A distributed reputation and trust management scheme for mobile peer-to-peer networks

被引:40
作者
Qureshi, Basit [1 ]
Min, Geyong [1 ]
Kouvatsos, Demetres [1 ]
机构
[1] Univ Bradford, Sch Comp Informat & Media, Bradford BD7 IDP, W Yorkshire, England
关键词
Trust management; Trust ratings aggregation; Mobile P2P systems; Wireless ad-hoc networks; FRAMEWORK; SECURITY;
D O I
10.1016/j.comcom.2011.07.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In peer-to-peer (P2P) networks, trust ratings aggregation and peer ranking are unreliable, time-consuming and space-demanding operations. The swift expansion of emerging P2P techniques towards the domain of mobile computing poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on P2P systems. However, due to the difficulties caused by system mobility and dynamic network topology, there is an increasing requirement of decentralized and distributed trust management schemes. In this paper, we initially investigate and analyze four typical decentralized and distributed trust management schemes. Based on the findings of this analysis, a robust distributed reputation and trust management scheme, referred to as M-trust, is proposed for mobile P2P networks. The new scheme utilizes confidence in reputation, based on interactions among peers, to reduce the computation complexity. Furthermore, distributed algorithms are presented for accurate and reliable trust ratings aggregation and space management. The performance of M-trust is evaluated in comparison to the existing schemes using extensive simulation experiments. The results demonstrate that M-trust possesses the excellent overall performance in terms of accuracy, reliability, convergence speed, and detection rate under various constraints of mobility, trust threshold and network out-degree. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:608 / 618
页数:11
相关论文
共 36 条
[1]  
[Anonymous], 2007, DISTRIB COMPUT
[2]  
[Anonymous], 2008, INT J NETW SECUR
[3]  
Bahtiyar Serif, 2010, Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010), P803, DOI 10.1109/CIT.2010.153
[4]   Challenges for Trusted Computing [J].
Balfe, Shane ;
Gallery, Eimear ;
Mitchell, Chris J. ;
Paterson, Kenneth G. .
IEEE SECURITY & PRIVACY, 2008, 6 (06) :60-66
[5]  
Baraglia Ranieri, 2010, Proceedings of the 2010 IEEE 10th International Conference on Computer and Information Technology (CIT 2010), P83, DOI 10.1109/CIT.2010.502
[6]  
Baras J.S., 2005, P 43 CONTR DEC C CDC, P93
[7]  
Bi J, 2008, IEEE INFOCOM SER, P371
[8]   A Rule-Based Trust Negotiation System [J].
Bonatti, P. A. ;
De Coi, J. L. ;
Olmedilla, D. ;
Sauro, L. .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2010, 22 (11) :1507-1520
[9]   A trust-based security system for ubiquitous and pervasive computing environments [J].
Boukerche, Azzedine ;
Ren, Yonglin .
COMPUTER COMMUNICATIONS, 2008, 31 (18) :4343-4351
[10]   Security threats scenarios in trust and reputation models for distributed systems [J].
Gomez Marmol, Felix ;
Martinez Perez, Gregorio .
COMPUTERS & SECURITY, 2009, 28 (07) :545-556