Please use this identifier to cite or link to this item: https://oar.tib.eu/jspui/handle/123456789/5255
Files in This Item:
File SizeFormat 
Li et al 2014, Prevention and Trust Evaluation Scheme.pdf2,79 MBAdobe PDFView/Open
Title: Prevention and trust evaluation scheme based on interpersonal relationships for large-scale peer-to-peer networks
Authors: Li, L.Kurths, J.Yang, Y.Liu, G.
Publishers Version: https://doi.org/10.1155/2014/189213
Issue Date: 2014
Published in: Mathematical Problems in Engineering Vol. 2014 (2014)
Publisher: New York, NY : Hindawi Publishing Corporation
Abstract: In recent years, the complex network as the frontier of complex system has received more and more attention. Peer-to-peer (P2P) networks with openness, anonymity, and dynamic nature are vulnerable and are easily attacked by peers with malicious behaviors. Building trusted relationships among peers in a large-scale distributed P2P system is a fundamental and challenging research topic. Based on interpersonal relationships among peers of large-scale P2P networks, we present prevention and trust evaluation scheme, called IRTrust. The framework incorporates a strategy of identity authentication and a global trust of peers to improve the ability of resisting the malicious behaviors. It uses the quality of service (QoS), quality of recommendation (QoR), and comprehensive risk factor to evaluate the trustworthiness of a peer, which is applicable for large-scale unstructured P2P networks. The proposed IRTrust can defend against several kinds of malicious attacks, such as simple malicious attacks, collusive attacks, strategic attacks, and sybil attacks. Our simulation results show that the proposed scheme provides greater accuracy and stronger resistance compared with existing global trust schemes. The proposed scheme has potential application in secure P2P network coding.
Keywords: Complex networks; Computer crime; Distributed computer systems; Network coding; Network security; Quality control; Quality of service; Comprehensive risks; Identity authentication; Interpersonal relationship; Malicious behavior; Peer to Peer (P2P) network; Quality of recommendations; Trusted relationships; Unstructured P2P network; Peer to peer networks
DDC: 510
License: CC BY 3.0 Unported
Link to License: https://creativecommons.org/licenses/by/3.0/
Appears in Collections:Mathematik



This item is licensed under a Creative Commons License Creative Commons