Survey on Peer to Peer Network Security

Abstract

Recently, peer-to-peer (P2P) networks gained popularity in the area of file sharing applications. Along with this popularity there are many security problems and vulnerabilities. In this paper, we inspect the base on which most P2P networks are built, and from this, we see how attacks on P2P networks leverage the very essence of the networks itself: decentralization of resources and of control. Additionally, we look at the privacy and usage attacks that arise in P2P networks as well as approaches that can be used address some of these issues.[1] There would also be a discussion about multicasting, which is used to enhance the security of the network.

Authors and Affiliations

M. L. Soundarya, Sethu Bindu P

Keywords

Related Articles

DTMF Based Robot for Security Applications

The main idea is to implement microcontroller based application which can provide security like video monitoring, fire safety, bomb detection using metal detector and identifying nearby obstacles using ultrasonic sensor...

IIR filter design using CSA for DSP applications

In this paper, a design methodology to implement low-power and high-speed 2nd order recursive digital Infinite Impulse Response filter has been proposed. Existing IIR digital filters have a large number of constant mult...

Investigations on the Flexural Strength and the Effect of b/h and l/b ratio on the Carbon Fiber Reinforced Epoxy Laminated Composites

In present day the use of fiber reinforced composites is increased remarkably in the various sectors of industries owing to its relative advantages especially in industries like aeronotics, automobile, ship building and...

Application of Fuzzy Soft Set in Job Scheduling Problem

The concept fuzzy soft set, a new mathematical tool for dealing with ncertainty, which always possesses parametrization tools has potential applications in many different fields, including the decision making , game the...

A Comparative Study & Analysis of Image Restoration by Non Blind Technique

The process of retrieving and analyzing the pictorial information by a digital computer is known as digital image processing. Vision is the foremost trusted source of information compare to other human perceptions. And...

Download PDF file
  • EP ID EP22051
  • DOI -
  • Views 197
  • Downloads 5

How To Cite

M. L. Soundarya, Sethu Bindu P (2016). Survey on Peer to Peer Network Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(4), -. https://europub.co.uk/articles/-A-22051