Counter Attack against Free-Riders: Filling a Security Hole in Bittorrent Protocol
نویسندگان
چکیده
eer-to-Peer(P2P) networks are powerful distributed solutions which do not rely on external servers and gather required resources from their users. Therefor fairness is an important feature for designers of these networks. To have a fair network we always want to prevent free-riding. One of the most important file-sharing protocols in P2P is Bittorrent. What separates Bittorrent from other P2P protocols is its unique way of uploading process and its novel approach to fairness. For the first time by implementing eminent game theory strategy, "tit-for-tat" for its protocol, Bittorrent made a breakthrough on fairness for P2P networks. But unfortunately it did not take long for researchers to find security holes in its approach. It was proven several times that by making specific clients which do not follow Bittorrent algorithms and rules, we can easily achieve free-riding. In this paper by taking a simple yet efficient approach and without changing original protocol we make free-riding a much harder process. This will be achieved by changing the role of Tracker from an indexing server to a much more intelligent entity which makes free-riding a much harder process.
منابع مشابه
Securing AODV routing protocol against the black hole attack using Firefly algorithm
Mobile ad hoc networks are networks composed of wireless devices to create a network with the ability for self-organization. These networks are designed as a new generation of computer networks to satisfy some specific requirements and with features different from wired networks. These networks have no fixed communication infrastructure and for communication with other nodes the intermediate no...
متن کاملSecurity Issues in BitTorrent like P2P Streaming Systems
We present a streaming protocol that addresses the security issues pertaining to BitTorrent like P2P systems. Any efficient streaming system would not be effective if it cannot withstand security threats. We focus on free rider's, whitewasher's and malicious payload insertion attacks which implicitly affect Quality of Service like important metrics for the streaming system. We propose a novel i...
متن کاملAnalysing the Security of Incentive Schemes in P2P-based File-sharing Systems
For Peer-to-Peer (P2P) file-sharing services cooperation is essential. However, peers behave rationally and try to maximise their benefits, while minimising their effort. To increase system performance incentive schemes are used to enforce cooperation. Nonetheless, so called free-riders and malicious peers try to attack these incentive schemes. In this paper we will first explain two popular P2...
متن کاملSecure Routing Protocol: Affection on MANETs Performance
In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...
متن کاملA TESLA-based mutual authentication protocol for GSM networks
The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against m...
متن کامل