Research Article
A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack
Table 2
Simulation parameters.
| Type | Parameters | Values |
| Simulation parameters | Network Size | Max 10000 | Churn generator | Multiple churn generators (no churn initially, Pareto churn for normal failure, and lifetime churn for intentional attack) | Mean node lifetime | For lifetime churn (churn attack) | 1600 s | 1300 s | 1000 s | 700 s | 400 s | For Pareto churn | 2,000 s |
| Common architecture parameters | Fix finger delay | 120 s | Stabilization delay | 60 s | Successor list size | 4 |
| Node distribution | Percentage of super peers | 5 | Percentage of regular peers | 95 | Percentage of malicious peers in regular peers for churn attack scenario only | 10 | 20 | 30 | 40 | 50 |
| Degree of m-child family tree | For basic proposed architecture | 2 | 4 | 6 |
|
|