Secure Group Communication by Establishing a Novel Trust Relationship Model and Detecting Malicious nodes in Peer to Peer Systems

Abstract

Trust administration in P2P framework is utilized to distinguish vindictive practices and to advance legitimate and agreeable communications. The fundamental objective of the prior P2P frameworks is the capacity of conglomerating assets, which expect certain trustworthiness level of companions. In any case, as P2P frameworks become immensely in size, there will be an impressive number of vindictive companions who convey security assaults and dangers to the entire system. In a disseminated foundation without concentrated server for power, giving security instrument is more confused than in server-driven arrangements, as the presence of different locales builds the defenselessness and security endeavors must be reproduced at various destinations. In this way security issues are one of the significant difficulties that should be deliberately dissected and tended to, particularly for completely decentralized unstructured P2P frameworks. A ton of examines are being directed to enhance the trust administration in shared framework. A few notoriety based trust administration frameworks are investigated here. In this paper, we present building trust connections among associates can alleviate assaults of malevolent companions. This paper presents dispersed calculations that empower a companion to reason about reliability of different associates in view of past cooperation’s and suggestions. Companions make their own particular trust system in their nearness by utilizing nearby data accessible and don't attempt to learn worldwide trust data.

Authors and Affiliations

M Ruby, K Venkatarao

Keywords

Related Articles

Information Density Cache Strategy in Wireless Ad-Hoc Networks

Data caching strategy for ad hoc networks whose nodes exchange information items in a peer to peer fashion. Data caching is a fully distributes scheme where each node upon receiving request information determines the...

Modeling of Single-Phase Semi-Z-source Inverter

This paper presents several single-phase non-isolated semi-Z-source inverters for small distributed power generator in grid-connected applications with low cost and doubly grounded features. These semi-Z-source invert...

Biometric Security Techniques For IRIS Recognition System

Iris recognition is an automated method of biometric identification that uses mathematical patternrecognition techniques on video images of the irides of an individual's eyes, whose complex random patterns are unique...

COMPARISON AND STATISTICAL ANALYSIS OF NAM AND NORMAL SPEECH PROCESSING USING WAVELET TRANSFORM

In this, we present statistical approaches to enhance body-conducted unvoiced speech for silent speech communication using wavelet transform. So far Analysis of NAM speech has been made only using HMM (Hidden Markov...

An improved contourlet transform technique for image watermarking

In this paper, contourlet transform technique is explored to hide the information confidentially from the unauthorized users. The image is decomposed into subbands by using contourlet transform. These subbands are us...

Download PDF file
  • EP ID EP28365
  • DOI -
  • Views 295
  • Downloads 4

How To Cite

M Ruby, K Venkatarao (2015). Secure Group Communication by Establishing a Novel Trust Relationship Model and Detecting Malicious nodes in Peer to Peer Systems. International Journal of Research in Computer and Communication Technology, 4(12), -. https://europub.co.uk/articles/-A-28365