International Journal of Advanced Research in Computer Engineering & Technology
In structured P2P systems, message deliverance can be done by identifying the peer IDs of the individual systems. The initiator has to decide the destination and can route the message through one or more hops. The message passes from one hop to another correctly by identifying the IP address and finally reaches the destination. In this paper, the authors propose an efficient routing strategy to control the routing path and to identify the malicious nodes. They also eliminate the drawbacks of encryption by introducing steganography in message deliverance.