Reputation in peer-to-peer networks

被引:5
|
作者
Hu, THT [1 ]
Wongrujira, K [1 ]
Sereviratne, A [1 ]
机构
[1] Univ New S Wales, Sch Elect & Telecommun Engn, Sydney, NSW, Australia
来源
2004 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-7 | 2004年
关键词
peer-to-peer; reputation; misbehavior;
D O I
10.1109/ICC.2004.1312744
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
At the core of any peer-to-peer network is the primitive of routing, whereby peers assist each other by forwarding transit traffic. However, some nodes may adopt selfish behavior and drop transit traffic due to reasons such as competing commercial interest or conservation of bandwidth. Thus nodes must be able to detect misbehavior as well as use this information to avoid misbehaving nodes. We propose two reputation schemes to address this problem, focusing on the Chord routing protocol. In the first scheme, nodes submit keyspace ranges that they suspect to contain a misbehaving node, and all the ranges are intersected to narrow the keyspace. The second scheme introduces it new routing reputation metric that is allocated to each finger of chord nodes' routing table. This allows nodes to route to fingers with better reputation in order to have a greater chance of successful delivery. We also present simulation results to evaluate the Performances of the two schemes.
引用
收藏
页码:1411 / 1415
页数:5
相关论文
共 50 条
  • [41] MALWARE SPREADING MODELS IN PEER-TO-PEER NETWORKS
    Schafer, Jiri
    Malinka, Kamil
    Hanacek, Petr
    42ND ANNUAL 2008 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2008, : 339 - 345
  • [42] Semantic Information Retrieval on Peer-to-Peer Networks
    Erturk, Mehmet Ali
    Zaim, A. Halim
    Akyokus, Selim
    NETWORKED DIGITAL TECHNOLOGIES, PT 2, 2010, 88 : 715 - +
  • [43] A NAT Traversal Mechanism for Peer-To-Peer Networks
    Zhang, Zepeng
    Wen, Xiangming
    Zheng, Wei
    2009 INTERNATIONAL SYMPOSIUM ON INTELLIGENT UBIQUITOUS COMPUTING AND EDUCATION, 2009, : 129 - 132
  • [44] Asynchronous resource discovery in peer-to-peer networks
    Kutten, Shay
    Peleg, David
    COMPUTER NETWORKS, 2007, 51 (01) : 190 - 206
  • [45] On Unbiased Sampling for Unstructured Peer-to-Peer Networks
    Stutzbach, Daniel
    Rejaie, Reza
    Duffield, Nick
    Sen, Subhabrata
    Willinger, Walter
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2009, 17 (02) : 377 - 390
  • [46] Fighting Pollution Dissemination in Peer-to-Peer Networks
    Costa, Cristiano
    Soares, Vanessa
    Almeida, Jussara
    Almeida, Virgilio
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1586 - 1590
  • [47] Merging retrieval results in peer-to-peer networks
    Zhang, Qian
    Liu, Zheng
    Zhang, Xia
    Sun, Yu
    Wen, Xuezhi
    Advances in Computational Methods in Sciences and Engineering 2005, Vols 4 A & 4 B, 2005, 4A-4B : 1884 - 1887
  • [48] On the impact of seed scheduling in peer-to-peer networks
    Esposito, Flavio
    Matta, Ibrahim
    Bera, Debajyoti
    Michiardi, Pietro
    COMPUTER NETWORKS, 2011, 55 (15) : 3303 - 3317
  • [49] Handling Churn in Structured Peer-to-Peer Networks
    Xu Xiang
    PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2009, : 669 - 674
  • [50] Distributed shell over peer-to-peer networks
    Truong, M
    Harwood, A
    PDPTA'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-4, 2003, : 269 - 275