Survey on Peer to Peer Network Security

Abstract

Recently, peer-to-peer (P2P) networks gained popularity in the area of file sharing applications. Along with this popularity there are many security problems and vulnerabilities. In this paper, we inspect the base on which most P2P networks are built, and from this, we see how attacks on P2P networks leverage the very essence of the networks itself: decentralization of resources and of control. Additionally, we look at the privacy and usage attacks that arise in P2P networks as well as approaches that can be used address some of these issues.[1] There would also be a discussion about multicasting, which is used to enhance the security of the network.

Authors and Affiliations

M. L. Soundarya, Sethu Bindu P

Keywords

Related Articles

Neuro-Fuzzy Modeling of Design Parameters of Connecting Rod

Finite element analysis is frequently used for the simulation of complex shaped mechanical systems, under the complicated loading conditions; however, it is usually time consuming and difficult for the parametric design...

Suggestion Based Outfit Selection Using Skin Tone Detection in Augmented Reality.

Clothing is a necessity. Ancient humans used animal skin to protect themselves against weather. But today clothing is not just related to functionality, it has transformed into an element of lifestyle, it defines who yo...

Impact of Fly Ash in Bituminous Mix

Bituminous mix Design is estimated to result in a mix which is sufficiently durable, strong, and to fatigue resistive and permanent deformation, at the same time eco friendly and economical. A mix maker tries to achieve...

Criminal Face Identification System

Criminal record generally contains personal informzation about particular person along with photograph. To identify any Criminal we need some identification regarding person, which are given by eyewitness. In most cases...

A Hybrid Approach for Data Encryption and Decryption

Cryptography is the art of achieving security by encoding messages to make them non-readable. It is the technique for hiding data and information from unauthorized users. When we send simple message from one location to...

Download PDF file
  • EP ID EP22051
  • DOI -
  • Views 204
  • Downloads 5

How To Cite

M. L. Soundarya, Sethu Bindu P (2016). Survey on Peer to Peer Network Security. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(4), -. https://europub.co.uk/articles/-A-22051