An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks

Abstract

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. The peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However it may not be the true reflection of past behavior of the peers. Moreover such type of aggregation gives only the relative ranking of peers without any absolute evaluation of their past. This is more significant when all the peers responding to a query, are malicious. In such a situation only the peer came to know that who is better among them without knowing their rank in the whole network. Hence to mitigate the attacks by malicious peers and to motivate the peers to share the resources effectively and securely, in this paper, a new algorithm is proposed which accounts for the past behavior of the peers and will estimate the absolute value of the trust of peers. Consequently, good peers or malicious peers are identified. The proposed algorithm converges at some global consensus much faster by choosing suitable parameters. Because of its absolute nature it will equally load all the peers in network. It will also reduce the inauthentic download in the network which was not possible in existing algorithms.

Authors and Affiliations

M. Janani, R. Jeevitha

Keywords

Related Articles

Noval Control Strategies For Distributed Energy Resources

Distributed energy resources, such as solar photo voltaic & diesel generators are used to form microgrids that provide active & reactive power when required. All the generators work in a coordinated manner, if any of th...

MIMO-OFDM and IDMA scheme in underwater communication

The past three decades have seen a growing interest in UWA communications because of its applications in marine research, marine commercial operations, the offshore oil industry, oceanography and defense. However the ab...

slugAn Approach towards Link Positions Routing In Wireless Network

Here, we account for the fact that MAC protocols incorporate a finite number of transmission attempts per packet. The performance of a path depends not only on the number of the links on the path and the quality of its l...

A Comparative Study of Some Image Compression Techniques

A remarkable progress has been made in the field of data compression and its application, digital image compression is associated with removing redundant information of image data. Compression of digital images has a tw...

Substation Automation System for Energy Monitoring and Control using SCADA

Inherent scarcity of thermal sources with a time varying temperature profile is the reason why the Thermo electricbased energy harvesting is not as prominent as its counter-part, thermoelectric generators, in the thermal...

Download PDF file
  • EP ID EP23630
  • DOI http://doi.org/10.22214/ijraset.2017.3170
  • Views 273
  • Downloads 5

How To Cite

M. Janani, R. Jeevitha (2017). An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(3), -. https://europub.co.uk/articles/-A-23630