Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model

被引:14
|
作者
Shareh, Morteza Babazadeh [1 ]
Navidi, Hamidreza [2 ]
Javadi, Hamid Haj Seyyed [2 ]
HosseinZadeh, Mehdi [3 ,4 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp, Tehran, Iran
[2] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
[3] Iran Univ Med Sci, Tehran, Iran
[4] Univ Human Dept, Comp Sci, Sulaimanieh, Iraq
关键词
Sybil attacks; Evolutionary game model; Peer-to-Peer file sharing; Free rider; INCENTIVE MECHANISM; SOCIAL NETWORK; PROTOCOL; SCHEMES; NODES;
D O I
10.1016/j.ins.2018.08.054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cooperative Peer-to-Peer (P2P) networks, a number of users, called Free-riders, try to receive service from others without cooperating with them. Some others, called Sybil nodes, break the rules of the system by colluding and showing fake identities. P2P networks are highly vulnerable to these attacks. In previous research, no method has been suggested to counter these two attacks simultaneously. In the proposed method, a new centrality relationship has been used in the incentive mechanism to deal with both problems at the same time. In this regard, the more varied the nodes receiving service from a peer are, the better the peer reputation will be. The results show that the longer the network life goes on, the more free-riders are detected, and the number of services delivered to the collusive nodes will also be reduced. (C) 2018 Published by Elsevier Inc.
引用
收藏
页码:94 / 108
页数:15
相关论文
共 50 条
  • [21] ELiSyR: Efficient, Lightweight and Sybil-Resilient File Search in P2P Networks
    Kim, Hyeong S.
    Jung, Eunjin
    Yeom, Heon Y.
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2010, 4 (06): : 1311 - 1326
  • [22] Load-Balanced and Sybil-Resilient File Search in P2P Networks
    Kim, Hyeong S.
    Jung, Eunjin
    Yeom, Heon Y.
    [J]. PRINCIPLES OF DISTRIBUTED SYSTEMS, 12TH INTERNATIONAL CONFERENCE, OPODIS 2008, 2008, 5401 : 542 - +
  • [23] A trust management model for P2P file sharing system
    Wu, Huafeng
    Shi, Chaojian
    Chen, Haiguang
    Gao, Chuanshan
    [J]. MUE: 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2008, : 41 - +
  • [24] Secure Model for P2P File-Sharing System
    Raj, S. Vishnu
    Indhumathi, Govindaswamy
    [J]. RESEARCH JOURNAL OF PHARMACEUTICAL BIOLOGICAL AND CHEMICAL SCIENCES, 2016, 7 (04): : 239 - 251
  • [25] Research of P2P file sharing model and search strategy
    Zhao Guang-li
    Wu Bei-chun
    [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 65 - 69
  • [26] P2P as a CDN: A new service model for file sharing
    Mondal, Amit
    Trestian, Ionut
    Qin, Zhen
    Kuzmanovic, Aleksandar
    [J]. COMPUTER NETWORKS, 2012, 56 (14) : 3233 - 3246
  • [27] Behavior-based reputation management in P2P file-sharing networks
    Fan, Xinxin
    Li, Mingchu
    Ma, Jianhua
    Ren, Yizhi
    Zhao, Hui
    Su, Zhiyuan
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2012, 78 (06) : 1737 - 1750
  • [28] A willing-to-share based incentive mechanism for file sharing P2P networks
    Sun, Liang
    Cheng, Shiduan
    Lin, Yu
    Wang, Wendong
    [J]. 2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 38 - 43
  • [29] Survey of Network Coding Based P2P File Sharing in Large Scale Networks
    AbuDaqa, Anas A.
    Mahmoud, Ashraf
    Abu-Amara, Marwan
    Sheltami, Tarek
    [J]. APPLIED SCIENCES-BASEL, 2020, 10 (07):
  • [30] Preventing DDoS attacks based on Credit Model for P2P streaming system
    Yang, Jun
    Li, Ying
    Huang, Benxiong
    Ming, Jiuqiang
    [J]. AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2008, 5060 : 13 - +