Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Peer-to-Peer Security using Trust-based Mechanism


     

   Subscribe/Renew Journal


Peer-to-Peer (P2P) network is a type of network where files are exchanged directly between computers without the involvement of any central server interference. As this kind of network does not depend on any central authority, each node (computer) can take its own decisions. The problem with this network is the data exchanged among the nodes is not secured. A number of systems exist which assures security, but they are not enough. So, in order to fulfill the security requirements, a new system is proposed. The proposed design uses three approaches to deploying a new system; the first approach is measurements where each node is measured for latency, bottleneck bandwidth, and lifetime measurements. The second approach is truthfulness/similarity where it gives the detail of the node behavior, and finally, the third approach used in this new design is to calculate the trust value of the node. The combination of all these approaches in a hierarchical manner results in a secure node (in-turn network). This research can be further studied to analyze simulation and real time.

Keywords

Trust-Based Security, Eigen Trust, Peer-to-Peer Networks, Latency, Bottleneck Bandwidth
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 179

PDF Views: 0




  • Peer-to-Peer Security using Trust-based Mechanism

Abstract Views: 179  |  PDF Views: 0

Authors

Abstract


Peer-to-Peer (P2P) network is a type of network where files are exchanged directly between computers without the involvement of any central server interference. As this kind of network does not depend on any central authority, each node (computer) can take its own decisions. The problem with this network is the data exchanged among the nodes is not secured. A number of systems exist which assures security, but they are not enough. So, in order to fulfill the security requirements, a new system is proposed. The proposed design uses three approaches to deploying a new system; the first approach is measurements where each node is measured for latency, bottleneck bandwidth, and lifetime measurements. The second approach is truthfulness/similarity where it gives the detail of the node behavior, and finally, the third approach used in this new design is to calculate the trust value of the node. The combination of all these approaches in a hierarchical manner results in a secure node (in-turn network). This research can be further studied to analyze simulation and real time.

Keywords


Trust-Based Security, Eigen Trust, Peer-to-Peer Networks, Latency, Bottleneck Bandwidth