHAM: A Constant Degree-Scalable Homogeneous Addressing Mechanism for Structured P2P Networks , 2018, IEEE Access.

[12]  Luc Devroye,et al.  The Analysis of Kademlia for Random IDs , 2014, Internet Math..

[13]  Eduardo Huedo,et al.  Evaluation of alternatives for the broadcast operation in Kademlia under churn , 2016, Peer Peer Netw. Appl..

[14]  Patrick Traynor,et al.  Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems , 2009, IEEE Trans. Parallel Distributed Syst..

[15]  Gábor Hosszú,et al.  Solution for the broadcasting in the Kademlia peer-to-peer overlay , 2013, Comput. Networks.

[16]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .