The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobility model and network topology play important roles in mobile ad hoc networks (MANETs). Most existing trust and reputation management systems in a MANET do not address mobility issues adequately. In this paper, we study the trust management problem in a MANET with cyclic movement patterns. In a cyclic MANET (cMANET) where nodes periodically move, we formulate trust management problems and propose...
In unstructured P2P networks there is a possibility of malicious codes and false transactions. It generates the false identities in order to perform false transactions with other identities. The proposed method uses the concept of DHT and reputation management which provides efficient file searching. The self certification (RSA and MD5) is used for ensuring secure and timely availability of the reputation...
Nowadays, several network applications require that consumer nodes acquire distributed services from unknown service providers on the Internet. The main goal of consumer nodes is the selection of the best services among the huge multitude provided by the network. As basic criteria for this choice, service cost and Quality-of-Service (QoS) can be considered, provided that the underlying Service-Oriented...
In P2P file sharing, problems can occur due to harmful content distributed by malicious peers and many solutions using reputation management have been proposed. However, none of these solutions are effective in relay-transfer P2P file sharing where a peer automatically relays content and creates content caches. This is because all the existing solutions only allow an evaluation of the peers without...
In this paper, we present a framework to facilitate reputation-based service selection with reputation management, which has three key features. First, we use a structured overlay network as the decentralized service repository system for improved efficiency. Second, we propose an adaptive QoS-aware service discovery approach. Then, we present a service-oriented distributed reputation assessment algorithm...
We study the unique trust management, and more precisely reputation management and revocation of malicious ad hoc nodes used for emergency communications.Unlike in centralized systems, reputation management and revocation in ad hoc networks is non-trivial. This difficulty is due to the fact that the nodes have to collaboratively calculate the reputation value of a particular node and then revoke the...
In open file-sharing P2P systems, there is generally no direct control or constraint on the participation of peers. Thus, Churn and Free-Riding become great challenges to these systems. This paper proposes a reputation management system based on sustained online duration (SOD-based system) to optimize the resources utilization in file-sharing P2P systems. In the SOD-based system, peers can enhance...
Reputation management is a specific form of trust management. Reputation is measured from direct or indirect knowledge of previous interactions between nodes. Individual nodes can rely on their direct experiences or can obtain reputation information from other peers. Nodes can use this reputation information to distinguish good from bad service providers. However, due to the distributed topology of...
In P2P networks, peers generally interact with unknown or unfamiliar peers without trusted third parties that can manage the behaviors of peers or control the malicious peers. They can give harm to correct peers by providing inauthentic resources for the benefit of themselves in resource sharing. Under this situation, peers can refer the reputation that reflects peer's past behaviors to download the...
DHT-based peer-to-peer networks represent a particular environment with specific security problems. Some types of malicious activity in this kind of networks can cause the same problems as Byzantine failure in distributed computer systems. In this work we propose to integrate solutions for Byzantine Agreement (BA) used in distributed computing environment and reputation mechanisms designed for P2P...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.