0.9K Views Research reports
A P2P network can be an ad hoc connection- a couple of computers connected via a Universal Serial Bus to transfer files. And these networks are vulnerable to peers. The traditional security techniques are insufficient for P2P networks as they are insecure by their very nature. There’s no centralized server controlling access to shared resources in a P2P network which have unique challenges including identity management of the peers, secure reputation data management, Sybil attacks, and above all, availability of reputation data. The future actions are predicted where peers are encapsulated in its digital reputation, based on the past behaviour of the peer.Thus a peer’s reputation allows it to cooperate and prevent from malicious activities. The cryptographic protocol is coupled with selfcertification and cryptographic mechanisms for identity management and countering Sybil attack.
Fueled by the recent advancements in pervasive environment, affluent context aware systems is among the rousing in computing today, including embedded environment, different wirele...
In the running of the internet world, ecommerce industry has its own benchmark in terms of its rapid growth and has made itself an established sector that is indispensable for ever...
Vehicular adhoc structures (vanets) handle the public key infrastructure (pki) and certificate revocation lists (crls) for their security. in any pki structure, the check of a got ...
This paper centers around how innovations adds to enhancing interoperability between iot gadgets, and making effectively utilization of iot gadgets. the proposed stage innovation g...
Views: 1.6K
Views: 1.5K
Views: 1.3K
Views: 1.2K