Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model

被引:15
作者
Shareh, Morteza Babazadeh [1 ]
Navidi, Hamidreza [2 ]
Javadi, Hamid Haj Seyyed [2 ]
HosseinZadeh, Mehdi [3 ,4 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp, Tehran, Iran
[2] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
[3] Iran Univ Med Sci, Tehran, Iran
[4] Univ Human Dept, Comp Sci, Sulaimanieh, Iraq
关键词
Sybil attacks; Evolutionary game model; Peer-to-Peer file sharing; Free rider; INCENTIVE MECHANISM; SOCIAL NETWORK; PROTOCOL; SCHEMES; NODES;
D O I
10.1016/j.ins.2018.08.054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cooperative Peer-to-Peer (P2P) networks, a number of users, called Free-riders, try to receive service from others without cooperating with them. Some others, called Sybil nodes, break the rules of the system by colluding and showing fake identities. P2P networks are highly vulnerable to these attacks. In previous research, no method has been suggested to counter these two attacks simultaneously. In the proposed method, a new centrality relationship has been used in the incentive mechanism to deal with both problems at the same time. In this regard, the more varied the nodes receiving service from a peer are, the better the peer reputation will be. The results show that the longer the network life goes on, the more free-riders are detected, and the number of services delivered to the collusive nodes will also be reduced. (C) 2018 Published by Elsevier Inc.
引用
收藏
页码:94 / 108
页数:15
相关论文
共 43 条
  • [1] AlTuhafi AW, 2013, 2013 IEEE INT C RFID, P1
  • [2] Probing the Topological Properties of Complex Networks Modeling Short Written Texts
    Amancio, Diego R.
    [J]. PLOS ONE, 2015, 10 (02):
  • [3] A Complex Network Approach to Stylometry
    Amancio, Diego Raphael
    [J]. PLOS ONE, 2015, 10 (08):
  • [4] [Anonymous], 2004, P 5 ACM C EL COMM
  • [5] [Anonymous], P INT C WIR COMM NET
  • [6] [Anonymous], 2010, Networks: An Introduction
  • [7] Computing topological parameters of biological networks
    Assenov, Yassen
    Ramirez, Fidel
    Schelhorn, Sven-Eric
    Lengauer, Thomas
    Albrecht, Mario
    [J]. BIOINFORMATICS, 2008, 24 (02) : 282 - 284
  • [8] Modeling BitTorrent choking algorithm using game theory
    Azzedin, Farag
    Yahaya, Mohammed
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 255 - 265
  • [9] Bertini Jr J., 2012, J BRAZILIAN COMPUTER, V18, P299
  • [10] A new clustering protocol for energy harvesting-wireless sensor networks
    Bozorgi, Seyed Mostafa
    Rostami, Ali Shokouhi
    Hosseinabadi, Ali Asghar Rahmani
    Balas, Valentina Emilia
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 : 233 - 247