An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks

Abstract

Peer-to-peer (P2P) computing or networking is a distributed application architecture that partitions tasks or workloads between peers. The peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However it may not be the true reflection of past behavior of the peers. Moreover such type of aggregation gives only the relative ranking of peers without any absolute evaluation of their past. This is more significant when all the peers responding to a query, are malicious. In such a situation only the peer came to know that who is better among them without knowing their rank in the whole network. Hence to mitigate the attacks by malicious peers and to motivate the peers to share the resources effectively and securely, in this paper, a new algorithm is proposed which accounts for the past behavior of the peers and will estimate the absolute value of the trust of peers. Consequently, good peers or malicious peers are identified. The proposed algorithm converges at some global consensus much faster by choosing suitable parameters. Because of its absolute nature it will equally load all the peers in network. It will also reduce the inauthentic download in the network which was not possible in existing algorithms.

Authors and Affiliations

M. Janani, R. Jeevitha

Keywords

Related Articles

Autonomous Tracking of Vehicle Taillights for Avoiding Accidents in Toll Road

The pasture of statistical morphology contributes a spacious variety of operators to image trade out, all based in the region of the alternative simple precise concepts from rest theory. The operators are mainly valuabl...

Seismic analysis of skewed multi-span Steel Girder Bridge

A bridge is an important component of the road transportation network. Its performance during and even after an earthquake event is quite crucial to provide relief as well as for security and defense purpose. Most of th...

The ancillary reactive power service pricing in a Deregulated electricity market

The amount of real power that can be transferred in a power system depends on the reactive power/voltage support. Appropriate management of reactive power is indispensable for supporting power system reliability and sec...

Effect of Degassing and Heat Treatment on Microstructure and Mechanical Properties of A356.0

In this present research study, A356.0 was systematically studied on mechanical properties in order to establish the database for further investigation in degassing, heat treatment and microstructure. Because of specifi...

Power Quality Enhancement by Using Multilevel Shunt Active Power Filter with Renewable Energy Sources

A Multi-Level Inverter (MLI) based Shunt Active Power Filter(APF) is considered in this paper. Single MLI-APF is used as both Interfacing converter that processes and connects generated PV power to grid and also for imp...

Download PDF file
  • EP ID EP23630
  • DOI http://doi.org/10.22214/ijraset.2017.3170
  • Views 244
  • Downloads 5

How To Cite

M. Janani, R. Jeevitha (2017). An Algorithm for Creating Malicious Free Absolute Trust Peers in P2P Networks. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 5(3), -. https://europub.co.uk/articles/-A-23630