期刊文献+

A Mechanism Based on Reputation in P2P Networks to Counter Malicious Packet Dropping

A Mechanism Based on Reputation in P2P Networks to Counter Malicious Packet Dropping
原文传递
导出
摘要 In P2P (Peer-to-Peer) networks, some malicious peers can impact on overall networks performance. One of the malicious behaviors of these peers is malicious packet dropping. In this paper, our focus is to detect and to exclude peers that misbehave by dropping some or all packets. Here, we propose a reputation-based mechanism for solving the problem efficiently. The proposed mechanism uses both direct reputation information and indirect reputation information to compute comprehensive reputation of a peer. At the same time, history reputation information is also taken into account to provide faults tolerance capability and we regulate the imprecision based on the fact that the cause of packet dropping can be complex. Finally, the peers with bad comprehensive reputation can be detected easily and then will be excluded from the network. In this way, our proposed mechanism improves the per- formance of P2P networks without increasing computational overhead. In P2P (Peer-to-Peer) networks, some malicious peers can impact on overall networks performance. One of the malicious behaviors of these peers is malicious packet dropping. In this paper, our focus is to detect and to exclude peers that misbehave by dropping some or all packets. Here, we propose a reputation-based mechanism for solving the problem efficiently. The proposed mechanism uses both direct reputation information and indirect reputation information to compute comprehensive reputation of a peer. At the same time, history reputation information is also taken into account to provide faults tolerance capability and we regulate the imprecision based on the fact that the cause of packet dropping can be complex. Finally, the peers with bad comprehensive reputation can be detected easily and then will be excluded from the network. In this way, our proposed mechanism improves the per- formance of P2P networks without increasing computational overhead.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期405-408,共4页 武汉大学学报(自然科学英文版)
基金 Supported by the National Key Basic Research Program of China (973 Program) (2010CB731403) the Opening Project of Key Laboratory of Information Network Security of Ministry of Public Security (C09607)
关键词 P2P (Peer-to-Peer) REPUTATION malicious peers packet dropping P2P (Peer-to-Peer) reputation malicious peers packet dropping
  • 相关文献

参考文献7

  • 1Bertino E, Ferrari E, Squicciarini A. Reputation-X: A peer-to-peer framework for reputation establishment [J]. IEEE Transaction on Knowledge and Data Engineering, 2004, 16(7): 827-842.
  • 2Song S, Hwang K, Zhou R, et al. Reputationed P2P transactions wizh fuzzy reputation aggregation[J]. IEEE lnternet Computing, 2005, 9(6): 24-34.
  • 3Seigneur J M, Jensen C D. Trading privacy for reputAtion[C]// Proc 2nd International Conf on Reputation Management (LNCS 2995). Oxford: Springer-Verlag, 2004: 93- 107.
  • 4Bradshaw R W, Holt J E, Seamons K E. Concealing complex policies with hidden credentials[C]//Proc 1 lth ACM Conf on Computer and Communications Security, New York: ACM Press, 2004: 146-157.
  • 5Miranda H, Rodrigues L. A framework to provide anonymity in reputation networks[C]//Proc 3rd Annual International Conf on Mobile and Ubiquitous networks: Networks and Services. San Jose: IEEE Press, 2006: 1-4.
  • 6Despotovic Z, Aberer K. P2P reputation management: Probabilistic estimation vs. social networks [J]. Computer Networks, 2006, 50(4): 485-500.
  • 7Lua E K, Crowcroft J, Pias M, et al. A survey and comparison of peer-to-peer overlay network mechanisms [J]. IEEE Communnications Survey and Tutorial, 2005, 7(2): 72-93.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部