311 research outputs found

    2 P2P or Not 2 P2P?

    Full text link
    In the hope of stimulating discussion, we present a heuristic decision tree that designers can use to judge the likely suitability of a P2P architecture for their applications. It is based on the characteristics of a wide range of P2P systems from the literature, both proposed and deployed.Comment: 6 pages, 1 figur

    Detection and Optimization of SYBIL Attack by using Received Signal Strength in mobile Ad-HOC Networks (MANET�S)

    Get PDF
    In this research paper, we address the Sybil attack in MANET. Most often the traditional measures against Sybil attack are not applicable in a MANET due to the differences in aims and architectures. The nodes in MANETs are mobile and limited in resources such as battery, bandwidth etc. Due to frequently changing topology it becomes expensive and impractical to authenticate communication and keep track of devices with a centralized server in such network. We proposed a framework which uses nodes attributes in order to judge their behavior. As Sybil nodes consumes data packet by providing wrong routing information repeatedly, we focus on the distinction of the node parameter value of Sybil node and legitimate node. This distinction is made on the basis of nodes attributes and by assigning fuzzy membership values to each node. For this we use fuzzy inference rule and Bezier curve as a tool. Here suspect any node means is to identify those nodes also whose behavior lie in between legitimate and Sybil nodes. In contrast to the traditional crisp logic in which a node can be either Sybil or legitimate fuzzy inference based model focus on the possibility of a node being Sybil. Later we verify their RSP values by drawing a Bezier curve at two different instant of time to identify the Sybil character

    Heuritic Trust in IoT

    Get PDF

    Interconnecting DSpace and LOCKSS

    Get PDF
    Repository managers increasingly use toolkits such as DSpace to manage submission of and access to resources. However, DSpace does not support the highly desirable distributed replication functionality provided by LOCKSS. This paper describes an experiment to seamlessly interconnect DSpace and LOCKSS in a generalisable manner. An experimental prototype confirms that this is indeed possible, and that the interoperation can be efficient within the constraints of the systems
    corecore