A distributed reputation and trust management scheme for mobile peer-to-peer networks

被引:40
|
作者
Qureshi, Basit [1 ]
Min, Geyong [1 ]
Kouvatsos, Demetres [1 ]
机构
[1] Univ Bradford, Sch Comp Informat & Media, Bradford BD7 IDP, W Yorkshire, England
关键词
Trust management; Trust ratings aggregation; Mobile P2P systems; Wireless ad-hoc networks; FRAMEWORK; SECURITY;
D O I
10.1016/j.comcom.2011.07.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In peer-to-peer (P2P) networks, trust ratings aggregation and peer ranking are unreliable, time-consuming and space-demanding operations. The swift expansion of emerging P2P techniques towards the domain of mobile computing poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on P2P systems. However, due to the difficulties caused by system mobility and dynamic network topology, there is an increasing requirement of decentralized and distributed trust management schemes. In this paper, we initially investigate and analyze four typical decentralized and distributed trust management schemes. Based on the findings of this analysis, a robust distributed reputation and trust management scheme, referred to as M-trust, is proposed for mobile P2P networks. The new scheme utilizes confidence in reputation, based on interactions among peers, to reduce the computation complexity. Furthermore, distributed algorithms are presented for accurate and reliable trust ratings aggregation and space management. The performance of M-trust is evaluated in comparison to the existing schemes using extensive simulation experiments. The results demonstrate that M-trust possesses the excellent overall performance in terms of accuracy, reliability, convergence speed, and detection rate under various constraints of mobility, trust threshold and network out-degree. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:608 / 618
页数:11
相关论文
共 50 条
  • [21] AntTrust: An Ant-Inspired Trust Management System for Peer-to-Peer Networks
    Al-Otaiby, Nehal
    Alhindi, Afnan
    Kurdi, Heba
    SENSORS, 2022, 22 (02)
  • [22] A framework for mobile agents in Peer-to-Peer networks
    Lübke, D
    Gómez, JM
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XIII, PROCEEDINGS: SYSTEMICS, CYBERNETICS AND INFORMATICS: TECHNOLOGIES AND APPLICATIONS, 2003, : 101 - 103
  • [23] A new reputation-based trust management mechanism against false feedbacks in peer-to-peer systems
    Jin, Yu
    Gu, Zhimin
    Gu, Jinguang
    Zhao, Hongwu
    WEB INFORMATION SYSTEMS ENGINEERING - WISE 2007, PROCEEDINGS, 2007, 4831 : 62 - +
  • [24] PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
    Xiong, L
    Liu, L
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (07) : 843 - 857
  • [25] Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks
    Kubra Kalkan
    Albert Levi
    Peer-to-Peer Networking and Applications, 2014, 7 : 698 - 709
  • [26] Key distribution scheme for peer-to-peer communication in mobile underwater wireless sensor networks
    Kalkan, Kubra
    Levi, Albert
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (04) : 698 - 709
  • [27] JXTA: A technology facilitating mobile peer-to-peer networks
    Maibaum, N
    Mundt, T
    INTERNATIONAL MOBILITY AND WIRELESS ACCESS WORKSHOP (MOBIWAC 2002), PROCEEDINGS, 2002, : 7 - 13
  • [28] A Trust Framework for Peer-to-Peer Interaction in Ad Hoc Networks
    Boodnah, Javesh
    Poslad, Stefan
    2009 COMPUTATION WORLD: FUTURE COMPUTING, SERVICE COMPUTATION, COGNITIVE, ADAPTIVE, CONTENT, PATTERNS, 2009, : 707 - 712
  • [29] Recard: Using recommendation cards approach for building trust in peer-to-peer networks
    Samuel, HA
    Dakroury, YH
    Shahein, HI
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 280 - 292
  • [30] Using recurring costs for reputation management in peer-to-peer streaming systems
    Rossberg, Michael
    Schaefer, Guenter
    Strufe, Thorsten
    2007 THIRD INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS AND WORKSHOPS, 2007, : 283 - 292