作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2011, Vol. 37 ›› Issue (19): 117-119. doi: 10.3969/j.issn.1000-3428.2011.19.038

• 安全技术 • 上一篇    下一篇

基于路由收敛性检验的DHT安全寻径

王 峰1,崔仲远1,周佳骏2,李肖坚3   

  1. (1. 周口师范学院计算机科学系,河南 周口 466001;2. 安庆师范学院图书馆,安徽 安庆 246003; 3. 广西师范大学计算机科学学院,广西 桂林 541004)
  • 收稿日期:2011-03-25 出版日期:2011-10-05 发布日期:2011-10-05
  • 作者简介:王 峰(1981-),男,讲师、硕士,主研方向:网络与信息安全,对等网络;崔仲远,讲师、硕士;周佳骏,硕士;李肖坚,博士
  • 基金资助:
    国家“973”计划基金资助重点项目(2002CB312105);国家信息关防与网络安全保障可持续发展计划基金资助项目(2002- 研2-A-007)

DHT Secure Routing Based on Route Convergence Detection

WANG Feng  1, CUI Zhong-yuan   1, ZHOU Jia-jun   2, LI Xiao-jian   3   

  1. (1. Department of Computer Science, Zhoukou Normal University, Zhoukou 466001, China; 2. Library of Anqing Teachers College, Anqing 246003, China; 3. College of Computer Science, Guangxi Normal University, Guilin 541004, China)
  • Received:2011-03-25 Online:2011-10-05 Published:2011-10-05

摘要: 为降低恶意节点对基于分布式哈希表(DHT)的结构化对等网络寻径造成的危害,对多种DHT寻径算法进行分析,得到一般DHT协议寻径算法的迭代函数。通过对迭代寻径函数的分析,归纳出恶意节点的共同特征,提出基于下一跳路由收敛性检测的DHT安全寻径模型SDRM。依据该模型设计基于Chord的安全寻径协议CSDSR,并通过模拟实验验证CSDSR的可行性。

关键词: 结构化, 对等网, 迭代寻径, 恶意节点, 收敛性

Abstract: In order to reduce the harm of malicious nodes to the Distributed Hash Table(DHT) network, this paper makes in-depth analysis about the DHT routing algorithm. The iteration function of routing on DHT is done, through the analysis of iterative routing functions. The common features of malicious nodes are summarized, which are used to undermine the convergence of routing. So a security routing model based on convergence is designed detected about route in DHT, which is named SDRM. A security routing algorithm named CSDSR is designed, by SDRM and Chord. A simulation is carried out to verify performance of CSDSR.

Key words: structuring, Peer-to-Peer(P2P) network, iterative routing, malicious nodes, convergence

中图分类号: