On Mitigating Pollution and Free-Riding Attacks by Shamir's Secret Sharing in Fully Connected P2P Systems

被引:0
作者
Medina-Lopez, Cristobal [1 ]
Gonzalez-Ruiz, Vicente [1 ]
Casado, L. G. [1 ]
机构
[1] Univ Almeria CeiA3, Almeria 04120, Spain
来源
2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC) | 2017年
关键词
pollution attacks; free-riding attacks; SSS; peer-to-peer; P2PSP; trusted peers;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Fully connected push-based P2P overlay networks, such as P2PSP (P2P Straightforward Protocol), are an efficient alternative to tree-shaped overlay ones. In P2PSP, as in many other P2P systems, malicious peers (MPs) can perform collaborative pollution and free-riding attacks. Here, we summarize current solutions for these problems. We are not interested in make the content private but in mitigating the previous attacks. The proposed solution is based on Shamir's Secret Sharing (SSS) and the use of trusted peers (TPs). Under the assumption that the number of malicious peers is smaller than the half of the total, our proposal forces any peer to relay unpolluted content to well-intended peers in order to not to be expelled. We show the overhead added to the protocol, its strengths, its weaknesses, and outline possible solutions for these weakness.
引用
收藏
页码:711 / 716
页数:6
相关论文
共 27 条
  • [21] Robust Super-Peer-Based P2P File-Sharing Systems
    Lin, Jenn-Wei
    Yang, Ming-Feng
    COMPUTER JOURNAL, 2010, 53 (07) : 951 - 968
  • [22] Characterizing unstructured overlay topologies in modern P2P file-sharing systems
    Stutzbach, Daniel
    Rejaie, Reza
    Sen, Subhabrata
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (02) : 267 - 280
  • [23] Winnowing: Protecting P2P systems against pollution through cooperative index filtering
    Shin, Kyuyong
    Reeves, Douglas S.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) : 72 - 84
  • [24] Scalable Tree-Based Consistency Maintenance in Heterogeneous P2P File Sharing Systems
    Nakashima, Taishi
    Fujita, Satoshi
    2015 44TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING WORKSHOPS, 2015, : 250 - 256
  • [25] Windows 10's Browser Forensic Analysis for Tracing P2P Networks' Anonymous Attacks
    Kauser, Saima
    Malik, Tauqeer Safdar
    Hasan, Mohd Hilmi
    Akhir, Emelia Akashah P.
    Kazmi, Syed Muhammad Husnain
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 1251 - 1273
  • [26] Taxonomy of attacks and defense mechanisms in P2P reputation systems-Lessons for reputation system designers
    Koutrouli, Eleni
    Tsalgatidou, Aphrodite
    COMPUTER SCIENCE REVIEW, 2012, 6 (2-3) : 47 - 70
  • [27] Swarm Intelligence Based File Replication and Consistency Maintenance in Structured P2P File Sharing Systems
    Shen, Haiying
    Liu, Guoxin
    Chandler, Harrison
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (10) : 2953 - 2967