Reputation in peer-to-peer networks

被引:5
|
作者
Hu, THT [1 ]
Wongrujira, K [1 ]
Sereviratne, A [1 ]
机构
[1] Univ New S Wales, Sch Elect & Telecommun Engn, Sydney, NSW, Australia
来源
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7 | 2004年
关键词
peer-to-peer; reputation; misbehavior;
D O I
10.1109/ICC.2004.1312744
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
At the core of any peer-to-peer network is the primitive of routing, whereby peers assist each other by forwarding transit traffic. However, some nodes may adopt selfish behavior and drop transit traffic due to reasons such as competing commercial interest or conservation of bandwidth. Thus nodes must be able to detect misbehavior as well as use this information to avoid misbehaving nodes. We propose two reputation schemes to address this problem, focusing on the Chord routing protocol. In the first scheme, nodes submit keyspace ranges that they suspect to contain a misbehaving node, and all the ranges are intersected to narrow the keyspace. The second scheme introduces it new routing reputation metric that is allocated to each finger of chord nodes' routing table. This allows nodes to route to fingers with better reputation in order to have a greater chance of successful delivery. We also present simulation results to evaluate the Performances of the two schemes.
引用
收藏
页码:1411 / 1415
页数:5
相关论文
共 50 条
  • [31] Multifactor hierarchical fuzzy trust evaluation on peer-to-peer networks
    Huaiqing Lin
    Zhitang Li
    Qingfeng Huang
    Peer-to-Peer Networking and Applications, 2011, 4 : 376 - 390
  • [32] Reputation Aggregation in Peer-to-Peer Network Using Differential Gossip Algorithm
    Gupta, Ruchir
    Singh, Yatindra Nath
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (10) : 2812 - 2823
  • [33] Managing data for evaluating trust in unstructured Peer-to-Peer networks
    Li, Zhitang
    Lin, Huaiqing
    Lu, Chuiwei
    Zhang, Yejiang
    ADVANCES IN GRID AND PERVASIVE COMPUTING, PROCEEDINGS, 2008, 5036 : 308 - 318
  • [34] Reputation effects in peer-to-peer online markets: A meta-analysis
    Jiao, Ruohuang
    Przepiorka, Wojtek
    Buskens, Vincent
    SOCIAL SCIENCE RESEARCH, 2021, 95
  • [35] Security Clustering Algorithm Based on Reputation in Hierarchical Peer-to-Peer Network
    Chen, Mei
    Luo, Xin
    Wu, Guowen
    Tan, Yang
    Kita, Kenji
    INTERNATIONAL CONFERENCE ON GRAPHIC AND IMAGE PROCESSING (ICGIP 2012), 2013, 8768
  • [36] A Hierarchical Trust Model for Peer-to-Peer Networks
    Al-Otaiby, Nehal
    Kurdi, Heba
    Al-Megren, Shiroq
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (02): : 397 - 404
  • [37] A Traffic Cache for Structure Peer-to-Peer Networks
    Lin Kuisheng
    Zhou Ya
    Huang Guimin
    THIRD INTERNATIONAL CONFERENCE ON GENETIC AND EVOLUTIONARY COMPUTING, 2009, : 844 - +
  • [38] Controlling Model for the Hotspots in Peer-to-Peer Networks
    Rao, Hao
    Yang, Chun
    Tao, Shaohua
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL I, 2009, : 665 - +
  • [39] Controlling Mechanism for the Hubs in Peer-to-Peer Networks
    Liu, Yuhua
    Yang, Chun
    Xu, Kaihua
    Chen, Hongcai
    2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 511 - +
  • [40] Answering similarity queries in peer-to-peer networks
    Kalnis, P
    Ng, WS
    Ooi, BC
    Tan, KL
    INFORMATION SYSTEMS, 2006, 31 (01) : 57 - 72