IMPLEMENTATION OF REPUTATION EXCHANGE PROTOCOL IN PEER-TO-PEER SYSTEM

Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 3

Abstract

The motivation behind basing applications on peer-to-peer architectures derives to a large extent from their ability to function, scale and self-organize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server and the overhead of its administration. P2P networks are vulnerable to peers, who cheat, propagate malicious codes, or peers who do not cooperate. Traditional client-server security models are not sufficient to P2P networks because of their centralized nature. Absence of central authority in P2P poses unique challenges like identity management of the peers, secure reputation data management and Sybil attack for reputation management in the network. In this paper we present a cryptographic protocol for ensuring secure and timely availability of the reputation data of a peer extremely at low cost. The past behavior of the peer is encapsulated in its digital reputation and is subsequently used to predict the future actions. The cryptographic protocol is coupled with self-certification and cryptographic mechanisms for identity management and countering Sybil attacks. The latency associated with a file replication in a P2P system consists of two components: the query search time and the time required by the peers to transmit the file. In order to model the peer level latency, we develop a queuing model to evaluate the time required at each peer to serve its replication requests.

Authors and Affiliations

B. Udhaya , J. Jeysree

Keywords

Related Articles

SECURITY MEASURES OF RANDVUL KEYBOARD

Phishing is a “con trick” by which consumers are sent email urporting to originate from legitimate services like banks or ther financial institutions. Phishing can be thought of as the marriage of social gineering an...

iImplementation of AMBA AHB protocol for high capacity memory management using VHDL

Microprocessor performance has improved rapidly these years. In contrast memory latencies and bandwidths have improved little. The result is that the memory access time is the bottleneck which limits the system performan...

IMPLEMENTATION OF TASK DISSEMINATION IN WIRELESS SENSOR NETWORKS USING MESH TOPOLOGY

Wireless sensor networks, trend of the past few years involves in eploying a large number of small nodes. The nodes then sense nvironmental changes and report them to other nodes over flexible network architecture. A p...

Recognizing faces with single sample per subject using fusion of transforms

Face recognition has attracted attention of the researchers. Face recognition becomes challenging if various factors are considered such as varying illumination, pose, facial expression and somewhat occlusion. The face r...

Performance Evaluation of Ad Hoc On Demand Distance Vector in MANETs with varying Network Size using NS-2 Simulation

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes dynamically forming a network topology without the use of any existing network infrastructure or centralized administration. Routing is the task of...

Download PDF file
  • EP ID EP97306
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

B. Udhaya, J. Jeysree (2011). IMPLEMENTATION OF REPUTATION EXCHANGE PROTOCOL IN PEER-TO-PEER SYSTEM. International Journal on Computer Science and Engineering, 3(3), 1290-1294. https://europub.co.uk/articles/-A-97306