Opportunistic Trust Based P2P Services Framework for Disconnected MANETs

被引:0
|
作者
Qureshi, Basit [1 ]
Min, Geyong [1 ]
Kouvatsos, Demetres [1 ]
机构
[1] Univ Bradford, Sch Comp Informat & Media, Bradford BD7 1DP, W Yorkshire, England
来源
关键词
Opportunistic routing; Peer-to-peer services; Disconnected MANETs; Trust Management; Pervasive devices;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In delay-tolerant disconnected Mobile Ad-hoc Networks (MANETs), mobile devices communicate with each other as they meet opportunistically establishing peer-to-peer (P2P) connections. Trust management in this type of networks is a challenging task due to the dynamic topology and decentralized nature and has attracted mant recent research interests. In this paper we propose a trust based framework for P2P services in a delay-tolerant disconnected MANET. The proposed framework utilizes a decentralized trust model and a P2P communication protocol for secure file exchange in an opportunistic store-carry and forward mechanism. We discuss the implementation of the framework and experiment with a gnutella style P2P file sharing application in a disconnected MANET. Our results provide important insight into the key challenges and short-comings face by researchers and engineers when designing and deploying such systems.
引用
下载
收藏
页码:154 / 167
页数:14
相关论文
共 50 条
  • [41] Trust Model for P2P Networks
    Ma, Yi
    Wang, Dongqi
    Chen, Dongming
    INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND INTELLECTUALIZATION (ICEITI 2016), 2016, : 562 - 568
  • [42] Study on Trust Model in P2P
    Gan Zhi-gang
    INNOVATIVE COMPUTING AND INFORMATION, ICCIC 2011, PT I, 2011, 231 : 295 - 301
  • [43] An improved trust model in P2P
    Ren, Xiaohui
    Li, Kenli
    Renfa-Li
    Yang, Lei
    APSCC: 2006 IEEE ASIA-PACIFIC CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, 2006, : 76 - +
  • [44] Trust Evaluation for P2P Systems
    Wang Liang
    Guo Yajun
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12592 - 12595
  • [45] P2P Recommendation Trust Model
    Wang, Xuan
    Wang, Lei
    ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 2, PROCEEDINGS, 2008, : 591 - 595
  • [46] A P2P model for SIP based telecom services
    Venkitaraman, Narayanan
    Lillie, Ross
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1166 - 1170
  • [47] Related cluster based trust model for P2P networks
    Ma, Y. (myron_my@163.com), 1600, Northeast University (34):
  • [48] Incentive Strategy Based on Trust Model in P2P Network
    Lu, Yang
    Wang, Xue
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 3, 2010, : 192 - 195
  • [49] A Time-decay based P2P Trust Model
    Zhang, Yong
    Wang, Kewen
    Li, Keqiu
    Qu, Wenyu
    Xiang, Yang
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 235 - +
  • [50] A Fuzzy Trust Management Based on Outlier Identification for P2P
    Luo, Zhen
    Li, Zhishu
    Cai, Biao
    ADVANCED RESEARCH ON INDUSTRY, INFORMATION SYSTEMS AND MATERIAL ENGINEERING, PTS 1-7, 2011, 204-210 : 678 - +