A distributed reputation and trust management scheme for mobile peer-to-peer networks

被引:40
|
作者
Qureshi, Basit [1 ]
Min, Geyong [1 ]
Kouvatsos, Demetres [1 ]
机构
[1] Univ Bradford, Sch Comp Informat & Media, Bradford BD7 IDP, W Yorkshire, England
关键词
Trust management; Trust ratings aggregation; Mobile P2P systems; Wireless ad-hoc networks; FRAMEWORK; SECURITY;
D O I
10.1016/j.comcom.2011.07.008
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In peer-to-peer (P2P) networks, trust ratings aggregation and peer ranking are unreliable, time-consuming and space-demanding operations. The swift expansion of emerging P2P techniques towards the domain of mobile computing poses significant challenges for trust and security management. Several trust management schemes have been proposed recently to counter the security threat on P2P systems. However, due to the difficulties caused by system mobility and dynamic network topology, there is an increasing requirement of decentralized and distributed trust management schemes. In this paper, we initially investigate and analyze four typical decentralized and distributed trust management schemes. Based on the findings of this analysis, a robust distributed reputation and trust management scheme, referred to as M-trust, is proposed for mobile P2P networks. The new scheme utilizes confidence in reputation, based on interactions among peers, to reduce the computation complexity. Furthermore, distributed algorithms are presented for accurate and reliable trust ratings aggregation and space management. The performance of M-trust is evaluated in comparison to the existing schemes using extensive simulation experiments. The results demonstrate that M-trust possesses the excellent overall performance in terms of accuracy, reliability, convergence speed, and detection rate under various constraints of mobility, trust threshold and network out-degree. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:608 / 618
页数:11
相关论文
共 50 条
  • [31] Reputation management algorithms for DHT-based peer-to-peer environment
    Fedotova, Natalya
    Veltri, Luca
    COMPUTER COMMUNICATIONS, 2009, 32 (12) : 1400 - 1409
  • [32] A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks
    Alhussain, Alanoud
    Kurdi, Heba
    Altoaimy, Lina
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (03): : 805 - 815
  • [33] Trust Based Reliable and Secure Routing in Peer-to-Peer Overlay Networks
    Anwar, Raja Waseem
    Abu Shahla, Farah
    Ali, Saqib
    Sirinvas, Sumitra
    13TH MIDDLE EASTERN SIMULATION & MODELLING MULTICONFERENCE (MESM 2012) 3RD GAMEON-ARABIA CONFERENCE, 2012, : 26 - 31
  • [34] Securely deploying distributed computation systems on peer-to-peer networks
    Vrancken, Kobe
    Piessens, Frank
    Strackx, Raoul
    SAC '19: PROCEEDINGS OF THE 34TH ACM/SIGAPP SYMPOSIUM ON APPLIED COMPUTING, 2019, : 328 - 337
  • [35] H-Trust: A Group Trust Management System for Peer-to-Peer Desktop Grid
    Zhao, Huanyu
    Li, Xiaolin
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, 24 (05) : 833 - 843
  • [36] H-Trust:A Group Trust Management System for Peer-to-Peer Desktop Grid
    赵环宇
    李晓林
    Journal of Computer Science & Technology, 2009, 24 (05) : 833 - 843
  • [37] H-Trust: A Group Trust Management System for Peer-to-Peer Desktop Grid
    Huanyu Zhao
    Xiaolin Li
    Journal of Computer Science and Technology, 2009, 24 : 833 - 843
  • [38] A fine-grained reputation system for reliable service selection in peer-to-peer networks
    Zhang, Yanchao
    Fang, Yuguang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (08) : 1134 - 1145
  • [39] A Peer-to-Peer Framework for Accelerating Trust Establishment
    Liu, Bailing
    Lu, Hongwei
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 135 - 139
  • [40] Fighting Pollution Attack in Peer-to-Peer Streaming Systems: A Dynamic Reputation Management Approach
    Wang, Shiyu
    Lu, Kun
    Li, Mingchu
    Zhen, Qilong
    Che, Xiaoyu
    PROCEEDINGS 2016 THIRD INTERNATIONAL CONFERENCE ON TRUSTWORTHY SYSTEMS AND THEIR APPLICATIONS (TSA), 2016, : 23 - 28