Combating Hidden Action in Unstructured Peer-to-Peer Systems

被引:0
|
作者
Zhao, Qi [1 ]
Zhang, Jianzhong [1 ]
Xu, Jingdong [1 ]
机构
[1] Nankai Univ, Comp Sci Dept, Tianjin 300071, Peoples R China
来源
2006 FIRST INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA | 2006年
关键词
Hidden Action; Peer-to-Peer; Unstructured;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In unstructured peer-to-peer systems, cooperation by the intermediate peers are essential for the success of queries. However, intermediate peers may choose to forward packets at a low priority or not forward the packets at all, which is referred as peers' hidden action. Hidden Action may lead to significant decrement of search efficiency. In contrast to building a global system with reputations or economics, we proposed MSSF, an improved search method, to help queries route around the peers with hidden action. MSSF does not need to check other peers' behavior. It automatically adapts to change query routes according to the previous query results. Simulation results show that MSSF is more robust than Gnutella flooding when peers with hidden action increase.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Research on Simulators for Peer-to-Peer Systems
    Zhou, Shijie
    Zhou, Yanghong
    Luo, Jiaqing
    2013 3RD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2013, : 726 - 731
  • [22] Leader Election in Peer-to-Peer Systems
    Obeidat, Atef A.
    Gubarev, Vasily V.
    SIBCON-2009: INTERNATIONAL SIBERIAN CONFERENCE ON CONTROL AND COMMUNICATIONS, 2009, : 25 - 31
  • [23] On the Design of Hybrid Peer-to-Peer Systems
    Ioannidis, Stratis
    Marbach, Peter
    SIGMETRICS'08: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON MEASUREMENT & MODELING OF COMPUTER SYSTEMS, 2008, 36 (01): : 157 - 168
  • [24] Utility Maximization in Peer-to-Peer Systems
    Chen, Minghua
    Ponec, Miroslav
    Sengupta, Sudipta
    Li, Jin
    Chou, Philip A.
    SIGMETRICS'08: PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON MEASUREMENT & MODELING OF COMPUTER SYSTEMS, 2008, 36 (01): : 169 - +
  • [25] Security issues in peer-to-peer systems
    Kim, JT
    Park, HK
    Paik, EH
    7th International Conference on Advanced Communication Technology, Vols 1 and 2, Proceedings, 2005, : 1059 - 1063
  • [26] Peer-to-Peer Systems: The Present and the Future
    Ardenghi, Jorge
    Echaiz, Javier
    JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY, 2007, 7 (03): : 198 - 203
  • [27] Benchmarking Platform for Peer-to-Peer Systems
    Kovacevic, Aleksandra
    Kaune, Sebastian
    Liebau, Nicolas
    Steinmetz, Ralf
    Mukherjee, Patrick
    IT-INFORMATION TECHNOLOGY, 2007, 49 (05): : 312 - 319
  • [28] Topological Implications of Selfish Neighbor Selection in Unstructured Peer-to-Peer Networks
    Moscibroda, Thomas
    Schmid, Stefan
    Wattenhofer, Roger
    ALGORITHMICA, 2011, 61 (02) : 419 - 446
  • [29] Topological Implications of Selfish Neighbor Selection in Unstructured Peer-to-Peer Networks
    Thomas Moscibroda
    Stefan Schmid
    Roger Wattenhofer
    Algorithmica, 2011, 61 : 419 - 446
  • [30] Real-time Multimedia Streaming in Unstructured Peer-to-Peer Networks
    Rainer, Benjamin
    Timmerer, Christian
    Kapahnke, Patrick
    Klusch, Matthias
    2014 IEEE 11TH CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2014,