The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When low power mobile devices communicate over short range wireless networks using technologies such as WiFi, Bluetooth, ZigBee etc., the contacts are often opportunistic and intermittent due to range, mobility and energy constraint. While the DTN architecture provides a framework to support opportunistic and intermittent connectivities, existing DTN routing algorithms do not consider application...
Malicious collectives represent one of the biggest threats for secured P2P applications. In our previous work, we proposed a trust management system called Bubble Trust targeting this problem. In this paper, we investigate the most common malicious strategies as well as the resistance the Bubble Trust uses against them. We created the simulation framework suitable for testing other TMSs in the same...
In this paper we present the concept of community downloads as a mechanism to improve the overall performance of BitTorrent clients. A community is a group of nodes interested in the same content working cooperatively inside a swarm. To reinforce this cooperation among community nodes, we designed two new algorithms: Group Rarest-First (piece selection) and Group-Balanced Tit-for-tat (unchoke policy)...
Distributed environments hosting specific and dedicated computing resources are serving nowadays more and more scientific and commercial applications. Finding the right resource in distributed environments in term of performance is not an obvious task. This paper is addressing the issue of selecting the right service deployed in a distributed environment for any applications or workflow engines that...
Trust in Peer to Peer network has the fuzzy feature, and thus it cannot be described and handled using distinct mathematic model. To solve the problem, based on the advantage of using intuitionistic fuzzy theory to handle vague information, we propose a novel P2P trust model named IFTM (Intuitionistic Fuzzy theory based Trust Model), which uses membership, nonmembership and hesitancy degree to describe...
BGP prefix hijacking is one of the main threatens for the Internet. It is important to identify the impact factors for prefix hijacking. This paper studies the problem from the view of AS logical topology by analysis of the data from the snapshots of CAIDA. We propose a hierarchical model based on AS relationship to classify the AS nodes into different level and define core size of each node to prioritize...
The proliferation of peer-to-peer systems has led to the increasing deployment of dynamic, adaptive overlay networks that are designed to preserve application performance goals. While such networks provide increased performance and resiliency to benign faults, they are susceptible to attacks conducted by compromised overlay nodes, especially those targeting the adaptation mechanisms. In this work,...
Content pollution is one of the major issues affecting P2P file sharing networks. However, since early studies on FastTrack and Overnet, no recent investigation has reported its impact on current P2P networks. In this paper, we present a method and the supporting architecture to quantify the pollution of contents in the KAD network. We first collect information on many popular files shared in this...
The problem of defining P2P overlays where peers characterized by similar interests are directly connected is currently an important research issue. We have recently proposed a two layer P2P architecture where the first layer exploits a gossip algorithm for the detection of communities of peers characterized by similar interests, while the second layer defines a DHT storing the profiles of the communities...
P2P content providers are motivated to localize traffic within Autonomous Systems and therefore alleviate the tension with ISPs stemming from costly inter-AS traffic generated by geographically distributed P2P users. In this paper, we first present a new three-tier framework to conduct a thorough study on the impact of various capacity aware or locality aware neighbor selection and chunk scheduling...
BitTorrent is one of the most popular application in the current Internet. However, we still have little knowledge about the topology of real BitTorrent swarms and how the traffic is actually exchanged among peers. This paper addresses fundamental questions regarding the topology of live BitTorrent swarms. For this purpose we have collected the evolution of the graph topology of 250 real torrents...
Recently, peer-to-peer (P2P) search technique has become popular in the Web as an alternative to centralized search due to its high scalability and low deployment-cost. Various P2P search systems have been proposed to support full-text search. However, P2P search systems are known to suffer from the problem of peer dynamics, such as frequent peer churn and content evolution, which cause serious performance...
Digital Business Ecosystem (DBE) is a decentralised environment where very small enterprises (VSEs) and small to medium sized enterprises (SMEs) interoperate by establishing collaborations with each other. Collaborations play a major role in the development of DBEs where it is often difficult to select partners, as they are most likely strangers. Even though trust forms the basis for collaboration...
Social applications implemented on a peer-to-peer (P2P) architecture mine the social graph of their users for improved performance in search, recommendations, resource sharing and others. In such applications, the social graph that connects their users is distributed on the peer-to-peer system: the traversal of the social graph translates to a socially-informed routing in the peer-to-peer layer. In...
As the rapid development of P2P application, many applications based on P2P technology are produced and applied over the Internet. Therefore, searching efficiency, bandwidth utilization rate, average download time and throughput become the key issues of P2P. In order to improve the performance of P2P applications, we propose an integration of search and incentive strategy (ISI) in this paper, which...
Trust and trustworthiness are significant measurements of a distributed sensing system or a heterogeneous network comprised of sources of information, knowledge, hardware and software. In an effort to design a unified trust model that can be made adaptable to changing application environments, we present fundamental features and rules extracted from literature pertaining to wireless sensor networks,...
Although peer-to-peer system is scalable for content distribution, its lifespan is shorter than traditional systems. More and more researchers pay close attention to swarm lifespan and propose specialized methods to extend it. Bundling technique and SRE (Share Ratio Enforcement) mechanism in Private Tracker system are two successful enhancements which are proved by practical systems. However, they...
Local knowledge routing schemes based on virtual coordinates taken from the hyperbolic plane have attracted considerable interest in recent years. In this paper, we propose a new approach for seizing the power of the hyperbolic geometry. We aim at building a scalable and reliable system for creating and managing overlay networks over the Internet. The system is implemented as a peer-to-peer infrastructure...
This paper presents a resource finding and allocation scheme for Grid-/Cloud-computing systems, called SWHYGRA (Small-World HYperspace-based Grid Resource Allocation). It models the overall system using a decentralized peer-to-peer approach organizing the nodes in an overlay network featuring specific convenient properties. SWHYGRA intends to exploit the small-world effect, by employing an algorithm...
Trust representation and management has been studied in in the context of various information for a long time. Originally a digital equivalent of human trust, trust in information system is used for different purposes. In this paper we surveyed studies on how trust is represented and managed in previous trust/reputation systems. We focus on how trust in information systems is formed-manually or automatically,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.