By Topic

An Age-Based Membership Protocol against Strong Churn in Unstructured P2P Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Haowen Liu ; Sch. of Comput., Wuhan Univ., Wuhan, China ; Xiwen Liu ; Song Wei ; Weidong Wen

Churn refers the continuous process of node arrival and departure in distributed peer-to-peer network. Enormous nodes joining the system concurrently will results in a flash crowd scenario for special nodes in the system, and enormous nodes crashing in a moment might come out a broken network. In fact, the joining and crashing always occur around some nodes at the same time, which will conduct strong dynamic environment and affect the detailed application over the overlay very much. In P2P networks under churn, We divide the new joining nodes into normal freshman, whitewasher and crowd attackers, and divide the departure nodes into normal dying nodes, outcast whitewasher and partition attackers. So the churn will be composed of tolerable normal lifespan behavior, the frightfully spiteful attack behavior or passive whitewashing behavior, which should be seriously noticed. In this paper, we present a novel protocol with positive communication policy among peers and conservative neighbor maintenance scheme under churn, to keep desirable properties such as a low network diameter and clustering. The protocol is resilient against different extend of churn and fit for P2P information dissemination and file sharing systems especially.

Published in:

Network Computing and Information Security (NCIS), 2011 International Conference on  (Volume:2 )

Date of Conference:

14-15 May 2011