Cheating and Anti-Cheating in Gossip-Based Protocol: An Experimental Investigation
نویسندگان
چکیده
During recent years, there has been a rapid growth in deployment of gossip-based protocol in many multicast applications. In a typical gossip-based protocol, each node acts as dual roles of receiver and sender, independently exchanging data with its neighbors to facilitate scalability and resilience. However, most of previous work in this literature seldom considered cheating issue of end users, which is also very important in face of the fact that the mutual cooperation inherently determines overall system performance. In this paper, we investigate the dishonest behaviors in decentralized gossip-based protocol through extensive experimental study. Our original contributions come in two-fold: In the first part of cheating study, we analytically discuss two typical cheating strategies, that is, intentionally increasing subscription requests and untruthfully calculating forwarding probability, and further evaluate their negative impacts. The results indicate that more attention should be paid to defending cheating behaviors in gossip-based protocol. In the second part of anti-cheating study, we propose a receiver-driven measurement mechanism, which evaluates individual forwarding traffic from the perspective of receivers and thus identifies cheating nodes with high incoming/outgoing ratio. Furthermore, we extend our mechanism by introducing reliable factor to further improve its accuracy. The experiments under various conditions show that it performs quite well in case of serious cheating and achieves considerable performance in other cases. key words: gossip, cheating, anti-cheating, peer-to-peer
منابع مشابه
Impact of Node Cheating on Gossip-Based Protocol
Gossip-based protocol has been widely adopted by many large-scale multicast applications. In this paper, we study the impact of node cheating on decentralized gossip-based protocol. We mainly focus on two cheating strategies, one is to increase the subscription request sending times, and the other is to increase the PartialView size. We establish a cheating model of nodes for gossip-based proto...
متن کاملSecure Gossiping Techniques and Components (Ph.D. Thesis)
Gossip protocols have proved to be a viable solution to setup and manage large-scale P2P services or applications in a fully decentralised scenario. The gossip or epidemic communication scheme is heavily based on stochastic behaviors and it is the fundamental idea behind many large-scale P2P protocols. It provides many remarkable features, such as scalability, robustness to failures, emergent l...
متن کاملSecure Gossiping Techniques and Components
Gossip protocols have proved to be a viable solution to set-up and manage largescale P2P services or applications in a fully decentralised scenario. The gossip or epidemic communication scheme is heavily based on stochastic behaviors and it is the fundamental idea behind many large-scale P2P protocols. It provides many remarkable features, such as scalability, robustness to failures, emergent l...
متن کاملInvestigate the Mediating Role of Attitudes to Cheating in the Relationship between Social Support and Educational Justice with Cheating Behavior
Purpose: This research aimed to investigate the mediating role of attitudes to cheating in the relationship between social support and educational justice with cheating behavior. Methodology: Present study was cross-sectional from type of correlation. The research population was all high school female students of Tehran city in 2018-19 academic years with number of 120000 people. The sample siz...
متن کاملAre You Paying Your Employees to Cheat? An Experimental Investigation
We compare, through a laboratory experiment using salient financial incentives, misrepresentations of performance under target-based compensation with those under both a linear piece-rate and a tournament-based bonus system. An anagram game was employed as the experimental task. Results show that productivity was similar and statistically indistinguishable under the three schemes. In contrast, ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEICE Transactions
دوره 91-B شماره
صفحات -
تاریخ انتشار 2008