A Reputation Based Detection Scheme for Securing P2P Home Networked Appliances in HNASS
Journal Title: Journal of Computing and Management Studies (JCMS) - Year 2017, Vol 1, Issue 1
Abstract
We are in the era where computing is embedded fairly ubiquitously in the environment. As peers are autonomous in nature, no peer will fully trust another peer in a p2p network in terms of data, file or service sharing. There are many types of attacks in P2P network, but our concern is to establish a framework which mitigates some of the security threats in P2p network. As p2p are autonomous in nature they may lie to each other about their services they provide. There is a need for a security scheme which can provide improved security for home appliances within a P2P network context. The main aim of this paper is the development of a distributed scheme able to work within the network, applying Secure Component Composition techniques for the purposeof controlling lying of peers about the services they provide.If peers give false information about services they provide, the framework will take certain action against them.This will improve the security of the overall network.
Authors and Affiliations
Mazhar Ul Hassan
The Association of Business Strategies and Different Organizational Factors with Human Resource Management
Small and medium enterprises has been defined by various writers in different ways because its definition different in different part of the world but most of them are agree on the following definition that smaller firms...
Challenges to e-government implementation in developing countries. Nigeria case Study
The rapid development in ICT industry and the increase in Internet usage around the world enabled some governments to provide e-services for citizens with the aim of improving service delivery, increasing citizen partici...
Management of Islamic Organizations in New Zeland
When the number of Muslims in any places is getting more and more, there must be a thought to establish an organisation as a medium to carry out their voices, interests, and basic needs. In addition, the organisation is...
The Adoption of e-Government Services in Nigeria using UTUAT Model
Electronic government implementation in many developing countries are still evolving and its realisation depends on government provisions and users' adoption of the electronic services. This work investigated Citizens’ a...
A Simulation Based Study of Routing Protocols in Mobile Ad-hoc Networks
Mobile ad-hoc is a temporary network without a pre-established infrastructure. Because of the absence of centralized structure, mobile ad hoc networks are facing several problems such as security, routing, limitation of...