On Routing in Distributed Hash Tables: Is Reputation a Shelter from Malicious Behavior and Churn?.
Marc Sánchez ArtigasPedro García LópezPublished in: Peer-to-Peer Computing (2009)
Keyphrases
- malicious behavior
- malicious nodes
- wireless sensor networks
- distributed hash tables
- network nodes
- distributed hash table
- peer to peer
- routing protocol
- ad hoc networks
- routing algorithm
- dynamic analysis
- network topologies
- routing problem
- peer to peer networks
- overlay network
- spectrum sensing
- shortest path
- peer to peer systems
- malicious code
- multimedia
- energy consumption
- data warehouse
- query processing