To see the other types of publications on this topic, follow the link: Peer-to-Peer Network Security.

Journal articles on the topic 'Peer-to-Peer Network Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Peer-to-Peer Network Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mahmoud, Mostafa. "Bitcoin's Blockchain Peer-to-Peer Network Security Attacks and Countermeasures." Indian Journal of Science and Technology 13, no. 7 (2020): 767–86. https://doi.org/10.17485/ijst/2020/v13i07/149691.

Full text
Abstract:
Abstract <strong>Objectives:</strong>&nbsp;The main objective of this work is familiarizing users and researchers about Bitcoin&rsquo;s blockchain peer-to-peer network system and investigating security attacks that threat this critical financial digital cash network. <strong>Method:</strong>&nbsp;A comprehensive research analysis was conducted to identify Bitcoin&rsquo;s blockchain peer-to-peer network security attacks and possible countermeasures to protect the Bitcoin network against such attacks. This bibliographical survey covers the related research works from the launch of blockchain in 2008 until the end of 2019. <strong>Results:</strong>&nbsp;This study investigates eleven attacks that threaten Bitcoin&rsquo;s blockchain peer-to-peer network systems and presents the possible countermeasures to defend these attacks. <strong>Conclusion:</strong>&nbsp;The conclusion obtained is encouraging the researchers to explore this hot research area. Besides, the study provides perspectives for future research directions in this domain. <strong>Keywords:</strong> Bitcoin, Blockchain, Cryptocurrency, Security, Attacks, Countermeasures.
APA, Harvard, Vancouver, ISO, and other styles
2

Feng, Liping, Hongbin Wang, Qi Han, Qingshan Zhao, and Lipeng Song. "Modeling Peer-to-Peer Botnet on Scale-Free Network." Abstract and Applied Analysis 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/212478.

Full text
Abstract:
Peer-to-peer (P2P) botnets have emerged as one of the serious threats to Internet security. To prevent effectively P2P botnet, in this paper, a mathematical model which combines the scale-free trait of Internet with the formation of P2P botnet is presented. Explicit mathematical analysis demonstrates that the model has a globally stable endemic equilibrium when infection rate is greater than a critical value. Meanwhile, we find that, in scale-free network, the critical value is very little. Hence, it is unrealistic to completely dispel the P2P botnet. Numerical simulations show that one can take effective countermeasures to reduce the scale of P2P botnet or delay its outbreak. Our findings can provide meaningful instruction to network security management.
APA, Harvard, Vancouver, ISO, and other styles
3

Mostafa, Mahmoud. "Bitcoin’s Blockchain Peer-to-Peer Network Security Attacks and Countermeasures." Indian Journal of Science and Technology 13, no. 07 (2020): 767–86. http://dx.doi.org/10.17485/ijst/2020/v13i07/149691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wararkar, Pravin, Naman Kapil, Vyom Rehani, Yash Mehra, and Yashi Bhatnagar. "Resolving Problems Based on Peer to Peer Network Security Issue's." Procedia Computer Science 78 (2016): 652–59. http://dx.doi.org/10.1016/j.procs.2016.02.113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ke, Chih Kun, and Zheng Hua Lin. "Secure Data Synchronization over a Mobile Peer-to-Peer Network." Applied Mechanics and Materials 764-765 (May 2015): 950–54. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.950.

Full text
Abstract:
In previous work, we have proposed a service mechanism which automatically syncs the file resources among discrete mobile devices. The mechanism includes four modules. The role-based access control module (RBAC) defined an organization policy which constructs some rules for file resources accessing. The user identification module dispatches a user some specific role (s) with relevant permission (s) and constraint (s) to access organization file resources. The en-capsulation/de-capsulation module enforces the JXTA protocol to sync the file resource synchronization over a mobile peer-to-peer network. The knowledge base module stores various organization file resources in the proposed service mechanism. However, the service mechanism faces an important challenge about data security. How to securely sync organization file resources among discrete mobile devices is worth exploring. In this study, we enforces some cryptographic techniques, including advanced encryption standard (AES), Triple data encryption standards (Triple-DES), and data encryption standards (DES), to examine secure synchronization of organization file resources among discrete mobile devices. The experiment results show the proposed mechanism is secure to automatically sync file resources among discrete mobile devices. The contribution of this work is to solve data security issue in syncing organization file resources among discrete mobile devices. We also strengthen an organization mobility to acquire the file resources by a mobile device in anywhere.
APA, Harvard, Vancouver, ISO, and other styles
6

S, Archana, Princy Mary, Sangami S, and Mahalakshmi V. "Peer-to-Peer Network Node Distribution Analysis Using Block chain." International Research Journal of Computer Science 11, no. 04 (2024): 309–13. http://dx.doi.org/10.26562/irjcs.2024.v1104.29.

Full text
Abstract:
This project uses block chain technology to propose a decentralized access control method for anonymous authentication and secure cloud data storage. The suggested plan improves privacy by guaranteeing that users can authenticate themselves to the cloud without disclosing who they are. Block chain integration improves system security by removing single points of failure and enabling robust, decentralized access management. The plan handles user revocation, enables fine-grained access control, and successfully thwarts replay assaults. Users have similar communication, processing, and storage overheads to centralized methods when creating, editing, and reading material that is stored on the cloud. Our method is decentralized, which sets it apart from conventional models and makes it a useful and effective way to store data securely on the cloud for applications that need a high degree of trust.
APA, Harvard, Vancouver, ISO, and other styles
7

Osman, Dr Yassir S. K., Dr Rajalingam A., and Dr Jayakumar M.S. "A Novel Application Service Security Using Peer-to-Peer Trust Slicing Trust Model." International Innovative Research Journal of Engineering and Technology 8, no. 3 (2023): 25–32. http://dx.doi.org/10.32595/iirjet.org/v8i3.2023.171.

Full text
Abstract:
Network applications provide services for different user categories in a distributed and shared scenario. The challenge in providing services is security due to the presence of common communication and sharing networks. In such cases, the presence of adversaries is tedious to be identified. In this article, the Slicing-dependent Secure Distribution (SSD) of services is introduced. This method is designed to combat man-in-the-middle adversaries that are present in commonly shared networks. The service network is partitioned into slices for identifying the distribution patterns and security measures. The trust and its allied communication between the consecutive slices are verified in a peer-to-peer (P2P) manner. The performance is verified under the purely naïve and purely collective scenario and against attack.
APA, Harvard, Vancouver, ISO, and other styles
8

Li, Gengxian, Chundong Wang, and Huaibin Wang. "Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches." Future Internet 14, no. 10 (2022): 290. http://dx.doi.org/10.3390/fi14100290.

Full text
Abstract:
Decentralized networks bring us many benefits, but as networks evolve, many nodes either actively or passively become unreachable behind an NAT or a firewall. This has become a hindrance to the development of decentralized networks, where peer-to-peer communication data transfer between unreachable nodes cannot be accomplished, whether in decentralized file systems, decentralized social, or decentralized IoT. The existing scheme requires a series of centralized servers or requires network-wide flooding for consensus data, which can lead to the loss of decentralized nature of the network and cause flooding bottlenecks, contrary to the design concept of decentralization. In this paper, our proposed scheme uses a structured P2P overlay network to store the indexes of unreachable nodes in the whole network, so that the characteristics of a decentralized network are still maintained while ensuring the efficiency of lookup. When nodes communicate, the transmission channel is established so that both nodes continuously transmit data streams peer-to-peer without relying on the central server. Moreover, the scheme guarantees the security and privacy of nodes’ data transmission and the P2P overlay network without relying on centralized trusted institutions. Finally, we deploy a real cluster environment to verify the effectiveness of each module at different network sizes and prove the overall feasibility of the scheme. The scheme has certain advantages over existing solutions in terms of security, privacy, communication efficiency, device democracy, etc.
APA, Harvard, Vancouver, ISO, and other styles
9

Vimal, S1 Vijayalakshmi V2. "SURVEY: COMPARISON OF PEER-TO-PEER OVERLAY NETWORK FOR FILE SEARCHING AND SHARING METHODS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 1 (2018): 338–43. https://doi.org/10.5281/zenodo.1147478.

Full text
Abstract:
The infrastructure of Peer to Peer network is underlying on the network flows and end host. The overlay network forecasting the numerical performance of the network and it can improve the connection between the neighbor&rsquo;s nodes via proper routers. The performance of the overlay network is calculated by the amount of failure and success rate of the file sharing and improves the performance in the good usage of resources. We examine the peer to peer overlays networks by different networks similar by ad-hoc networks, sensor networks and Wireless LANs. This survey provides the features of P2P networks and well-organized scheme of locating the data item and to select the close nodes redundant storage with different permanence of data, to maintain the trust between the nodes and security of overlay networks. <strong>KEYWORDS</strong>: Overlay Networks, Neighbor Peer. Trust
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Xin. "A Novel Security Architecture for Peer-to-Peer IMS System." Advanced Materials Research 664 (February 2013): 1076–81. http://dx.doi.org/10.4028/www.scientific.net/amr.664.1076.

Full text
Abstract:
Recently, some proposals suggest to use a peer-to-peer network instead of servers to facilitate SIP user registration and location in IMS communication systems. Due to the lack of central authority, security issue becomes one of the main problems in such P2P IMS systems. In this paper, we propose a novel security architecture for P2P IMS system. By using this architecture, our P2P IMS system becomes a fully distributed secure system in which there is not a central server indeed. Furthermore, our system is a scalable system which is capable of anonymous yet accountable real time communication based on SIP protocol which enables the system compatible with any existing IMS systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Mikhav, Volodymyr, Serhii Semenov, Yelyzaveta Meleshko, Mykola Yakymenko, and Yaroslav Shulika. "Constructing the mathematical model of a recommender system for decentralized peer-to-peer computer networks." Eastern-European Journal of Enterprise Technologies 4, no. 9 (124) (2023): 24–35. http://dx.doi.org/10.15587/1729-4061.2023.286187.

Full text
Abstract:
Recommender systems make it easier to search with a large amount of content, supplementing or replacing the classic search output with recommendations. In P2P networks, their use can have additional benefits. Because of indexing and search problems, previously added files may not be available to P2P network users. If the user cannot find the file he is looking for, one can provide him with a list of recommendations based on his preferences and search query. The object of research is the process of creating recommendations for users of decentralized P2P networks to facilitate data search. The urgent task of increasing the accuracy of mathematical modeling of recommender systems by taking into account the requirements for reliability and data security during changes in the structure of a decentralized P2P network is solved. An analytical model of the recommender system of a decentralized P2P network has been developed, the main feature of which is taking into account the requirements of reliability and security of recommendation messages. This was done by introducing the following indicators into the general model of the decentralized recommender system – the probability of reliable packet transmission and the probability of safe packet transmission. The developed analytical model makes it possible to conduct a comparative analysis of different methods of operation of recommender systems and to set acceptable parameters under which the degree of relevance does not fall below a certain threshold. The developed mathematical model of the system based on the GERT scheme differs from the known ones by taking into account the reliability and security requirements during changes in the structure of the decentralized P2P network. This has made it possible to improve the accuracy of simulation results up to 5 %. The proposed mathematical model could be used for prototyping recommender systems in various fields of activity
APA, Harvard, Vancouver, ISO, and other styles
12

Franzoni, Federico, Xavier Salleras, and Vanesa Daza. "AToM: Active topology monitoring for the bitcoin peer-to-peer network." Peer-to-Peer Networking and Applications 15, no. 1 (2021): 408–25. http://dx.doi.org/10.1007/s12083-021-01201-7.

Full text
Abstract:
AbstractOver the past decade, the Bitcoin P2P network protocol has become a reference model for all modern cryptocurrencies. While nodes in this network are known, the connections among them are kept hidden, as it is commonly believed that this helps protect from deanonymization and low-level attacks. However, adversaries can bypass this limitation by inferring connections through side channels. At the same time, the lack of topology information hinders the analysis of the network, which is essential to improve efficiency and security. In this paper, we thoroughly review network-level attacks and empirically show that topology obfuscation is not an effective countermeasure. We then argue that the benefits of an open topology potentially outweigh its risks, and propose a protocol to reliably infer and monitor connections among reachable nodes of the Bitcoin network. We formally analyze our protocol and experimentally evaluate its accuracy in both trusted and untrusted settings. Results show our system has a low impact on the network, and has precision and recall are over 90% with up to 20% of malicious nodes in the network.
APA, Harvard, Vancouver, ISO, and other styles
13

Gonzalez, Elias, and Laszlo B. Kish. "Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange." Fluctuation and Noise Letters 15, no. 01 (2016): 1650008. http://dx.doi.org/10.1142/s0219477516500085.

Full text
Abstract:
As the utilization of sensor networks continue to increase, the importance of security becomes more profound. Many industries depend on sensor networks for critical tasks, and a malicious entity can potentially cause catastrophic damage. We propose a new key exchange trust evaluation for peer-to-peer sensor networks, where part of the network has unconditionally secure key exchange. For a given sensor, the higher the portion of channels with unconditionally secure key exchange the higher the trust value. We give a brief introduction to unconditionally secured key exchange concepts and mention current trust measures in sensor networks. We demonstrate the new key exchange trust measure on a hypothetical sensor network using both wired and wireless communication channels.
APA, Harvard, Vancouver, ISO, and other styles
14

Nick, Rahimi. "SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION." International Journal of Network Security & Its Applications (IJNSA) 12, no. 02 (2020): 01–16. https://doi.org/10.5281/zenodo.3737916.

Full text
Abstract:
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies&rsquo; solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.
APA, Harvard, Vancouver, ISO, and other styles
15

Kabla, Arkan Hammoodi Hasan, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, and Shankar Karuppayah. "PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet." Symmetry 14, no. 12 (2022): 2483. http://dx.doi.org/10.3390/sym14122483.

Full text
Abstract:
Due to emerging internet technologies that mostly depend on the decentralization concept, such as cryptocurrencies, cyber attackers also use the decentralization concept to develop P2P botnets. P2P botnets are considered one of the most serious and challenging threats to internet infrastructure security. Consequently, several open issues still need to be addressed, such as improving botnet intrusion detection systems, because botnet detection is essentially a confrontational problem. This paper presents PeerAmbush, a novel approach for detecting P2P botnets using, for the first time, one of the most effective deep learning techniques, which is the Multi-Layer Perceptron, with certain parameter settings to detect this type of botnet, unlike most current research, which is entirely based on machine learning techniques. The reason for employing machine learning/deep learning techniques, besides data analysis, is because the bots under the same botnet have a symmetrical behavior, and that makes them recognizable compared to benign network traffic. The PeerAmbush also takes the challenge of detecting P2P botnets with fewer selected features compared to the existing related works by proposing a novel feature engineering method based on Best First Union (BFU). The proposed approach showed considerable results, with a very high detection accuracy of 99.9%, with no FPR. The experimental results showed that PeerAmbush is a promising approach, and we look forward to building on it to develop better security defenses.
APA, Harvard, Vancouver, ISO, and other styles
16

Vimal, S., and S. K. Srivatsa. "A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (2017): 10.11591/ijece.v7i6.pp3515–3520. https://doi.org/10.11591/ijece.v7i6.pp3515-3520.

Full text
Abstract:
In order to evaluate the trustworthiness of participating peers in unstructured peer-to-peer networks, Reputation aggregation methods are used in this method. Each and every peer of the network will collect the local scores of each transaction and will compute global scores by aggregating all the local scores with the help of global scores, each individual peer can interact with its suitable peers. But the existing method will not consider the score of the new peer. In this condition, requests are handled by existing peers who leads to failure in downloading process. To rectify this, NP-TRUST model is used to distribute the request to all peers including the newly joined peers. The proposed method is compared with gossip and DFR-TRUST model in Transaction Success rate and variation in file request.
APA, Harvard, Vancouver, ISO, and other styles
17

Aline, Z. TSAGUE, T. FUTE Elie, TONYE Emmanuel, and EL AMRAOUI Adnen. "Peer to Peer Authentication for Index-based Distributed Data Collection: A Zero-Knowledge-based Scheme to Security for Wireless Sensor Networks." American Journal of Advanced Research 3, no. 2 (2019): 1–6. https://doi.org/10.5281/zenodo.3368588.

Full text
Abstract:
A primary concern of a wireless sensor network (WSN) is to gather data from the immediate environment of it sensors while minimizing the use of limited network and computational resources. Several studies have focused on how to efficiently store and process sensed data in WSN. Generally, the appropriate method to store sensed data depends on the application for which the WSN was deployed. No matter the application, data collection appears to be a primary function of a WSN. The execution of this function must be coordinated and effective in order to provide WSN with current security standards such as privacy, data integrity and end entity authentication between communicating peers.&nbsp;In this paper, we propose an efficient authentication-based security scheme for data retrieval in WSN. This security scheme combines zero-knowledge proofs (ZKP) and pre-shared key method to provide secured and authenticated communication during data retrieval by a mobile sink in WSN. The security mechanism proposed works on a clustered network topology with an index-based data dissemination scheme. The network employs the concept of Connected Dominating Set (CDS) to form storage and index node sets. Upon a successful peer authentication, the index, located on the index node, is used for efficient retrieval of data. The scheme also provides end-to-end confidentiality given that data is being encrypted before transferred and can be decrypted only at the base station. Security and performance analysis of the proposed scheme show that it addresses all of the aforementioned issues while also satisfying zero-knowledge proofs properties. It is also suitable for devices with limited computational resources as the network can fulfil the purpose of data collection and can be deployed in large-scale wireless sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
18

Alwan Hussein, Naseer. "Simulation of RC5 Algorithm to Provide Security for WLAN, Peer-to-Peer." Al-Kitab Journal for Pure Sciences 8, no. 02 (2024): 31–47. http://dx.doi.org/10.32441/kjps.08.02.p4.

Full text
Abstract:
Information security is a significant viewpoint in different areas of correspondence. This paper manages information encryption as large numbers of data correspondence rely upon encryption information. In this paper, another proposition of an information encryption framework has been presented. The framework can be partitioned into two stages; the primary stage centers around creating a top-notch Pseudo Irregular Number generator PRNGs utilizing rudimentary, intermittent, and crossover rules of cell automata CA. The framework recommends another mix of CA rules in an undertaking to give high arbitrariness and to work on the strength of the proposed cryptosystem. The subsequent stage creates the Improved Rivest Code 5 ERC5 calculations which utilizes the produced arbitrary Number Succession RNS with an end goal to reinforce the security and haphazardness of the first Rivest Code 5 RC5 Algorithm. The outcomes show that the proposed PRNGs in light of CA can create RNS with a high period which can reach more than 100000 keys without reiteration or string duplication. In addition, the test exhibits that the proposed ERC5 works on the security of the first RC5 calculation. The proposed cryptosystem is assessed as far as Shannon's hypothesis of data entropy, irregularity tests, calculation time, and key space investigation. The outcomes confirm that the recommended information crypto-framework expands the development of the security level of unique RC5 encryption calculation with a serious level of arbitrariness and privacy. It is executed this work to show the results rely upon the programming language C# and the correspondence was presented in a structure called disseminated through an association wireless local-area network WIFI.
APA, Harvard, Vancouver, ISO, and other styles
19

Abdullahi Yari, Imrana, Tobias Dehling, Felix Kluge, Juergen Geck, Ali Sunyaev, and Bjoern Eskofier. "Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review." Journal of Medical Internet Research 23, no. 11 (2021): e24460. http://dx.doi.org/10.2196/24460.

Full text
Abstract:
Background Patient-centered health care information systems (PHSs) enable patients to take control and become knowledgeable about their own health, preferably in a secure environment. Current and emerging PHSs use either a centralized database, peer-to-peer (P2P) technology, or distributed ledger technology for PHS deployment. The evolving COVID-19 decentralized Bluetooth-based tracing systems are examples of disease-centric P2P PHSs. Although using P2P technology for the provision of PHSs can be flexible, scalable, resilient to a single point of failure, and inexpensive for patients, the use of health information on P2P networks poses major security issues as users must manage information security largely by themselves. Objective This study aims to identify the inherent security issues for PHS deployment in P2P networks and how they can be overcome. In addition, this study reviews different P2P architectures and proposes a suitable architecture for P2P PHS deployment. Methods A systematic literature review was conducted following PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analyses) reporting guidelines. Thematic analysis was used for data analysis. We searched the following databases: IEEE Digital Library, PubMed, Science Direct, ACM Digital Library, Scopus, and Semantic Scholar. The search was conducted on articles published between 2008 and 2020. The Common Vulnerability Scoring System was used as a guide for rating security issues. Results Our findings are consolidated into 8 key security issues associated with PHS implementation and deployment on P2P networks and 7 factors promoting them. Moreover, we propose a suitable architecture for P2P PHSs and guidelines for the provision of PHSs while maintaining information security. Conclusions Despite the clear advantages of P2P PHSs, the absence of centralized controls and inconsistent views of the network on some P2P systems have profound adverse impacts in terms of security. The security issues identified in this study need to be addressed to increase patients’ intention to use PHSs on P2P networks by making them safe to use.
APA, Harvard, Vancouver, ISO, and other styles
20

Mezquita, Yeray, Ana Belén Gil-González, Angel Martín del Rey, Javier Prieto, and Juan Manuel Corchado. "Towards a Blockchain-Based Peer-to-Peer Energy Marketplace." Energies 15, no. 9 (2022): 3046. http://dx.doi.org/10.3390/en15093046.

Full text
Abstract:
Blockchain technology is used as a distributed ledger to store and secure data and perform transactions between entities in smart grids. This paper proposes a platform based on blockchain technology and the multi-agent system paradigm to allow for the creation of an automated peer-to-peer electricity market in micro-grids. The use of a permissioned blockchain network has multiple benefits as it reduces transaction costs and enables micro-transactions. Moreover, an improvement in security is obtained, eliminating the single point of failure in the control and management of the platform along with creating the possibility to trace back the actions of the participants and a mechanism of identification. Furthermore, it provides the opportunity to create a decentralized and democratic energy market while complying with the current legislation and regulations on user privacy and data protection by incorporating Zero-Knowledge Proof protocols and ring signatures.
APA, Harvard, Vancouver, ISO, and other styles
21

Heerok, Banerjee, Murugaanandam S, and Ganapathy V. "A decentralized paradigm for resource-aware computing in wireless Ad hoc networks." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 2 (2019): 676–82. https://doi.org/10.12928/TELKOMNIKA.v17i2. 9621.

Full text
Abstract:
A key factor limiting the democratisation of networked systems is the lack of trust, particularly in the wake of data-intensive applications that work on sensitive and private data, which requires providing strong network security guarantees via encryption and authentication algorithms, as well as rethinking algorithms to compute on the network peripheries without moving data. In many security and privacycritical domains such as Home Automation IoT networks, AUV networks etc., the existence of a centralized privileged node leads to a vulnerability for leakage of sensitive information. In this paper, we have proposed a decentralized networking architecture that adopts collaborative processing techniques and operates within the tradeoff between network security and performance. We have investigated the design and sustainability of autonomous decentralized systems and evaluated the efficiency of the proposed scheme with the help of extensive simulation tools.
APA, Harvard, Vancouver, ISO, and other styles
22

Smushkin, A. B. "Darknet in the Cyberspace Security System." Juridical science and practice 20, no. 4 (2025): 50–59. https://doi.org/10.25205/2542-0410-2024-20-4-50-59.

Full text
Abstract:
The author states the active use of the Shadow Internet by the criminal environment with a clear lag in forensic research of this level of the Internet. It should be borne in mind that although the Shadow Internet contains, according to various data, from 0.1 to 1% of the information of the entire Internet, but its active use for criminal purposes requires scientific study. The author examines the basics of the functioning of the Darknet network and states that the increased level of anonymization of this network is due to peer-to-peer interaction, onion and tunnel routing, mixing cascades, multi-stage data transfer and other methods. The article indicates that the main criminalistic methods of working with Darknet are aimed at hacking, extracting and researching information from some Darknet services, de-anonymizing and identifying users. The use of neural networks designed for Big Data analysis (Big Date) can be of great benefit in terms of de-an onymization of suspects on the Darknet network. The author off ers recommendations related to the use of peer—to-peer networks based on tunnel routing technologies 2IP (Invisible Internet Project – invisible Internet) and The Onion Router when working on the Darknet network. Summing up, the author states that the fight against illegal content and the use of the Shadow Internet for criminal purposes should be conducted comprehensively and systematically.
APA, Harvard, Vancouver, ISO, and other styles
23

O. E., Ojo, Kareem M. K., Ayilara-Adewale O. A., and Amahia C. N. "A secured channel for transmitting multimedia contents in peer-assisted networks." Journal of Applied Science, Information and Computing 5, no. 2 (2024): 41–51. http://dx.doi.org/10.59568/jasic-2024-5-2-06.

Full text
Abstract:
The Internet's explosive growth has raised demand for effective online video streaming services and cast doubt on the viability of peer-to-peer (P2P) networks and conventional content distribution networks (CDN). To facilitate efficient video streaming, Peer-Assisted Networks (PA-CDNs) integrate the best aspects of P2P networks and CDNs. Transferring data content across a protected channel platform is crucial since the PA-CDNs strategy uses both servers and peers, optimizing both delivery methods to offer the best possible user experience. However, it is vulnerable to assaults. By guaranteeing secure access management and addressing security concerns, this study offers a strong security model to strengthen and improve security in PA-CDN network environments. The outcome of the experiment indicates that the strategy works. Strong security model to strengthen and improve security in PA-CDN network environments. The outcome of the experiment indicates that the strategy works.
APA, Harvard, Vancouver, ISO, and other styles
24

Brooks, Richard R. "Sensor Network Self-Organization Using Random Graphs." International Journal of Distributed Sensor Networks 5, no. 3 (2009): 201–8. http://dx.doi.org/10.1080/15501320802498307.

Full text
Abstract:
Sensor networks are deployed in, and react with, chaotic environments. Self-organizing peer-to-peer networks have admirable survivability characteristics. This chapter discusses random network formalisms for designing, modeling, and analyzing survivable sensor networks. Techniques are given for determining critical values. Applications in system security and surveillance networks are given.
APA, Harvard, Vancouver, ISO, and other styles
25

Poonam, Gupta*1 Anupama Gupta2 &. Baldip Kaur3. "SECURE AUTHENTICATION IN IoT BASED WSNs FOR DATA PRIVACY PROTECTION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 4 (2018): 604–14. https://doi.org/10.5281/zenodo.1228639.

Full text
Abstract:
The security of IOT raises the major concerns as the IOTs are equipped with the limited resources based sensor nodes. Hence, these sensors must be provided with the light and efficient security algorithm for the enforcement of data privacy and user integrity in the given network. The two major security paradigms for IOTs are authentication &amp; encryption mechanisms, which have many variants. In this thesis, the work has been carried over the enhancement of the proposed security model by designing the authentication model with set of algebraic equations. The multi-column based complex key generation is designed around the algebraic equations, specifically cubic and quartic equations. The authentication keys and data encryption is another security paradigm of the proposed model, which utilizes the advanced encryption standard (AES), which has been used for the implementation of the high security protocols. The performance of the proposed model has been analyzed under the different scenarios with variable number of nodes (50, 100 and 150) with decreasing transmission range of 75, 50 and 25 respectively. The proposed model has been recorded with minimum projected resource readings at 1.09, 5.49 and 10.96 percent in the scenarios with 50, 100 and 150 nodes respectively, whereas the maximum readings are 1.95, 9.81 and 19.63 percent for similar scenarios.
APA, Harvard, Vancouver, ISO, and other styles
26

Baig, Mirza Jabbar Aziz, Mohammad Tariq Iqbal, Mohsin Jamil, and Jahangir Khan. "Blockchain-Based Peer-to-Peer Energy Trading System Using Open-Source Angular Framework and Hypertext Transfer Protocol." Electronics 12, no. 2 (2023): 287. http://dx.doi.org/10.3390/electronics12020287.

Full text
Abstract:
Renewable energy resources have been gaining ground in recent years and we are on the verge of a decentralized energy market with consumers becoming prosumers. Platforms that facilitate peer-to-peer (P2P) sale or purchase of energy are therefore essential. This paper presents a way to trade energy across P2P networks using blockchain technology. The main server is a Raspberry Pi 4 Model B (Pi4B), on which the user interface (UI) as well as the private Ethereum blockchain are configured. The blockchain also implements a smart contract. For the purpose of developing the UI that provides assistance in conducting trading activities, an open-source Angular framework is used. Also explored in the study is the development of an Internet of Things (IoT) server using the latest ESP32-S3 microcontroller. The field instrumentation devices (FIDs) are connected to the microcontroller for the purpose of data acquisition and for subsequent transmission to an IoT server. The blockchain network maintains a record of all transactions in an immutable manner. Assuring security is achieved through a local configuration of the system, hosted on a private network with restricted access. For the purposes of information security and data integrity, additional security measures are also considered, such as a secret recovery phrase, firewalls, login credentials and private key. Among the servers and clients, there is an implementation of a Hypertext Transfer Protocol. The P2P energy trading approach involving renewable energy designed for remote communities is explained and illustrated in this paper.
APA, Harvard, Vancouver, ISO, and other styles
27

Reddy, Annapureddy Venkata Sai Kumar, and Gourinath Banda. "ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System." Sensors 24, no. 24 (2024): 8034. https://doi.org/10.3390/s24248034.

Full text
Abstract:
The widespread reliance on paper-based currency poses significant drawbacks, such as counterfeiting, lack of transparency, and environmental impacts. While Central Bank Digital Currencies (CBDCs) address many of these issues, their dependence on continuous internet connectivity limits their usability in scenarios with poor or no network access. To overcome such limitations, this paper introduces ElasticPay, a novel Peer-to-Peer (P2P) Offline Digital Payment System that leverages advanced hardware security measures realised through Trusted Platform Modules (TPMs), Trusted Execution Environments (TEEs), and Secure Elements (SEs). ElasticPay ensures transaction privacy, unforgeability, and immediate settlement while preventing double spending. Our approach integrates robust recovery mechanisms and provides a scalable solution for diverse environments. Extensive experimentation validates the system’s reliability and practicality, highlighting its potential to advance secure and inclusive CBDC ecosystems. We demonstrate the proposed solution implementation on the iPhone mobilephone because it has an inbuilt Secure Enclave, which is an integrated implementation of the necessary TPM, TEE, and SE functionalities.
APA, Harvard, Vancouver, ISO, and other styles
28

Bharath, Bhushan Yannam. "EFFECTIVE RECOMMENDATION CHAINS FOR LARGE SCALE DISTRIBUTED DECENTRALIZED P2P SYSTEMS." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 09 (2013): 300–306. https://doi.org/10.5281/zenodo.14613399.

Full text
Abstract:
The security model used for centralized systems is not suitable for P2P networks as it is centralized in nature. The security challenges in the P2P networks are secure reputation data management, availability of reputation data, Sybil attacks and identity management of peers. In this paper we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer extremely at low cost. We also investigate Reputation Systems for P2P networks more ambitious approach to protect the P2P network without using any central component, and thereby harnessing the full benefits of the P2P network. The results in the form of simulations reveal that the new cryptographic protocol is secure and efficient in a decentralized peer &ndash; to &ndash; peer network.&nbsp;
APA, Harvard, Vancouver, ISO, and other styles
29

Sun, Zhixiang, Zhigang Li, Yixun Xue, Xinyue Chang, Huajian Li, and J. H. Zheng. "Price-function-free energy pricing in Bilevel peer-to-peer energy markets considering network security." Applied Energy 391 (August 2025): 125864. https://doi.org/10.1016/j.apenergy.2025.125864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Edussuriya, Chathurangi, Umar Marikkar, Subash Wickramasinghe, Upul Jayasinghe, and Janaka Alawatugoda. "Peer-to-Peer Energy Trading through Swarm Intelligent Stackelberg Game." Energies 16, no. 5 (2023): 2434. http://dx.doi.org/10.3390/en16052434.

Full text
Abstract:
The development of smart grids has paved the way for sustainable energy infrastructure to transition towards decentralized energy trading. As intelligent agents, energy sources engage in energy trading based on their energy surplus or deficit. Buyers and sellers (participants) should achieve maximum payoffs in which buyers cut costs and sellers improve their utilities, and the security of sensitive information of smart agents must be guaranteed. This paper provides a blockchain-based energy trading network where intelligent agents can exchange energy in a secure manner, without the intervention of third parties. We model energy trading as a Stackelberg game, ensuring that the platform maximizes social welfare while participants increase their payoffs. Using the inherited characteristics of blockchain technology, a novel decentralized swarm intelligence technique is applied to solve the game while ensuring the privacy of the smart agents’ sensitive information. The numerical analysis demonstrates that the suggested method outperforms the present methods (Constant Utility Optimization, average method...) for optimizing the objectives of each agent by maximizing the sellers’ utilities and reducing the buyers’ costs. In addition, the experimental results demonstrate that it significantly reduces carbon footprint (15%) by enhancing energy exchange between intelligent agents.
APA, Harvard, Vancouver, ISO, and other styles
31

Suman, Mann, Chaudhary Harshit, khatri Aryan, Malik Ritik, and Gupta Yatin. "A Peer-to-Peer File Storage System Using Blockchain and Interplanetary File System." International Journal of Current Science Research and Review 05, no. 02 (2022): 582–89. https://doi.org/10.5281/zenodo.6298736.

Full text
Abstract:
Abstract : People&rsquo;s lives have been profoundly impacted by the headway of innovation which has worked on their lives from each viewpoint. Clearly, innovation assumes a significant part in each circle of life and information stockpiling and sharing is a significant part of it. Current information sharing and storage devices depend on trusted third parties (TTP) and because of the contribution of third parties, such frameworks need straightforwardness, security, trust and strength. To solve these issues, this paper proposes a blockchain-based secure information sharing application by consolidating the highlights of IPFS and Ethereum. In this proposed scheme ethereum blockchain, decentralized storage, encryption and IPFS are combined to build an application that maximizes the tech<em>nological resources and provide</em>&nbsp;with an effective storage website ,Ethereum blockchain, decentralized capacity, encryption, and InterPlanetary File System are consolidated to assemble an application that boosts the innovative assets and gives a viable storage site. To carry out the proposed situation, smart contracts are written in solidity and sent on the nearby Ethereum test network. The proposed plot accomplishes security, transparency, legitimacy of owner, access control and nature of information.
APA, Harvard, Vancouver, ISO, and other styles
32

Abdelouahab, Mahdi, Abdelmadjid Bouabdallah, Mohamed Achemlal, and Sylvie Laniepce. "The Topology Change Attack: Threat and Impact." JUCS - Journal of Universal Computer Science 15, no. (2) (2009): 465–87. https://doi.org/10.3217/jucs-015-02-0465.

Full text
Abstract:
Peer to peer (P2P) network has received in past few years a significant attention, especially such file sharing network as eDonkey [Kulbak and Kirkpatrick, 2005] or BitTorrent [Cohen 2008]. The shift from the classical client-server based paradigm of the Internet, with a clear distinction between information providers and consumers, towards consumers sharing information among each other led to the rise of the P2P paradigm. This distributed architecture, enables users to share content autonomously; Information remains at end-users' computers at the edge of the Internet and is not gathered and organized at central servers. While P2P has emerged as a new hot communication concept among the Internet users, security concerns still taking its first steps. The deployment of classic security protocols to provide services such as node authentication, content integrity or access control, presents several difficulties, most of them are due to the decentralized nature of these environments and the lack of central authorities. The fast emergence and the open nature of P2P applications, make appearing new attacks, so it is extremely important to study them and develop new counter measurements. Furthermore, existing studies focus on attacks that disrupt the overlay functioning and does not take in account their impact on ISPs (Internet Service Provider) infrastructure. In this paper, we present the Topology Change Attack [Abdelouahab et al. 2008] that harms the underlying networks (ISPs infrastructure) by unbalancing the P2P workload repartition. In order to evaluate and validate the TCA impact, we developed a new cycle-based simulator which simulates eDonkey clients hosted on different ISPs. The obtained results are very interesting and show the increasing of inter-ISPs traffic when a Topology Change Attack is conducted.
APA, Harvard, Vancouver, ISO, and other styles
33

Rubasinghe, Iresha Dilhani. "Transaction Verification Model for Peer-to-Peer Service-Oriented Digital Currency Transactions Based on the Foundation of Blockchain Architecture." ABC Research Alert 4, no. 3 (2016): Lanka. http://dx.doi.org/10.18034/ra.v4i3.306.

Full text
Abstract:
Digital payment systems are an evolving field in present day with the recent enhancements in seamless digital currencies. Thus, despite the benefits of cryptocurrency based digital payments systems, their adoption and diffusion within general payment platform domain are significantly hindered. Blockchain architecture is widely recognized as a promising mechanism to support the management of cryptocurrency related transactions. However, ensuring the security of digital payment transactions is a challenging task due to various security threats and existing prevention mechanisms that are either computationally expensive or domain dependent. Among many, the Man-in-the-Middle attack and Double Spending are identified as key security vulnerabilities. The purpose of this study is to investigate the means of addressing the said security issues by proposing a feasible transaction verification methodology; targeting a common payment platform that integrates different vendor based digital currencies together. The currency miners and the user applications are identified as the core components that cooperate with transactions. Accordingly, a scenario based transaction verification model is designed by considering transaction patterns among miners and user applications. The bitcoin-similar concept of ‘trust network’ is adopted in verifying transactions via building a trusted network among currency miners in the payment platform using digital signatures along with SHA-256 hashing and RSA algorithm. In strengthening the verification level, an approach of acknowledgements is defined associated with a minimum required level of probability. Furthermore, a time constraint is set depending on the peer-to-peer network conditions for a particular transaction to get completed with proper verification. It is explored the strength and feasibility of the proposed methodology in the perspective of transaction verification over man-in-the-middle attack using a probabilistic evaluation where the possibility of a transaction getting verified decreases proportionally when the trusted network of miners getting unhealthy. Also, the double spending prevention is evaluated using the implementation of a mobile-based digital wallet as the proof-of-concept.
APA, Harvard, Vancouver, ISO, and other styles
34

Danylov, Vitaliy. "PEER-TO-PEER AUDIO STREAMING USING THE TOR NETWORK: PROBLEMS, OPPORTUNITIES AND DEVELOPMENT PROSPECTS." Economics & Education 9, no. 1 (2024): 12–17. http://dx.doi.org/10.30525/2500-946x/2024-1-2.

Full text
Abstract:
This article analyses the potential and challenges associated with the implementation of audio streaming in the anonymous Tor network and the use of peer-to-peer (P2P) technologies. The main focus is on discussing the technical and conceptual issues that arise when integrating audio streaming services with the Tor network, including delays, limited bandwidth and other limitations that affect audio quality. The aim of the study is to find practical solutions to the problem of anonymous audio streaming using Tor technologies or other means to preserve anonymity. By analysing different approaches and tools, it becomes apparent that peer-to-peer broadcasting offers a flexible solution that allows audio to be transmitted over P2P networks, reducing the load on individual nodes and optimising bandwidth usage. This solution offers opportunities for scalability, fault tolerance, bandwidth optimisation and latency reduction, making it an attractive option for audio streaming setups. Meanwhile, the Utopia ecosystem, with its decentralised structure and high level of privacy protection, is another potential solution. Not only does it allow bypassing censorship and firewalls, but it also ensures anonymity in communication and data exchange. With its built-in audio and video communication tools, as well as the ability to create private channels and share files, Utopia can become a reliable platform for streaming audio. Thus, based on the analysis, the solution to the problem of anonymous audio streaming may lie in the integration of technologies such as Peercasting and Utopia, which provide not only the technical capability for streaming, but also a high level of privacy protection for users. It is also important to consider the flexibility of these solutions and the ability to adapt to the specifics of anonymous networks and user requirements. The practical significance of the study of audio streaming over Tor using P2P technologies is to develop methods to increase the anonymity and security of audio communications, which is critical in the face of growing threats to privacy on the Internet. This allows to overcome censorship and Internet restrictions in repressive regimes, providing users with freedom of thought and access to information.
APA, Harvard, Vancouver, ISO, and other styles
35

Wang, Feng, and Chunqing Xuan. "A High-Feasibility Secure Routing against Malicious Peer in Structured P2P." Mathematical Problems in Engineering 2022 (September 28, 2022): 1–6. http://dx.doi.org/10.1155/2022/5293083.

Full text
Abstract:
As applications based on the structured peer-to-peer network have increased, the importance of security is increasing. Routing is the core of the structured peer-to-peer network, naturally which becomes the primary target of malicious nodes. The current attacks on the routing by malicious nodes are mainly sybil attacks, eclipse attacks, and routing table poisoning. In previous studies of defending above attacks, either adding redundancy to achieve security or sacrificing network scalability for security. So we establish a mathematical model of the routing process, and through the model, we analyze sybil attacks, eclipse attacks, and routing table poisoning. The same essence is found that these attacks all undermine the original convergence of the query path, and with the convergence detection, we propose the security mechanism HFS-Routing, and we design experiments and analyze the results. The results show that HFS-Routing has a lower overhead, better scalability, and higher detection rates for the malicious nodes, which is a highly feasibility mechanism.
APA, Harvard, Vancouver, ISO, and other styles
36

Liu, Cai Bin, Guo Hui Wu, Le He, and Xiao Wei Wang. "Study and Application on Wireless Sensor Networks in Counterterrorism Operations." Advanced Materials Research 926-930 (May 2014): 2102–5. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2102.

Full text
Abstract:
Research and application on wireless sensor networks in the future counterterrorism operations, including the target perception network, target guiding network, combat command control and the fire control network. Access to information and knowledge through the wireless sensor networks. Counterterrorism capacity can be upgraded, and precision strike over the horizon can be realized. The networks change the classical counterterrorism operations, reconnaissance and security mode. Qualnet simulation results show that packets loss rate of wireless sensor networks is small, and the peer to peer delay is short. The networks is suitable for counterterrorism operations environment.
APA, Harvard, Vancouver, ISO, and other styles
37

Montakhabi, Mehdi, Fairouz Zobiri, Shenja van der Graaf, et al. "An Ecosystem View of Peer-to-Peer Electricity Trading: Scenario Building by Business Model Matrix to Identify New Roles." Energies 14, no. 15 (2021): 4438. http://dx.doi.org/10.3390/en14154438.

Full text
Abstract:
This article introduces new roles in future peer-to-peer electricity trading markets. Following a qualitative approach, firstly, the value network of the current electricity market is presented. To do so, service streams, critical roles, activities, and their setting in the electricity market are identified. Secondly, in order to identify the main sources of uncertainty, the business model matrix framework is utilized to analyze peer-to-peer electricity trading. Thirdly, four future scenarios are built based on user involvement and customer ownership. The outcome of the scenario building is the emergence of new roles, brokers, and representatives in the future peer-to-peer electricity markets. Fourth, based on the four future scenarios, changes in the value network, new roles, and emerging/evolving activities are identified. Finally, the two new roles are discussed from grid structure, security and privacy, legal, and data protection perspectives. The data is gathered by conducting semi-structured interviews with stakeholders in the current electricity market as well as potential disruptors. This article elaborates on the configuration of the value network in the electricity market and highlights the changes that peer-to-peer trading imposes to the status quo. Through the outcomes of the value network analysis, it assists policy makers to consider the requirements and current market players to reconsider their business models.
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, Vinod, Amit Asthana, and Gaurav Tripathi. "Enhancing Data Security in IOT-based UAV Networks through Blockchain Integration." Engineering, Technology & Applied Science Research 15, no. 2 (2025): 21800–21804. https://doi.org/10.48084/etasr.9922.

Full text
Abstract:
There is great potential for utilizing Unmanned Aerial Vehicle (UAV) networks for commercial, military, and civil purposes. Therefore, as network volumes increase, communicating within UAV networks poses serious cybersecurity issues. Integrating Blockchain with UAV communication networks can offer a scalable and secure communication method. The proposed approach to a protected and accessible interaction method for peer-to-peer UAV networks integrates blockchain technology, allowing safe, decentralized, and cooperative communication between several entities. This study presents a new consensus-building technique to protect UAV network communications, integrating public key cryptography with blockchain Elliptic Curve Diffie-Hellman (ECDH) using the Secure Hash Algorithm (SHA) to preserve data integrity and secure key exchange to provide confidentiality.
APA, Harvard, Vancouver, ISO, and other styles
39

Merlec, Mpyana Mwamba, and Hoh Peter In. "DataMesh+: A Blockchain-Powered Peer-to-Peer Data Exchange Model for Self-Sovereign Data Marketplaces." Sensors 24, no. 6 (2024): 1896. http://dx.doi.org/10.3390/s24061896.

Full text
Abstract:
In contemporary data-driven economies, data has become a valuable digital asset that is eligible for trading and monetization. Peer-to-peer (P2P) marketplaces play a crucial role in establishing direct connections between data providers and consumers. However, traditional data marketplaces exhibit inadequacies. Functioning as centralized platforms, they suffer from issues such as insufficient trust, transparency, fairness, accountability, and security. Moreover, users lack consent and ownership control over their data. To address these issues, we propose DataMesh+, an innovative blockchain-powered, decentralized P2P data exchange model for self-sovereign data marketplaces. This user-centric decentralized approach leverages blockchain-based smart contracts to enable fair, transparent, reliable, and secure data trading marketplaces, empowering users to retain full sovereignty and control over their data. In this article, we describe the design and implementation of our approach, which was developed to demonstrate its feasibility. We evaluated the model’s acceptability and reliability through experimental testing and validation. Furthermore, we assessed the security and performance in terms of smart contract deployment and transaction execution costs, as well as the blockchain and storage network performance.
APA, Harvard, Vancouver, ISO, and other styles
40

Wu, Honghu, Xiangrong Zhu, and Wei Hu. "A Blockchain System for Clustered Federated Learning with Peer-to-Peer Knowledge Transfer." Proceedings of the VLDB Endowment 17, no. 5 (2024): 966–79. http://dx.doi.org/10.14778/3641204.3641208.

Full text
Abstract:
Federated Learning (FL) is a novel distributed, privacy-preserving machine learning paradigm. Conventional FL suffers from drawbacks such as single point of failure and client drift. Blockchain is a distributed computing architecture famous for decentralization, transparency, and traceability. Incorporating blockchain as the underlying basis for FL decentralizes the FL process and brings opportunities to resolve the drawbacks. However, there still remain challenges to fulfilling FL with blockchain, regarding effectiveness, efficiency, and security. In this paper, we propose a new blockchain system for FL, called FedChain. To mitigate client drift and accelerate training, we present a clustered semi-asynchronous method for model aggregation. To optimize the local training in FL, we introduce a knowledge transfer method using other clients on the peer-to-peer network of blockchain. Moreover, we implement an access control mechanism to store and transmit models safely and efficiently. Extensive experiments on various benchmark datasets show that FedChain achieves superior results in accuracy, convergence, throughput, and latency.
APA, Harvard, Vancouver, ISO, and other styles
41

Muhammad, Qasim Habib, Usman Shoukat Muhammad, Irfan Muhammad, et al. "Smart Meter Development Using Digital Twin Technology for Green Energy Distribution Optimization." European Journal of Theoretical and Applied Sciences 1, no. 3 (2023): 181–90. https://doi.org/10.59324/ejtas.2023.1(3).20.

Full text
Abstract:
This study proposes a digital twin (DT) approach and technical framework for smart meters to solve potential implementation and development problems and adapt to the new energy revolution trend and increase smart grid network security. DT models were deployed in the cloud and edge using a smart meter DT demonstration system. This paper evaluates the DT system&#39;s communication performance in real-time smart grid application through three dimensions: remote application service for smart grid user side, P2P transaction on the user side, and user real-time request service. This study&#39;s container-based decision tree strategy for smart meters meets the smart grid&#39;s real-time communication requirements for user-side applications.
APA, Harvard, Vancouver, ISO, and other styles
42

Noor, Zuraidin Mohd Safar, Abdullah Noryusliza, Kamaludin Hazalila, Abd Ishak Suhaimi, and Rizal Mohd Isa Mohd. "Characterising and detection of botnet in P2P network for UDP protocol." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 3 (2020): 1584–95. https://doi.org/10.11591/ijeecs.v18.i3.pp1584-1595.

Full text
Abstract:
Developments in computer networking have raised concerns of the associated Botnets threat to the Internet security. Botnet is an inter-connected computers or nodes that infected with malicious software and being controlled as a group without any permission of the computer&rsquo;s owner. This paper explores how network traffic characterising can be used for identification of botnet at local networks. To analyse the characteristic, behaviour or pattern of the botnet in the network traffic, a proper network analysing tools is needed. Several network analysis tools available today are used for the analysis process of the network traffic. In the analysis phase, the botnet detection strategy based on the signature and DNS anomaly approach are selected to identify the behaviour and the characteristic of the botnet. In anomaly approach most of the behavioural and characteristic identification of the botnet is done by comparing between the normal and anomalous traffic. The main focus of the network analysis is studied on UDP protocol network traffic. Based on the analysis of the network traffic, the following anomalies are identified, anomalous DNS packet request, the NetBIOS attack, anomalous DNS MX query, DNS amplification attack and UDP flood attack. This study, identify significant Botnet characteristic in local network traffic for UDP network as additional approach for Botnet detection mechanism.
APA, Harvard, Vancouver, ISO, and other styles
43

Krentsin, Mykhailo, and Leonid Kupershtein. "NFC TECHNOLOGY AS A MEANS OF PROTECTED EXCHANGE OF IDENTIFICATION DATA BETWEEN PEER-TO-PEER NETWORK NODES." Cybersecurity: Education, Science, Technique 1, no. 25 (2024): 79–88. http://dx.doi.org/10.28925/2663-4023.2024.25.7988.

Full text
Abstract:
The last decade has changed the trends of using peering networks. One of the areas of use of P2P networks is communication between people. Today, it is very important that communication is as protected as possible, especially if it is carried out between employees of the enterprise, because the number of cyber threats is constantly increasing. Modern approaches to the security of peering networks consist of data encryption, node authentication, detection and prevention of malicious nodes, access restriction, traffic monitoring, etc. However, one of the very first steps is the exchange of identification data itself, and this process must be as secure and secure as possible. The article proposes a method of secure exchange of identification data between peering network nodes, based on the use of NFC technology in combination with proof of zero knowledge. NFC is used for direct data exchange over the radio interface, which, thanks to its short range, makes it impossible to intercept data. To establish a connection, nodes must exchange identifiers, public encryption keys, and network addresses. In order to find out whether a node is not malicious, mutual verification of nodes using zero-knowledge proof is assumed. A unique identifier of the GUID type generated by each of the nodes acts as a secret that is not disclosed. Nodes first exchange public keys that encrypt and exchange identifiers. After decryption with their private keys, the nodes check whether the received value is equal to the initial one. In case of equality of values, the nodes are mutually verified and exchange identification data. The method proposed in the article is aimed at ensuring fault tolerance and confidentiality. It also provides protection against traffic interception attacks and the reliability of the verification process.
APA, Harvard, Vancouver, ISO, and other styles
44

Gehlen, Guido, Fahad Aijaz, Yi Zhu, and Bernhard Walke. "Mobile P2P Web Services Using SIP." Mobile Information Systems 3, no. 3-4 (2007): 165–85. http://dx.doi.org/10.1155/2007/427831.

Full text
Abstract:
Telecommunication networks and the Internet are growing together. Peer-to-Peer (P2P) services which are originally offered by network providers, like telephony and messaging, are provided through VoIP and Instant Messaging (IM) by Internet service providers, too. The IP Multimedia Subsystem (IMS) is the answer of the telecommunication industry to this trend and aims at providing Internet P2P and multimedia services controlled by the network operators. The IMS provides mobility and session management as well as message routing, security, and billing.
APA, Harvard, Vancouver, ISO, and other styles
45

Al-Enizi, Ziad Kh, and Muawya Naser. "The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–10. http://dx.doi.org/10.4018/ijcwt.311419.

Full text
Abstract:
To provide a path to the copyright holders for filing a lawsuit against the infringers and violators through a legitimate process and applying the law that applies to that particular situation that keeps a balance between the peer-to-peer network technology and copyright holders this research has presented four different law strategies that can reduce the violation of the rights of the intellectual properties on national and international bases and advance the P2P network file-sharing procedure. The authors include the incorporation of the proper law for any illegal activity regarding copyrights via peer-to-peer networks on national and international bases with modification in the security system of file-sharing. It caters to the filing of the case for the violation of any copywritten works regardless of where the cases have happened, and the law should be standard for all the intellectual properties and is acceptable by other countries as well.
APA, Harvard, Vancouver, ISO, and other styles
46

Goncalves, Brian, and Atefeh Mashatan. "On the Security of the Dandelion Protocol." Mathematics 10, no. 7 (2022): 1054. http://dx.doi.org/10.3390/math10071054.

Full text
Abstract:
In this paper, we review the peer-to-peer blockchain transaction protocol, Dandelion, and develop an oracle-based model for its network and security. We formalize a series of security and functional criteria, such as unforgeability, non-repudiation, and immutability, into security experiments. In our model, we consider a quantum-capable adversary who seeks to undermine any of the security criteria while using oracles to simulate and interact with the Dandelion network. We then prove the security of Dandelion in our model with a series of (tight) security reductions as our main result. In addition, we prove that Dandelion is resistant to double-spending attacks.
APA, Harvard, Vancouver, ISO, and other styles
47

Wang, Chunzhi, Huili Zhang, and Zhiwei Ye. "A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm." International Journal of Wavelets, Multiresolution and Information Processing 13, no. 06 (2015): 1550048. http://dx.doi.org/10.1142/s0219691315500484.

Full text
Abstract:
With the rapid development of network, the peer-to-peer (P2P) traffic has become one of the most important traffics on the Internet; meanwhile, it also brings many security problems to the network management. Thus, nowadays, P2P traffic identification is the hottest topic of P2P traffic management. Much effort has been made on this topic, however, effectiveness remains an issue and the classification performance needs to be further improved. Support vector machine (SVM) has advantages with resolving small samples and high dimension for P2P classification problems. However, the performance of SVM is largely dependent on its kernel and parameters. The traditional kernels are hard to map complicated function with high precision and the traditional parameters tuning methods are of low efficiency and difficult to obtain good parameters. As wavelet kernel function is able to approximate a function with high precision and Particle Swarm Optimization algorithm could tune the optimal parameters for SVM. Hence, in the paper, a novel SVM method based on wavelet kernel and particle swarm optimization algorithm (PSO) is proposed for P2P identification. First, the proposed approach tunes the best parameters for SVM with PSO on training data. Subsequently, the wavelet SVM configured with the best parameters is conducted to identify P2P traffic. Experimental results on campus traffic traces indicate that the proposed method is able to identify popular P2P applications with very high accuracy.
APA, Harvard, Vancouver, ISO, and other styles
48

M., Supriya. "A SECURE PAYMENT SYSTEM FOR BANKING TRANSACTIONS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 10 (2017): 278–83. https://doi.org/10.5281/zenodo.1012480.

Full text
Abstract:
Anonymity has received increasing attention within the literature attributable to the users’ awareness of their privacy these days. anonymity provides protection for users to get pleasure from network services while not being copied. whereas anonymity-related problems are extensively studied in payment-based systems like e-cash and peer-to-peer (P2P) systems, very little effort has been dedicated to wireless mesh networks (WMNs). On the opposite hand, the network authority needs conditional anonymity such misbehaving entities within the network stay traceable.Here, we have a tendency to propose a security design to make sure unconditional anonymity for honest users and traceability of misbehaving users for network authorities in WMNs. The projected design strives to resolve the conflicts between the anonymity and traceability objectives, additionally to guaranteeing basic security needs as well as authentication, confidentiality, information integrity, and non-repudiation. Thorough analysis on security and potency is incorporated, demonstrating the feasibleness and effectiveness of the projected design<em>.</em>
APA, Harvard, Vancouver, ISO, and other styles
49

kumar, Abhinav. "IOT Security with Blockchain." YMER Digital 20, no. 11 (2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.

Full text
Abstract:
Internet of Things (IoT) plays a very vital role in almost every field of technology. Its key elements of security are very much crucial elements which are to be maintained as it is used universally. Traditional security and privacy methods be likely to be inapplicable for IoT, mainly due to its distributed network topology and the supply-constraints of most of its devices. For creating these concepts, a new technology called blockchain can be used. Blockchain that reinforce the crypto- currency Bitcoin have been just now used to provide security and privacy in peer-to-peer networks with similar topologies to IoT. In this paper, we present basic part of IoT enabled with blockchain, their distinctive features of both the technologies, their futuristic solutions for different real-world issues, different communicational standards etc. Both the technologies have several distinctive characteristics in every field, but certain limits too exist which gives futuristic path for research.
APA, Harvard, Vancouver, ISO, and other styles
50

Rajshree, Saxena*1 &. Dr. Raghav Mehra2. "A RESEARCH ON ROUTING PROTOCOLS AND SECURITY OF CHALLENGES IN MANETs." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 4, no. 6 (2017): 22–26. https://doi.org/10.5281/zenodo.583650.

Full text
Abstract:
The procession in the area of internet due to wireless networking technologies gives rise to multiple new applications. In the past few decades, we have found many advance developments in wireless networks. With these developments and large number of applications that are being provided by MANETs, we still face some challenges that have to be overcome. The baseless and active nature of these networks demand new set of networking schemes that should be implemented to provide effective peer-to-peer communication. MANETs hire traditional TCP/IP structure to provide this peer-to-peer communication between nodes in the network. An important interesting research area in MANET is “Routing”. This Routing is not only a very challenging task but also has received a rattling amount of attention from researches. Because of lack of a defined central authority, security of the routing process becomes a challenging task thereby leaving MANETs vulnerable to attempt, which results in declension in the performance as well as raises a serious question about the dependability of these such networks. In this paper, we are providing the history of MANET, challenges that are being involved in MANET and an overview of a spacious range of routing protocols proposed. We are also providing the known routing attacks and many of the proposed measures to these attacks in multiple works.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography