Author:
Li Gengxian,Wang Chundong,Wang Huaibin
Abstract
Decentralized networks bring us many benefits, but as networks evolve, many nodes either actively or passively become unreachable behind an NAT or a firewall. This has become a hindrance to the development of decentralized networks, where peer-to-peer communication data transfer between unreachable nodes cannot be accomplished, whether in decentralized file systems, decentralized social, or decentralized IoT. The existing scheme requires a series of centralized servers or requires network-wide flooding for consensus data, which can lead to the loss of decentralized nature of the network and cause flooding bottlenecks, contrary to the design concept of decentralization. In this paper, our proposed scheme uses a structured P2P overlay network to store the indexes of unreachable nodes in the whole network, so that the characteristics of a decentralized network are still maintained while ensuring the efficiency of lookup. When nodes communicate, the transmission channel is established so that both nodes continuously transmit data streams peer-to-peer without relying on the central server. Moreover, the scheme guarantees the security and privacy of nodes’ data transmission and the P2P overlay network without relying on centralized trusted institutions. Finally, we deploy a real cluster environment to verify the effectiveness of each module at different network sizes and prove the overall feasibility of the scheme. The scheme has certain advantages over existing solutions in terms of security, privacy, communication efficiency, device democracy, etc.
Subject
Computer Networks and Communications
Reference56 articles.
1. A brief history of the internet
2. The history, present and future with IoT;Sharma,2019
3. Impact of Cyber-attacks on EV Charging Coordination: The Case of Single Point of Failure;Gumrukcu;Proceedings of the 2022 4th Global Power, Energy and Communication Conference (GPECOM),2020
4. Does certificate transparency break the web? Measuring adoption and error rate;Stark;Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP),2019
5. Certificate transparency in the wild: Exploring the reliability of monitors;Li;Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,2019
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献