[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
article

Towards a Formal MultipathP2P Protocol

Published: 24 May 2024 Publication History

Abstract

Peer-To-Peer networks are becoming increasingly common as a mean of transferring files over Internet. In this paper, we describe, first, the design and implementation of our P2P system (MultiPathP2P). This latter is based on the social networks concepts where nodes are identified through their virtual addresses, we have designed our protocol based on 1) An architecture exploiting the principle of social networks where nodes are identified by virtual addresses and are able to randomly change their neighbors 2) A process of data request and file sharing differing from those supported in other P2P networks. Second, we present a formal validation of our proposal in order to prove its optimality and completeness.

References

[1]
AugustineJ.ChatterjeeS.PanduranganG. (2022, July). A fully-distributed scalable peer-to-peer protocol for byzantine-resilient distributed hash tables. In Proceedings of the 34th ACM Symposium on Parallelism in Algorithms and Architectures (pp. 87-98). 10.1145/3490148.3538588
[2]
Ben Chehida, A., Abassi, R., Ben Youssef, N., & Guemara El Fatmi, S. (2015, December). Cryptology and Network Security: 14th International Conference, CANS 2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings. Academic Press.
[3]
Bhushan, B., & Sahoo, G. (2018). Recent advances in attacks, technical challenges, vulnerabilities and their countermeasures in wireless sensor networks. Wireless Personal Communications, 98(2), 2037–2077.
[4]
Bhushan, B., & Sahoo, G. (2020). Requirements, protocols, and security challenges in wireless sensor networks: An industrial perspective. Handbook of computer networks and cyber security: principles and paradigms, 683-713.
[5]
CorreiaF.VazaoT. (2008, January). Simple ant routing algorithm. In 2008 International Conference on Information Networking (pp. 1-8). IEEE.
[6]
CorreiaF.VazaoT.LoboV. J. (2009, October). Models for pheromone evaluation in Ant Systems for Mobile Ad-hoc networks. In 2009 First International Conference on Emerging Network Intelligence (pp. 85-90). IEEE. 10.1109/EMERGING.2009.16
[7]
da Silva, P. M., Dias, J., & Ricardo, M. (2016, May). Mistrustful P2P: Privacy-preserving file sharing over untrustworthy Peer-to-Peer networks. In 2016 IFIP Networking Conference (IFIP Networking) and Workshops (pp. 395-403). IEEE.
[8]
Dang, N. T., Tran, H. M., Nguyen, S. V., Maleszka, M., & Le, H. D. (2021). Sharing secured data on peer-to-peer applications using attribute-based encryption. Journal of Information and Telecommunication, 5(4), 440–459.
[9]
Di Caro, G., Ducatelle, F., & Gambardella, L. M. (2005). AntHocNet: An adaptive nature‐inspired algorithm for routing in mobile ad hoc networks. European Transactions on Telecommunications, 16(5), 443–455.
[10]
Feigenbaum, J., Johnson, A., & Syverson, P. (2012). Probabilistic analysis of onion routing in a black-box model. ACM Transactions on Information and System Security, 15(3), 1–28.
[11]
GopalS. V.RaoN. S.NaikS. L. (2016, March). Dynamic sharing of files from disconnected nodes in peer to peer systems. In 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT) (pp. 767-770). IEEE. 10.1109/ICEEOT.2016.7754789
[12]
Heo, K., Kong, J., Oh, S., & Jung, J. (2021). Development of operator-oriented peer-to-peer energy trading model for integration into the existing distribution system. International Journal of Electrical Power & Energy Systems, 125, 106488.
[13]
Isdal, T., Piatek, M., Krishnamurthy, A., & Anderson, T. (2010). Privacy-preserving p2p data sharing with oneswarm. Computer Communication Review, 40(4), 111–122.
[14]
Khatibi, E., & Sharifi, M. (2021). Resource discovery mechanisms in pure unstructured peer-to-peer systems: A comprehensive survey. Peer-to-Peer Networking and Applications, 14(2), 729–746.
[15]
LaxmiV.JainL.GaurM. S. (2006, December). Ant colony optimization based routing on NS-2. International Conference on Wireless Communication and Sensor Networks (WCSN).
[16]
Muthusamy, V. (2003). An introduction to peer-to-peer networks. Presentation for MIE456-Information Systems Infrastructure II.
[17]
RoosS.SchillerB.HackerS.StrufeT. (2014, July). Measuring freenet in the wild: Censorship-resilience under observation. In International Symposium on Privacy Enhancing Technologies Symposium (pp. 263-282). Springer. 10.1007/978-3-319-08506-7_14
[18]
Sama, M., Pellegrini, P., D’Ariano, A., Rodriguez, J., & Pacciarelli, D. (2016). Ant colony optimization for the real-time train routing selection problem. Transportation Research Part B: Methodological, 85, 89–108.
[19]
Šešum-Čavić, V., Kuehn, E., & Kanev, D. (2016). Bio-inspired search algorithms for unstructured P2P overlay networks. Swarm and Evolutionary Computation, 29, 73–93.
[20]
Shen, H., Li, Z., & Chen, K. (2014). Social-P2P: An online social network based P2P file sharing system. IEEE Transactions on Parallel and Distributed Systems, 26(10), 2874–2889.
[21]
Shin, J., Islam, M. R., Rahim, M. A., & Mun, H. J. (2020). Arm movement activity based user authentication in P2P systems. Peer-to-Peer Networking and Applications, 13(2), 635–646.
[22]
Shoab, M., & Alotaibi, A. S. (2022). Deep Q-Learning Based Optimal Query Routing Approach for Unstructured P2P Network. Computers, Materials & Continua, 70(3), 5765–5781.
[23]
Sim, J., Kim, M., Kim, D., & Kim, H. (2021). Cloud Energy Storage System Operation with Capacity P2P Transaction. Energies, 14(2), 339.
[24]
Torres-Cruz, N., Rivero-Angeles, M. E., Rubino, G., Menchaca-Mendez, R., & Menchaca-Mendez, R. (2017). A window-based, server-assisted P2P network for VoD services with QoE guarantees. Mobile Information Systems.
[25]
Tushar, W., Yuen, C., Saha, T. K., Morstyn, T., Chapman, A. C., Alam, M. J. E., Hanif, S., & Poor, H. V. (2021). Peer-to-peer energy systems for connected communities: A review of recent advances and emerging challenges. Applied Energy, 282, 116131.
[26]
Yu, B., Li, X., & Zhao, H. (2020). Virtual block group: A scalable blockchain model with partial node storage and distributed hash table. The Computer Journal, 63(10), 1524–1536.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image International Journal of Business Data Communications and Networking
International Journal of Business Data Communications and Networking  Volume 19, Issue 1
Aug 2024
234 pages

Publisher

IGI Global

United States

Publication History

Published: 24 May 2024

Author Tags

  1. Completeness
  2. Mobile Multi Agent Systems
  3. Optimality
  4. P2P Networks
  5. Routing Protocol

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media