Advanced Computing and Communication Technologies for HPC Applications |
Foundation of Computer Science USA |
ACCTHPCA - Number 2 |
July 2012 |
Authors: Swapna H, Jayasudha J. S, Sabu M Thampi |
0503f053-8df4-42aa-9f32-c2411cfbbe14 |
Swapna H, Jayasudha J. S, Sabu M Thampi . A Trust Model for Identifying Malicious Behavior in P2P Networks. Advanced Computing and Communication Technologies for HPC Applications. ACCTHPCA, 2 (July 2012), 7-13.
Peer-to-Peer (P2P) systems allow all peers to communicate and share resources with equal responsibility thereby eliminating the need for central authorities. These networks have gained wide popularity in providing services ranging from file sharing to distributed computing applications. In P2P networks the peers can join or leave the system dynamically and so the network topology changes due to this behavior. These features of a P2P make it vulnerable to different types of attacks. Trust and Reputation models can be used to minimize the impact of such threats. This paper proposes a trust model to identify malicious nodes in a P2P network. The main aim of the paper is to deploy a trust model for determining the trust value of peers with the notion of avoiding malicious ones. In this paper the global trust of a base peer is computed by only those set of peers that are reliable to the base peer. This can greatly help to reduce the computation and communication overhead associated with other trust and reputation based models where all the interacted peers have to respond to compute the global trust of the base peer. The proposed model takes the responsibility to detect malicious nodes and eliminates them from the system.