Simulating trust overlay in P2P networks

被引:0
作者
Zhang, Yan [1 ]
Wang, Wei [2 ]
Lu, Shunying [1 ]
机构
[1] Hubei Univ, Fac Math & Comp Sci, Wuhan 430062, Peoples R China
[2] Tongji Univ, Dept Comp Sci & Technol, Shanghai PT-201804, Peoples R China
来源
COMPUTATIONAL SCIENCE - ICCS 2007, PT 1, PROCEEDINGS | 2007年 / 4487卷
关键词
overlay networks; trust; simulator; security; peer-to-peer;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Though research on the overlay network has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the overlay networks is a large, uncensored system to which anyone may contribute. This raises the question of how much dependability to give each information source. Traditional overlay network simulators provide accurate low-level models of the network hardware and protocols, but none of them deal with the issue of trust and reliability in the large scale overlay networks. We tackle this problem by employing a trust overlay simulator, which offer a viable solution to simulate trustworthy behavior in overlay networks. With this simulator, we can examine varies kinds of trust and reputation mechanisms in a large scale overlay environment.
引用
收藏
页码:632 / +
页数:3
相关论文
共 50 条
  • [1] A generic trust overlay simulator for P2P networks
    Wang, Wei
    Zeng, Guosun
    12TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2006, : 401 - +
  • [2] A Trust-based Routing Strategy in Structured P2P Overlay Networks
    Han, Yang
    Koyanagi, Keiichi
    Tsuchiya, Takeshi
    Miyosawa, Tadashi
    Hirose, Hiroo
    2013 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2013,
  • [3] Topology awareness of overlay P2P networks
    Rostami, Habib
    Habibi, Jafar
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2007, 19 (07) : 999 - 1021
  • [4] Securing Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 37 - 43
  • [5] A P2P computing system for overlay networks
    Chmaj, Grzegorz
    Walkowiak, Krzysztof
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01): : 242 - 249
  • [6] Improvement of routing structure in P2P overlay networks
    Hu, JF
    Wu, YH
    Li, M
    Zheng, WM
    GRID AND COOPERATIVE COMPUTING, PT 1, 2004, 3032 : 292 - 299
  • [7] Impact of feedback on trust in P2P networks
    Huang, Zhihua
    Lu, Songnian
    Zhang, Aixin
    Gu, Jie
    Journal of Networks, 2012, 7 (08) : 1182 - 1188
  • [8] Autonomic K-interleaving construction scheme for P2P overlay networks
    Ragab, Khaled
    Yonezawa, Akinori
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 153 - 162
  • [9] Analysis of Malicious Peers in Structured P2P Overlay Networks
    Trifa, Zied
    Khemakhem, Maher
    2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [10] Reliable self-clustering P2P overlay networks
    Wang, Shihui
    Zhang, Yan
    Wang, Wei
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 105 - +