Secure Shell Transfer Through Malicious Nodes From Peer to Peer

Download Now
Provided by: International Journals of Advanced Information Science and Technology (IJAIST)
Topic: Security
Format: PDF
The locality of peer to peer communications offers more and more cruel attack in entirely different ways. In existing system minimize the attacks in such communities is to use community based reputations which help to estimate the honesty of peers. It collects the feedback from other peers on the network to improve the fedility. The proposed system presents the peer system creates a secure structure of file based on IP address of transmitter and receiver and then transmits to another peer. The secured transmitted file is only opened by the beneficiary peer and this structure safeguards the file from intruders and hackers.
Download Now

Find By Topic