کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
453345 694794 2006 18 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Peer-to-peer’s most wanted: Malicious peers
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
پیش نمایش صفحه اول مقاله
Peer-to-peer’s most wanted: Malicious peers
چکیده انگلیسی

In this paper, we propose a reputation management scheme for partially decentralized peer-to-peer systems. The reputation scheme helps to build trust among peers based on their past experiences and feedback from other peers. Two selection advisor algorithms are proposed for helping peers to select the most trustworthy peer to download from. The proposed algorithms can detect malicious peers sending inauthentic files. The Malicious detector algorithm is also proposed to detect liar peers that send the wrong feedback to subvert the reputation system. The new concept of suspicious transactions is introduced and explained. Simulation results confirm the capability of the proposed algorithms to effectively detect malicious peers and isolate them from the system, hence reducing the amount of inauthentic uploads, increasing peers’ satisfaction, and preserving network resources.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Computer Networks - Volume 50, Issue 4, 15 March 2006, Pages 545–562
نویسندگان
, , ,