Open Access Open Access  Restricted Access Subscription or Fee Access

Peer-to-Peer Security using Trust-based Mechanism

Hemanth Kumar, S. K. Swathi

Abstract


Peer-to-Peer (P2P) network is a type of network where files are exchanged directly between computers without the involvement of any central server interference. As this kind of network does not depend on any central authority, each node (computer) can take its own decisions. The problem with this network is the data exchanged among the nodes is not secured. A number of systems exist which assures security, but they are not enough. So, in order to fulfill the security requirements, a new system is proposed. The proposed design uses three approaches to deploying a new system; the first approach is measurements where each node is measured for latency, bottleneck bandwidth, and lifetime measurements. The second approach is truthfulness/similarity where it gives the detail of the node behavior, and finally, the third approach used in this new design is to calculate the trust value of the node. The combination of all these approaches in a hierarchical manner results in a secure node (in-turn network). This research can be further studied to analyze simulation and real time.

Keywords


Trust-Based Security, Eigen Trust, Peer-to-Peer Networks, Latency, Bottleneck Bandwidth

Full Text:

PDF

References


J. Chen, X. Guo and Z. Li, "Research on trust model in the mobile P2P network", 2017 4th International Conference on Information, Cybernetics and Computational Social Systems (ICCSS), 2017.

L. Yihe, "A P2P Security Model Based on Trust and Availability", 2009 International Conference on Communication Software and Networks, 2009.

J. Díaz-Verdejo, P. García-Teodoro and M. Soriano-Ibáñez, "Environmental Security in P2P Networks", 2009 First International Conference on Advances in P2P Systems, 2009.

R. Robles, M. Choi and E. Cho, "A Paradigm Solution to P2P Security Issues", 2009 International e-Conference on Advanced Science and Technology, 2009.

N. Chaudhary and J. Surolia, "A survey on peer to peer system applications", nternational Journal of Innovative Computer Science & Engineering, vol. 2, no. 1, 2014.

H. Li and J. Zhao, "Security Research on P2P Network", 2009 International Conference on Computational Intelligence and Software Engineering, 2009.

S. Saroiu, P. Gummadi and S. Gribble, “Measurement study of peer-to-peer file sharing systems ", Multimedia Computing and Networking 2002, 2001.

S. Kamvar, M. Schlosser and H. Garcia-Molina, "The Eigentrust algorithm or reputation management in P2P networks", Proceedings of the twelfth international conference on World Wide Web - WWW '03, 2003

Y. Wang and J. Vassileva, "Trust and reputation model in peer-to-peer networks", Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

E. Chien, "Malicious Threats of Peer-to-Peer Networking", 2018.

S. Li, W. Su and H. Li, "The Research of Security of P2P Network File Sharing System", 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, 2015.

F. Cornelli, E. Damiani, S. di Vimercati, S. Paraboschi and P. Samarati, "Choosing reputable servents in a P2P network", Proceedings of the eleventh international conference on World Wide Web - WWW '02, 2002.

Shala, P. Wacht, U. Trick, A. Lehmann, B. Ghita and S. Shiaeles, "Trust Integration for Security Optimisation in P2P-Based M2M Applications", 2017 IEEE Trustcom/BigDataSE/ICESS, 2017.

H. Li and J. Zhao, "Security Research on P2P Network", 2009 International Conference on Computational Intelligence and Software Engineering, 2009.

H. Tang, Z. Yang and L. Chen, "Analysis on Security Issues for Mobile P2P Networks", 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing, 2012

Qureshi, H. Rifa-Pous and D. Megias, "State-of-the-art, challenges and open issues in integrating security and privacy in P2P content distribution systems", 2016 Eleventh International Conference on Digital Information Management (ICDIM), 2016


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.