Identifying Collusion Attack in P2P Trust and Reputation Systems

نویسندگان

  • Nitin Kumar Saini
  • Amit Chaturvedi
  • Ramesh Chand Yadav
چکیده

Internet became today a medium of sharing large amount of data among different nodes situated anywhere in the world. Due to its fairly open nature Peer to Peer applications gain-ing popularity in sharing of large data rather then conventional client-server systems. Many P2P applications has been designed for the purpose of content distribution over Internet and most of them are based on decentralized Peer to peer architecture. Although absence of a central server, peers can communicate directly but lacks of central administration makes P2P network vulnerable to various kind of attacks. Authenticity of data become a major challenge in decentralized P2P content distribution applications since peers are unknown to each other within a network. To ensure the data authenticity, several schemes had been proposed by trust and reputation systems in recent past few years. In literature, we have covered the desirable characteristics of trust and reputation systems. Trust and reputation system play a vital role in defining the trustworthiness of a peer before making transaction. On the basis of trust value requester can able to skip malicious identities. However due to malicious behaviour of peers, they themselves are vulnerable to various kinds of attacks. The paper reviews existing collusion attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A collusion mitigation scheme for reputation systems

Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of col...

متن کامل

GGRA: a grouped gossip-based reputation aggregation algorithm

An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...

متن کامل

A Reputation System for Self-Organizing Storage

Reputation systems have demonstrated their interest in stimulating cooperation in peer-to-peer (P2P) systems, even though they are susceptible to collusion and bashing. In addition, computing reputation generally relies on a partial assessment of the behavior of peers only, which might delay the detection of selfish peers. This situation is rendered even worse in self-organized storage applicat...

متن کامل

Secure and Effective P2P Reputation System using Trust Management and Self Certified Cryptographic Exchanges

The main reason behind the success of Peer-to-Peer (P2P) networks is the anonymity and the utility offered by them to the users. The Client-server security policies implemented in centralized distributed systems do not provide a desirable solution for P2P networks to store peer reputation information. Though a centralized system does exist, it is prone to Sybil attack that can significantly red...

متن کامل

Credible Reputation Systems for P2P e-Communities

Reputation mechanisms for distributed e-Communities are vital tools for facilitating trust decisions regarding transactions between entities. Motivated by the current challenges in the area of P2P reputation systems regarding their desgign, credibilty enhancement and objective evaluation, in this thesis we worked towards (1) creating a framework for the development and evaluation of secure repu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014