Reputation in peer-to-peer networks

被引:5
|
作者
Hu, THT [1 ]
Wongrujira, K [1 ]
Sereviratne, A [1 ]
机构
[1] Univ New S Wales, Sch Elect & Telecommun Engn, Sydney, NSW, Australia
来源
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7 | 2004年
关键词
peer-to-peer; reputation; misbehavior;
D O I
10.1109/ICC.2004.1312744
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
At the core of any peer-to-peer network is the primitive of routing, whereby peers assist each other by forwarding transit traffic. However, some nodes may adopt selfish behavior and drop transit traffic due to reasons such as competing commercial interest or conservation of bandwidth. Thus nodes must be able to detect misbehavior as well as use this information to avoid misbehaving nodes. We propose two reputation schemes to address this problem, focusing on the Chord routing protocol. In the first scheme, nodes submit keyspace ranges that they suspect to contain a misbehaving node, and all the ranges are intersected to narrow the keyspace. The second scheme introduces it new routing reputation metric that is allocated to each finger of chord nodes' routing table. This allows nodes to route to fingers with better reputation in order to have a greater chance of successful delivery. We also present simulation results to evaluate the Performances of the two schemes.
引用
收藏
页码:1411 / 1415
页数:5
相关论文
共 50 条
  • [21] TrustRRep: An Improved Reputation Management Scheme for Reliable Resource Sharing in Peer-to-Peer Networks
    Shin, Junghwa
    Kim, Taehoon
    Tak, Sungwoo
    CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 112 - 122
  • [22] A fine-grained reputation system for reliable service selection in peer-to-peer networks
    Zhang, Yanchao
    Fang, Yuguang
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2007, 18 (08) : 1134 - 1145
  • [23] Proportional replication in peer-to-peer networks
    Tewari, Saurabh
    Kleinrock, Leonard
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 556 - 567
  • [24] Child pornography in peer-to-peer networks
    Steel, Chad M. S.
    CHILD ABUSE & NEGLECT, 2009, 33 (08) : 560 - 568
  • [25] Towards an Effective Reputation Assessment Process in Peer-to-Peer Systems
    Azzedin, Farag
    Ridha, Ahmad
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 21, 2007, 21 : 118 - +
  • [26] Practical trust management without reputation in peer-to-peer games
    Wierzbicki, Adam
    Kaszuba, Tomasz
    MULTIAGENT AND GRID SYSTEMS, 2007, 3 (04) : 411 - 428
  • [27] Security applications of peer-to-peer networks
    Vlachos, V
    Androutsellis-Theotokis, S
    Spinellis, D
    COMPUTER NETWORKS, 2004, 45 (02) : 195 - 205
  • [28] A General Framework for Detecting Malicious Peers in Reputation-based Peer-to-Peer Systems
    Wei, Xianglin
    Chen, Ming
    Fan, Jianhua
    Zhang, Guomin
    2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 463 - 468
  • [29] Incentive Mechanisms in Peer-to-Peer Networks - A Systematic Literature Review
    Ihle, Cornelius
    Trautwein, Dennis
    Schubotz, Moritz
    Meuschke, Norman
    Gipp, Bela
    ACM COMPUTING SURVEYS, 2023, 55 (14S)
  • [30] Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks
    Lin, Huaiqing
    Li, Zhitang
    Huang, Qingfeng
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2011, 4 (04) : 376 - 390