Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 3/2016

01-05-2016

A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P

Authors: Hwan-Seok Yang, Jae-Hoon Sun

Published in: Peer-to-Peer Networking and Applications | Issue 3/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

P2P network has been widely used because of advantages such as efficient use of network bandwidth, saving of computing resources, and quick information exchange. In particular, the infra that manages each nodes centrally in P2P network does not exist and each node is a structure performing the sender and receiver roles. The service applying P2P technique in MANET is increased because this structure is very similar to the structure of MANET. However, the reliability may be lower by providing an erroneous service from malicious nodes because the supervision of management for nodes participating in P2P does not perform. In this paper, we propose hybrid trust evaluation technique based on Trust Zone structure to improve the reliability between nodes. TZM node is elected for trust evaluation of member nodes internal each TrustZone. The certificate of member nodes is issued in the elected TZM and the information is stored in TZMT. The data transmission of malicious nodes is blocked by limiting the data transmission of nodes that do not issued the certificate. The reputation-based trust management technique was applied to perform the fair file transmission of nodes and block the behavior of selfish nodes. The excellent performance of the proposed technique in this paper was confirmed through experiments.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Agarwal, DA, Chevassut, O, Thompson, MR, Tsudik, G (2001) An Integrates Solution for Secure Group Communication in Wide-Area Networks. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, 3-5, 22–28 July 2001 Agarwal, DA, Chevassut, O, Thompson, MR, Tsudik, G (2001) An Integrates Solution for Secure Group Communication in Wide-Area Networks. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, 3-5, 22–28 July 2001
2.
go back to reference B Xu and O Wolfson, (2004) Data Management in Mobile P2P Networks. Springer Verlag Lecture Notes In: Computer Science, Proc. of the 2nd International Workshop on Databases, Information Systems, and P2P Computing (DBISP2P'04), Toronto, Aug 2004 B Xu and O Wolfson, (2004) Data Management in Mobile P2P Networks. Springer Verlag Lecture Notes In: Computer Science, Proc. of the 2nd International Workshop on Databases, Information Systems, and P2P Computing (DBISP2P'04), Toronto, Aug 2004
3.
go back to reference AI Wang, T Bjørnsgzerd, and K Saxlund (2007) Peer2Me - rapid application framework for mobile peer-to-peer applications. In: The 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007), 21-25 May 2007 AI Wang, T Bjørnsgzerd, and K Saxlund (2007) Peer2Me - rapid application framework for mobile peer-to-peer applications. In: The 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007), 21-25 May 2007
4.
go back to reference K Takeshita, M Sasabe, H Nakano (2008) Mobile P2P Networks for Highly Dynamic Environments. In: Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications, Hong Kong, 453–457 2008 K Takeshita, M Sasabe, H Nakano (2008) Mobile P2P Networks for Highly Dynamic Environments. In: Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications, Hong Kong, 453–457 2008
5.
go back to reference N Li, J Mitchell, and W Winsborough (2002) Design of a role-based trust management framework. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, 114–130 N Li, J Mitchell, and W Winsborough (2002) Design of a role-based trust management framework. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, 114–130
6.
go back to reference Tian CQ, Zou SH, et al. (2008) A New Trust Model Based on Recommendation Evidence for P2P Networks. Chin J Comput 31(2):271–281 Tian CQ, Zou SH, et al. (2008) A New Trust Model Based on Recommendation Evidence for P2P Networks. Chin J Comput 31(2):271–281
7.
go back to reference Y Wang and J Vassileva, (2003) Trust and Reputation Model in Peer-to-Peer Networks. In: Proceedings 3th International Conference on Peer-to-Peer Computing, Sweden, 150–157 September 2003 Y Wang and J Vassileva, (2003) Trust and Reputation Model in Peer-to-Peer Networks. In: Proceedings 3th International Conference on Peer-to-Peer Computing, Sweden, 150–157 September 2003
8.
go back to reference SD Kamvar, MT Schlosser and HG Molina (2003) The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings 12th International Conference on Word Wide Web, Budapest, Bulgaria, 640–651 May 2003 SD Kamvar, MT Schlosser and HG Molina (2003) The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings 12th International Conference on Word Wide Web, Budapest, Bulgaria, 640–651 May 2003
9.
go back to reference Zhou R, Hwang K, Cai M (2008) Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295CrossRef Zhou R, Hwang K, Cai M (2008) Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295CrossRef
10.
go back to reference Li J, Jing Y, Xiao X, Wang X, Zhang G (2007) A trust model based on similarity-weighted recommendation for P2P environments. Chin J Softw 18(1):157–167CrossRefMATH Li J, Jing Y, Xiao X, Wang X, Zhang G (2007) A trust model based on similarity-weighted recommendation for P2P environments. Chin J Softw 18(1):157–167CrossRefMATH
11.
go back to reference Xiong L, Liu L (2004) Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857CrossRef Xiong L, Liu L (2004) Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857CrossRef
12.
go back to reference Luo J, Liu X, Fan M (2004) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14):2396–2407CrossRefMATH Luo J, Liu X, Fan M (2004) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14):2396–2407CrossRefMATH
13.
go back to reference Tian C, Zhou S, Wang W, Cheng S (2004) Trust model based on reputation for peer-to-peer networks. J Commun 29(4):63–70 Tian C, Zhou S, Wang W, Cheng S (2004) Trust model based on reputation for peer-to-peer networks. J Commun 29(4):63–70
14.
go back to reference Chen K, Hwang K, Chen G (2009) Heuristic discovery of rolebased trust chains in peer-to-peer network. IEEE Trans Parallel Distrib Syst 20(1):83–96MathSciNetCrossRef Chen K, Hwang K, Chen G (2009) Heuristic discovery of rolebased trust chains in peer-to-peer network. IEEE Trans Parallel Distrib Syst 20(1):83–96MathSciNetCrossRef
15.
go back to reference Fu J, Xiong H, Li Z, et al. (2008) PerformTrust: trust model integrated past and current performance in P2P file sharing system. IEEE/ACS Int Conf Comput Syst Appl:718–725 Fu J, Xiong H, Li Z, et al. (2008) PerformTrust: trust model integrated past and current performance in P2P file sharing system. IEEE/ACS Int Conf Comput Syst Appl:718–725
16.
go back to reference Tian C, Zou S, Wang W, Cheng S (2008) A new trust model based on recommendation evidence for P2P networks. Chin J Comput 31(2):270–280CrossRef Tian C, Zou S, Wang W, Cheng S (2008) A new trust model based on recommendation evidence for P2P networks. Chin J Comput 31(2):270–280CrossRef
17.
go back to reference Qureshi B, Min G, Kouvatsos D (2010) M-Trust: A trust management scheme for mobile P2P networks. IEEE/IFIP 8th International Conference on Embedded and Ubiquitous, Hong Kong, China, 476–483 2010 Qureshi B, Min G, Kouvatsos D (2010) M-Trust: A trust management scheme for mobile P2P networks. IEEE/IFIP 8th International Conference on Embedded and Ubiquitous, Hong Kong, China, 476–483 2010
18.
go back to reference Chang BJ, Kuo SL (2008) Markov chain trust model for trustvalue analysis and key management in distributed multicast MANETs. IEEE Trans Veh Technol 58(4):1846–1863CrossRef Chang BJ, Kuo SL (2008) Markov chain trust model for trustvalue analysis and key management in distributed multicast MANETs. IEEE Trans Veh Technol 58(4):1846–1863CrossRef
19.
go back to reference S Kamvar and M Schlosser (2003) The Eigentrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th International Conference on World Wide Web, 640–651 2003 S Kamvar and M Schlosser (2003) The Eigentrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th International Conference on World Wide Web, 640–651 2003
20.
go back to reference Abrams Z, McGrew R, Plotk S (2005) A Non-manipulabe trust system based on EigenTrust. ACM SIGecom Exchanges 5(4):21–30CrossRef Abrams Z, McGrew R, Plotk S (2005) A Non-manipulabe trust system based on EigenTrust. ACM SIGecom Exchanges 5(4):21–30CrossRef
21.
go back to reference Zhou RF, Hwan K (2007) PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473CrossRef Zhou RF, Hwan K (2007) PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473CrossRef
22.
go back to reference YC Zhang, SS Chen and G Yang (2009) SFTrust: A Double Trust Metric based Trust Model in Unstructured P2P System, In: Proceedings of the 23rd IEEE International Parallel & Distributed Processing Symposium, 1–7 2009 YC Zhang, SS Chen and G Yang (2009) SFTrust: A Double Trust Metric based Trust Model in Unstructured P2P System, In: Proceedings of the 23rd IEEE International Parallel & Distributed Processing Symposium, 1–7 2009
23.
go back to reference ZQ Liang and WS Shi (2005) PET: A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing. In: Proceedings of the 38th International Conference on System Science, Vol. 7, pp 201 ZQ Liang and WS Shi (2005) PET: A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing. In: Proceedings of the 38th International Conference on System Science, Vol. 7, pp 201
24.
go back to reference Tian C, Yangc B (2011) R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks. Futur Gener Comput Syst 27(8):1135–1141CrossRef Tian C, Yangc B (2011) R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks. Futur Gener Comput Syst 27(8):1135–1141CrossRef
25.
go back to reference Kwon OH et al. (2007) FileTrust : Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks. IEUCE Trans Commun E90-B(4):826–835CrossRef Kwon OH et al. (2007) FileTrust : Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks. IEUCE Trans Commun E90-B(4):826–835CrossRef
Metadata
Title
A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P
Authors
Hwan-Seok Yang
Jae-Hoon Sun
Publication date
01-05-2016
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 3/2016
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-015-0411-6

Other articles of this Issue 3/2016

Peer-to-Peer Networking and Applications 3/2016 Go to the issue

Premium Partner