[1]苏 扬,张 琦,唐善成.改进Kademlia协议的P2P网络资源发现算法[J].西安科技大学学报,2020,(03):464-469.[doi:10.13800/j.cnki.xakjdxxb.2020.0312]
 SU Yang,ZHANG Qi,TANG Shan-cheng.Resource discovery algorithm in P2P networks based on improved Kademlia protocol[J].Journal of Xi'an University of Science and Technology,2020,(03):464-469.[doi:10.13800/j.cnki.xakjdxxb.2020.0312]
点击复制

改进Kademlia协议的P2P网络资源发现算法(/HTML)
分享到:

西安科技大学学报[ISSN:1672-9315/CN:61-1434/N]

卷:
期数:
2020年03期
页码:
464-469
栏目:
出版日期:
2020-05-15

文章信息/Info

Title:
Resource discovery algorithm in P2P networks based on improved Kademlia protocol
文章编号:
1672-9315(2020)03-0464-06
作者:
苏 扬张 琦唐善成
(西安科技大学 通信与信息工程学院,陕西 西安 710054)
Author(s):
SU YangZHANG QiTANG Shan-cheng
(College of Communication and Information Engineering,Xi'an University of Science and Technology,Xi'an 710054,China)
关键词:
P2P网路 Kademlia协议 分布式哈希表 资源定位 动态修改节点ID
Keywords:
P2P network Kademlia protocol distributed hash routing table resource location dynamic modification of node ID
分类号:
TP 393
DOI:
10.13800/j.cnki.xakjdxxb.2020.0312
文献标志码:
A
摘要:
标准Kademlia协议在P2P网络内容监控中获取资源信息时,存在搜索效率低下、全面性不佳等问题,据此提出一种采用改进Kademlia协议的P2P网络资源发现算法。该算法在分布式哈希路由表的基础上实现一个可动态修改自身ID的自定义P2P节点,改进Kademlia协议通过自定义P2P节点被其他节点记录在路由表中的位置来提高节点收到资源搜索消息的数量,高效获取P2P网络中传输的资源搜索与下载消息。实验对比表明:和标准Kademlia协议相比,采用改进Kademlia协议的资源发现算法进一步提高了单位时间内发现资源搜索与下载消息的数量,能找到更多P2P网络中传输的资源及正在搜索或下载这些资源的节点。从而实现P2P网络监控中对资源进行有效定位和发现的目的。
Abstract:
There exist such problems as low search efficiency and lack of completeness in getting resource information for P2P network content monitor when using standard Kademlia protocol.A P2P resource discovery algorithm based on improved Kademlia protocol is proposed in this paper.Based on distributed hash routing table,it is possible forthe proposed resource discovery algorithmtoestablishe a customized P2P node that can dynamically modify its own ID.Therefore the improved Kademlia protocol can receive more resource searching and downloading messages through recording the customized node in other P2P node's routing table.The test results show that the resource discovery algorithm employing improved Kademlia protocol enlarges the number of messages for resource searching and downloading in specified time.It also shows that the algorithm can find more nodes that are seeking or downloading the monitored network content,which achieves the aim of effective resource location and discovery in P2P network monitoring.

参考文献/References:

[1] 孔德宝.P2P关键技术研究与基于Kademlia协议的文件共享系统实现[D].成都:西南交通大学,2009. KONG De-bao.Research of P2P key technology and implementation of file-sharing system based on Kadernlia[D].Chengdu:Southwest Jiaotong University,2009. [2]燕 波,胡玉岩.浅谈P2P技术发展对网络安全及取证工作带来的影响及对策[J].通讯世界,2018,342(11):18-19. YAN Bo,HU Yu-yan.Talking about the influence of P2P technology development on network security and forensics work and countermeasures[J].Telecom World,2018,342(11):18-19. [3]侯珊美.P2P网络服务提供商版权间接侵权问题研究[D].重庆:西南大学,2011. HOU Shan-mei.On the indirect liability of copyright infringement of P2P service providers[D].Chongqing:Southwest University,2011. [4]马立志.P2P网络安全性分析及对策研究[J].电脑知识与技术,2007,3(15):653-678. MA Li-zhi.Analysis and countermeasures P2P network security[J].Computer Knowledge and Technology,2007,3(15):653-678. [5]韩祺祎.P2P网络监控与信任安全机制研究[D].成都:电子科技大学,2016. HAN Qi-yi.Research on the security mechanism of P2P networking monitoring and trust model[D].Chengdu:University of Electronic Science and Technology of China,2016. [6]Gupta M,Judge P,Ammar M.A reputation system for peer-to-peer networks[C]//Proceedings of the 13th International Workshop on Network & Operating System Support for Digital Video & Audio.New York:ACM Press,2003:144-152. [7]Stutzbach D,Rejaie R.Improving lookup performance over a widely-deployed DHT[C]//25TH IEEE International Conference on Computer Communications.New York:IEEE,2006:1-12. [8]Maymounkov P,Mazièes D.Kademlia:a peer-to-peer information system based on the XOR metric[C]//Revised Papers from the First International Workshop on Peer-to-peer Systems,2002:53-65. [9]Pouwelse J A,Grbacki P,Eema D H J,et al.The bittorrent P2P file-sharing system:measurements and analysis[J].Lecture Notes in Computer Science,2005,3640:205-216. [10]潘家毅.基于测量的Kad网络的研究[D].北京:北京交通大学,2008. PAN Jia-yi.Measure-based research of Kad network[D].Beijing:Beijing Jiaotong University,2008. [11]Androutsellis-Theotokis S,Spinellis D.A survey of peer-to-peer content distribution technologies[J].ACM Computing Surveys,2004,36(4):335-371. [12]Cholez T,Chrisment I,Festor O.Monitoring and controlling content access in KAD[C]// International Conference on Communications.New York:IEEE,2003:144-152. [13]Steiner M,En-Najjary T,Biersack E W.Exploiting KAD possible uses and misuses[J].Computer Communication Review,2007,37(5):65-70. [14]张 涛.P2P内容监管中的关键技术研究[D].北京:北京工业大学,2014. ZHANG Tao.Research on key technologies in P2P content censorship[D].Beijing:Beijing University of Technology,2014. [15]余 杰.P2P网络测量与安全关键技术研究[D].长沙:国防科学技术大学,2010. YU Jie.Research on measurement and security of P2P networks[D].Changsha:National University of Defense Technology,2010. [16]刘祥涛,龚才春,刘 悦,等.Kad网络节点资源探测分析[J].中文信息学报,2010,24(6):85-91. LIU Xiang-tao,GUN Cai-chun,LIU Yue,et al.Peer resource measurement and analysis in Kad network[J].Journal of Chinese Information Processing,2010,24(6):85-91. [17]严 鹤.Kademlia DHT网络活跃节点的测量与应用研究[D].武汉:华中科技大学,2014. YAN He.Measurement and application of Kademlia DHT highly available peers[D].Wuhan:Huazhong University of Science and Technology,2014. [18]Lum V Y,Shu N C,Housel B C,et al.A general methodology for data conversion and restructuring[J].IBM Journal of Research & Development,1976,20(5):483-497. [19]丁艳艳,万振凯.基于对等网络的Kademlia搜索策略的研究[J].仪器仪表用户,2007(6):24-25. DING Yan-yan,WAN Zhen-kai.A research about Kademlia searching mode based on peer-to-peer network[J].Electronic Instrumentation Customer,2007(6):24-25. [20]陶耀东,向中希.基于改进Kademlia协议的分布式爬虫[J].计算机系统应用,2016,25(4):156-161. TAO Yao-dong,XIANG Zhong-xi.Distributed crawler based on the improved Kademlia protocol[J].Computer Systems & Applications,2016,25(4):156-161. [21]周 皓.基于DHT的P2P文件共享技术的研究与应用[D].武汉:武汉理工大学,2009. ZHOU Hao.Research and application of DHT-Based P2P[D].Wuhan:Wuhan University of Technology,2009. [22]陈 晗,施 勇,薛 质.P2P网络资源传播模型分析及监测[J].信息安全与通信保密,2011(5):56-58. CHEN Han,SHI Yong,XUE Zhi.Analysis and supervision of P2P network resource diffusion model[J].Information Security and Communications Privacy,2011(5):56-58. [23]宿兴华.基于P2P的视频下载系统的设计与实现[D].杭州:浙江大学,2007. SU Xing-hua.Study and practice of video download system based on P2P[D].Hangzhou:Zhejiang University,2007. [24]杨 楠.基于Kademlia的P2P网络资源定位模型改进[D].武汉:湖北工业大学,2010. YANG Nan.Improving the P2P resource locating methods based on Kademlia[D].Wuhan:Hubei University of Technology,2010. [25]彭祥帅.基于Kademlia协议的资源定位改进模型[D].大连:大连海事大学,2016. PENG Xiang-shuai.An improved Kademlia-based resource locating model[D].Dalian:Dalian Maritime University,2016. [26]Carra D,Steiner M,Michiardi P,et.al.Characterization and management of popular content in KAD[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(4):662-671.

备注/Memo

备注/Memo:
收稿日期:2019-11-21 责任编辑:高 佳
基金项目:国家重点基础研究发展计划(973计划)(2018YFC0808300)
通信作者:苏 扬(1972- ),男,四川达州人,博士,副教授,E-mail:suyang@xust.edu.cn
更新日期/Last Update: 2020-05-15