{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T04:15:17Z","timestamp":1744172117827,"version":"3.40.3"},"reference-count":21,"publisher":"Walter de Gruyter GmbH","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,9,1]]},"abstract":"<jats:title>Zusammenfassung<\/jats:title>\n               <jats:p>Mobile Ad-hoc-Netzwerke und verteilte Hash-Tabellen (DHT) besitzen \u00e4hnliche Eigenschaften in Bezug auf Selbstorganisation, Dezentralisierung, mangelnde Infrastruktur und die Notwendigkeit von Redundanz. Die hohe Knotenmobilit\u00e4t und die Dynamik des Netzwerks sind jedoch eine besondere Herausforderung f\u00fcr das Design und insbesondere f\u00fcr die Skalierbarkeit einer verteilten Hash-Tabelle in mobilen Ad-hoc-Netzwerken. In diesem Beitrag wird das Design einer mobilit\u00e4tsbewussten verteilten Hash-Tabelle (MHT) vorgestellt. MHT ist ein mobiles, skalierbares und strukturiertes Peer-to-Peer-System, das nur wenig Informationen \u00fcber die Umgebung eines Knotens im Netzwerk ben\u00f6tigt. Weiterhin werden Herausforderungen diskutiert, wie Churn, Lastverteilung und Sicherheit, die sich f\u00fcr den Einsatz einer MHT ergeben. Der besondere Schwerpunkt sind hierbei die Unterschiede, die sich zu Internet-basierten Systemen ergeben.<\/jats:p>","DOI":"10.1524\/itit.2007.49.5.298","type":"journal-article","created":{"date-parts":[[2007,9,27]],"date-time":"2007-09-27T11:48:20Z","timestamp":1190893700000},"page":"298-303","source":"Crossref","is-referenced-by-count":0,"title":["MHT: Eine mobilit\u00e4tsbewusste verteilte Hash-Tabelle (MHT: A mobility-aware Distributed Hash Table)"],"prefix":"10.1524","volume":"49","author":[{"given":"Olaf","family":"Landsiedel","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Heer","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[]}],"member":"374","published-online":{"date-parts":[[2009,9,25]]},"reference":[{"key":"p_1_110","doi-asserted-by":"crossref","unstructured":"M. Caesar, M. Castro, E. Nightingale, G. O'Shea, and A. Rowstron. Virtual Ring Routing: Network routing inspired by DHTs. In Proc. of ACM SIGCOMM, 2006.","DOI":"10.1145\/1159913.1159954"},{"key":"p_2_111","unstructured":"M. Castro, P. Druschel, Y. C. Hu, and A. Rowstron. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. of Int'l Conf. on Distributed Systems Platforms, 2001."},{"key":"p_3_112","doi-asserted-by":"crossref","unstructured":"J. R. Douceur. The Sybil attack. In Proc. of 1st Int'l Workshop on Peer-to-Peer Systems (IPTPS), 2002.","DOI":"10.1007\/3-540-45748-8_24"},{"key":"p_4_113","doi-asserted-by":"crossref","unstructured":"K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The Impact of DHT Routing Geometry on Resilience and Proximity. In Proc. of ACM SIGCOMM, 2003.","DOI":"10.1145\/863955.863998"},{"key":"p_5_114","unstructured":"I. Gruber, R. Schollmeier, and W. Kellerer. Performance Evaluation of the Mobile Peer-to-Peer Protocol. In Proc. of Int'l. Workshop on Global Peerto-Peer Computing, 2004."},{"key":"p_6_115","unstructured":"Y. C. Hu, H. Pucha, and S. M. Das. Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks. In Proc. of HotOS-IX: Workshop on Hot Topics in Operating Systems, 2004."},{"key":"p_7_116","unstructured":"D. B Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, vol. 353. Kluwer Publishers, 1996."},{"key":"p_8_117","doi-asserted-by":"crossref","unstructured":"O. Landsiedel, S. Gotz, and K. Wehrle. A Churn and Mobility Resistent Approach for DHTs. In Proc. of ACM Mobishare Workshop, Int'l Conf. on Mobile Computing and Networking (MobiCom), 2006.","DOI":"10.1145\/1161252.1161263"},{"key":"p_9_118","unstructured":"O. Landsiedel, S. Gotz, and K. Wehrle. Towards Scalable Mobility in Distributed Hash Tables. In Proc. of IEEE Int'l Conf. on Peer-to-Peer Computing (P2P), 2006."},{"key":"p_10_119","doi-asserted-by":"crossref","unstructured":"J. Liang, N. Naoumov, K. W. Ross. The Index Poisoning Attack in P2P File-Sharing Systems. In Proc. of IEEE Int'l Conf. on Computer Communication (InfoCom), 2006.","DOI":"10.1109\/INFOCOM.2006.232"},{"key":"p_11_120","doi-asserted-by":"crossref","unstructured":"J. Li, J. Stribling, T. M. Gil, R. Morris, and M. F. Kaashoek. Comparing the Performance of Distributed Hash Tables under Churn. In Proc. of Int'l Workshop on Peer-to-Peer Systems (IPTPS04), 2004.","DOI":"10.1007\/978-3-540-30183-7_9"},{"key":"p_12_121","doi-asserted-by":"crossref","unstructured":"C. Lindemann and O. Waldhorst. Exploiting Epidemic Data Dissemination for Consistent Lookup Operations in Mobile Applications. ACM Mobile Computing and Communication Review (MC2R), 2004.","DOI":"10.1145\/1031483.1031490"},{"key":"p_13_122","doi-asserted-by":"crossref","unstructured":"R. Mahajan, M. Castro, and A. Rowstron. Controlling the Cost of Reliability in Peer-to-Peer Overlays. In In Proc. of Int'l Workshop on Peer-to-Peer Systems (IPTPS), 2003.","DOI":"10.1007\/978-3-540-45172-3_2"},{"key":"p_14_123","unstructured":"H. Pucha, S. M. Das, and Y. C. Hu. Ekta: An Efficient DHT Substrate for Distributed Applications in Mobile Ad Hoc Networks. In Proc. of IEEE Workshop on Mobile Computing Systems and Applications, 2004."},{"key":"p_15_124","doi-asserted-by":"crossref","unstructured":"C. E. Perkins and E. M. Royer. Ad hoc On-Demand Distance Vector Routing. In Proc. of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), 1999.","DOI":"10.1109\/MCSA.1999.749281"},{"key":"p_16_125","doi-asserted-by":"crossref","unstructured":"S. Ratnasamy, P. Francis, M. Handley, and R. Karp. A scalable contentaddressable network. In Proc. of ACM SIGCOMM, 2001.","DOI":"10.1145\/383059.383072"},{"key":"p_17_126","doi-asserted-by":"crossref","unstructured":"S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu. GHT: A Geographic Hash Table for Data-Centric Storage in SensorNets. In Proc. of ACM Workshop on Wireless Sensor Networks and Applications (WSNA), 2002.","DOI":"10.1145\/570738.570750"},{"key":"p_18_127","doi-asserted-by":"crossref","unstructured":"A. Singh, T. W. Ngan, P. Druschel, D. S. Wallach. Eclipse Attacks on Overlay Networks: Threats and Defenses. In Proc. of IEEE Int'l Conf. on Computer Communication (InfoCom), 2006.","DOI":"10.1109\/INFOCOM.2006.231"},{"key":"p_19_128","doi-asserted-by":"crossref","unstructured":"I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-Peer Lookup Service for Internet applications. In Proc. of ACM SIGCOMM, 2001.","DOI":"10.1145\/383059.383071"},{"key":"p_20_129","doi-asserted-by":"crossref","unstructured":"R. Steinmetz and K. Wehrle, editors. Peer-to-Peer Systems and Applications. LNCS 3485. Springer Publishing, 2005.","DOI":"10.1007\/11530657"},{"key":"p_21_130","unstructured":"T. Zahn and J. Schiller. MADPastry: A DHT Substrate for Practicably Sized MANETs. In Proc. of Workshop on Applications and Services in Wireless Networks (ASWN), 2005. 1 2"}],"container-title":["it - Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/http\/www.degruyter.com\/view\/j\/itit.2007.49.issue-5\/itit.2007.49.5.298\/itit.2007.49.5.298.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.degruyter.com\/document\/doi\/10.1524\/itit.2007.49.5.298\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.degruyter.com\/document\/doi\/10.1524\/itit.2007.49.5.298\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,8]],"date-time":"2025-04-08T09:41:40Z","timestamp":1744105300000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.degruyterbrill.com\/document\/doi\/10.1524\/itit.2007.49.5.298\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,1]]},"references-count":21,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2009,9,25]]},"published-print":{"date-parts":[[2007,9,1]]}},"alternative-id":["10.1524\/itit.2007.49.5.298"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1524\/itit.2007.49.5.298","relation":{},"ISSN":["2196-7032","1611-2776"],"issn-type":[{"type":"electronic","value":"2196-7032"},{"type":"print","value":"1611-2776"}],"subject":[],"published":{"date-parts":[[2007,9,1]]}}}