A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P
详细信息    查看全文
  • 作者:Hwan-Seok Yang ; Jae-Hoon Sun
  • 关键词:Trust evaluation ; Authentication technique ; MANET ; Mobile P2P
  • 刊名:Peer-to-Peer Networking and Applications
  • 出版年:2016
  • 出版时间:May 2016
  • 年:2016
  • 卷:9
  • 期:3
  • 页码:578-587
  • 全文大小:1,850 KB
  • 参考文献:1.Agarwal, DA, Chevassut, O, Thompson, MR, Tsudik, G (2001) An Integrates Solution for Secure Group Communication in Wide-Area Networks. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, 3-5, 22–28 July 2001
    2.B Xu and O Wolfson, (2004) Data Management in Mobile P2P Networks. Springer Verlag Lecture Notes In: Computer Science, Proc. of the 2nd International Workshop on Databases, Information Systems, and P2P Computing (DBISP2P'04), Toronto, Aug 2004
    3.AI Wang, T Bjørnsgzerd, and K Saxlund (2007) Peer2Me - rapid application framework for mobile peer-to-peer applications. In: The 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007), 21-25 May 2007
    4.K Takeshita, M Sasabe, H Nakano (2008) Mobile P2P Networks for Highly Dynamic Environments. In: Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications, Hong Kong, 453–457 2008
    5.N Li, J Mitchell, and W Winsborough (2002) Design of a role-based trust management framework. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, 114–130
    6.Tian CQ, Zou SH, et al. (2008) A New Trust Model Based on Recommendation Evidence for P2P Networks. Chin J Comput 31(2):271–281
    7.Y Wang and J Vassileva, (2003) Trust and Reputation Model in Peer-to-Peer Networks. In: Proceedings 3th International Conference on Peer-to-Peer Computing, Sweden, 150–157 September 2003
    8.SD Kamvar, MT Schlosser and HG Molina (2003) The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings 12th International Conference on Word Wide Web, Budapest, Bulgaria, 640–651 May 2003
    9.Zhou R, Hwang K, Cai M (2008) Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295CrossRef
    10.Li J, Jing Y, Xiao X, Wang X, Zhang G (2007) A trust model based on similarity-weighted recommendation for P2P environments. Chin J Softw 18(1):157–167CrossRef MATH
    11.Xiong L, Liu L (2004) Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857CrossRef
    12.Luo J, Liu X, Fan M (2004) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14):2396–2407CrossRef MATH
    13.Tian C, Zhou S, Wang W, Cheng S (2004) Trust model based on reputation for peer-to-peer networks. J Commun 29(4):63–70
    14.Chen K, Hwang K, Chen G (2009) Heuristic discovery of rolebased trust chains in peer-to-peer network. IEEE Trans Parallel Distrib Syst 20(1):83–96MathSciNet CrossRef
    15.Fu J, Xiong H, Li Z, et al. (2008) PerformTrust: trust model integrated past and current performance in P2P file sharing system. IEEE/ACS Int Conf Comput Syst Appl:718–725
    16.Tian C, Zou S, Wang W, Cheng S (2008) A new trust model based on recommendation evidence for P2P networks. Chin J Comput 31(2):270–280CrossRef
    17.Qureshi B, Min G, Kouvatsos D (2010) M-Trust: A trust management scheme for mobile P2P networks. IEEE/IFIP 8th International Conference on Embedded and Ubiquitous, Hong Kong, China, 476–483 2010
    18.Chang BJ, Kuo SL (2008) Markov chain trust model for trustvalue analysis and key management in distributed multicast MANETs. IEEE Trans Veh Technol 58(4):1846–1863CrossRef
    19.S Kamvar and M Schlosser (2003) The Eigentrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th International Conference on World Wide Web, 640–651 2003
    20.Abrams Z, McGrew R, Plotk S (2005) A Non-manipulabe trust system based on EigenTrust. ACM SIGecom Exchanges 5(4):21–30CrossRef
    21.Zhou RF, Hwan K (2007) PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473CrossRef
    22.YC Zhang, SS Chen and G Yang (2009) SFTrust: A Double Trust Metric based Trust Model in Unstructured P2P System, In: Proceedings of the 23rd IEEE International Parallel & Distributed Processing Symposium, 1–7 2009
    23.ZQ Liang and WS Shi (2005) PET: A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing. In: Proceedings of the 38th International Conference on System Science, Vol. 7, pp 201
    24.Tian C, Yangc B (2011) R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks. Futur Gener Comput Syst 27(8):1135–1141CrossRef
    25.Kwon OH et al. (2007) FileTrust : Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks. IEUCE Trans Commun E90-B(4):826–835CrossRef
  • 作者单位:Hwan-Seok Yang (1)
    Jae-Hoon Sun (2) (3)

    1. Departmet of Information Security Engineering, Joongbu University, 101, Majeon-ri, Chubu-myeon, Geumsan-gun, Chungnam, South Korea
    2. Department of General Education, Dong-Ah Institute of Media and Arts, Dong-Ah yedae Rd. 47 Samjuk-myeon, Anseong-si, Gyeonggi-do, 456-717, Republic of Korea
    3. 105-dong 307-ho, 43, Tongil-ro 34-gil, Seodaemun-gu, Seoul, 150-754, Republic of Korea
  • 刊物类别:Engineering
  • 刊物主题:Communications Engineering and Networks
    Information Systems and Communication Service
    Computer Communication Networks
  • 出版者:Springer New York
  • ISSN:1936-6450
文摘
P2P network has been widely used because of advantages such as efficient use of network bandwidth, saving of computing resources, and quick information exchange. In particular, the infra that manages each nodes centrally in P2P network does not exist and each node is a structure performing the sender and receiver roles. The service applying P2P technique in MANET is increased because this structure is very similar to the structure of MANET. However, the reliability may be lower by providing an erroneous service from malicious nodes because the supervision of management for nodes participating in P2P does not perform. In this paper, we propose hybrid trust evaluation technique based on Trust Zone structure to improve the reliability between nodes. TZM node is elected for trust evaluation of member nodes internal each TrustZone. The certificate of member nodes is issued in the elected TZM and the information is stored in TZMT. The data transmission of malicious nodes is blocked by limiting the data transmission of nodes that do not issued the certificate. The reputation-based trust management technique was applied to perform the fair file transmission of nodes and block the behavior of selfish nodes. The excellent performance of the proposed technique in this paper was confirmed through experiments.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700