Open Access Open Access  Restricted Access Subscription Access

Reliable and Authenticated Rumor Riding Protocol for Unstructured Peer-to-Peer Network


Affiliations
1 Sathyabama University, Chennai - 600119, Tamil Nadu, India
2 IT Department, SRR Engineering College, Chennai - 603103, Tamil Nadu, India
 

Objectives: Due to the distributed network topology of peer-to-peer network, there are high possibilities for the malicious node, thereby making security a very important criterion in managing the network performance. Methods: Security in the network is ensured by validation using Rumor Recovery (RR) protocol. Trust table verification method guarentees the validity of initiator node and sower node validity. In this method, the initiator node sends its query message to the responder node according to the rumor generation and recovery phase and query issuance phase of the RR protocol. Responder node validation process is used for saving responding nodes from attacks. Findings: In this paper, we mainly concentrate on the detection and elimination of initiator node attack, replay attack, and sower attack. The performance metrics considered for evalution are delay, delivery ratio and throughput. Simulation results show that the proposed Trusted Rumor Riding (TRR) protocol. 1. Out performs RR protocol by 34% in terms of delay, 1% in terms of delivery ratio and 17% in terms of throughput while detecting and eliminating the initiator attack; 2. Out performs RR by 98% in terms of delay, 41% in terms of delivery ratio and 19% in terms of throughput while detecting and eliminating the replay attack; and 3. Out performs RR by 95% in terms of delay, 9% in terms of delivery ratio and 36% in terms of throughput while detecting and eliminating the sower attack. Most of the existing works did not consider these three attacks; only few works considered it, but those were failed to meet the quality of service requirements. The detected attacks are avoided in a effective manner to provide the secure communication. Applications/Improvement: From the results, it is concluded that the proposed TRR protocol can detect several attack while satisfying the quality of service needs.

Keywords

Malicious Node, Peer-To-Peer Network, Rumor Riding, Security, Trust Node, Validation.
User

Abstract Views: 123

PDF Views: 0




  • Reliable and Authenticated Rumor Riding Protocol for Unstructured Peer-to-Peer Network

Abstract Views: 123  |  PDF Views: 0

Authors

Mary Subaja Christo
Sathyabama University, Chennai - 600119, Tamil Nadu, India
S. Meenakshi
IT Department, SRR Engineering College, Chennai - 603103, Tamil Nadu, India

Abstract


Objectives: Due to the distributed network topology of peer-to-peer network, there are high possibilities for the malicious node, thereby making security a very important criterion in managing the network performance. Methods: Security in the network is ensured by validation using Rumor Recovery (RR) protocol. Trust table verification method guarentees the validity of initiator node and sower node validity. In this method, the initiator node sends its query message to the responder node according to the rumor generation and recovery phase and query issuance phase of the RR protocol. Responder node validation process is used for saving responding nodes from attacks. Findings: In this paper, we mainly concentrate on the detection and elimination of initiator node attack, replay attack, and sower attack. The performance metrics considered for evalution are delay, delivery ratio and throughput. Simulation results show that the proposed Trusted Rumor Riding (TRR) protocol. 1. Out performs RR protocol by 34% in terms of delay, 1% in terms of delivery ratio and 17% in terms of throughput while detecting and eliminating the initiator attack; 2. Out performs RR by 98% in terms of delay, 41% in terms of delivery ratio and 19% in terms of throughput while detecting and eliminating the replay attack; and 3. Out performs RR by 95% in terms of delay, 9% in terms of delivery ratio and 36% in terms of throughput while detecting and eliminating the sower attack. Most of the existing works did not consider these three attacks; only few works considered it, but those were failed to meet the quality of service requirements. The detected attacks are avoided in a effective manner to provide the secure communication. Applications/Improvement: From the results, it is concluded that the proposed TRR protocol can detect several attack while satisfying the quality of service needs.

Keywords


Malicious Node, Peer-To-Peer Network, Rumor Riding, Security, Trust Node, Validation.



DOI: https://doi.org/10.17485/ijst%2F2016%2Fv9i21%2F134574