![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
Peer-to-Peer Security using Trust-based Mechanism
Subscribe/Renew Journal
Peer-to-Peer (P2P) network is a type of network where files are exchanged directly between computers without the involvement of any central server interference. As this kind of network does not depend on any central authority, each node (computer) can take its own decisions. The problem with this network is the data exchanged among the nodes is not secured. A number of systems exist which assures security, but they are not enough. So, in order to fulfill the security requirements, a new system is proposed. The proposed design uses three approaches to deploying a new system; the first approach is measurements where each node is measured for latency, bottleneck bandwidth, and lifetime measurements. The second approach is truthfulness/similarity where it gives the detail of the node behavior, and finally, the third approach used in this new design is to calculate the trust value of the node. The combination of all these approaches in a hierarchical manner results in a secure node (in-turn network). This research can be further studied to analyze simulation and real time.
Keywords
Trust-Based Security, Eigen Trust, Peer-to-Peer Networks, Latency, Bottleneck Bandwidth
User
Subscription
Login to verify subscription
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 256
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 0