Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model

被引:14
|
作者
Shareh, Morteza Babazadeh [1 ]
Navidi, Hamidreza [2 ]
Javadi, Hamid Haj Seyyed [2 ]
HosseinZadeh, Mehdi [3 ,4 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp, Tehran, Iran
[2] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
[3] Iran Univ Med Sci, Tehran, Iran
[4] Univ Human Dept, Comp Sci, Sulaimanieh, Iraq
关键词
Sybil attacks; Evolutionary game model; Peer-to-Peer file sharing; Free rider; INCENTIVE MECHANISM; SOCIAL NETWORK; PROTOCOL; SCHEMES; NODES;
D O I
10.1016/j.ins.2018.08.054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cooperative Peer-to-Peer (P2P) networks, a number of users, called Free-riders, try to receive service from others without cooperating with them. Some others, called Sybil nodes, break the rules of the system by colluding and showing fake identities. P2P networks are highly vulnerable to these attacks. In previous research, no method has been suggested to counter these two attacks simultaneously. In the proposed method, a new centrality relationship has been used in the incentive mechanism to deal with both problems at the same time. In this regard, the more varied the nodes receiving service from a peer are, the better the peer reputation will be. The results show that the longer the network life goes on, the more free-riders are detected, and the number of services delivered to the collusive nodes will also be reduced. (C) 2018 Published by Elsevier Inc.
引用
收藏
页码:94 / 108
页数:15
相关论文
共 50 条
  • [31] Public domain P2P file sharing networks content and their evolution
    Lloret, J
    Diaz, JR
    Jiménez, JM
    Esteve, M
    [J]. Proceedings of the Fourth IASTED International Conference on Communication Systems and Networks, 2005, : 230 - 234
  • [32] A Protocol for File Sharing, Anonymous and Confidential, Adapted to P2P Networks
    Riahla, Mohamed Amine
    Tamine, Karim
    Gaborit, Philipe
    [J]. 2012 6TH INTERNATIONAL CONFERENCE ON SCIENCES OF ELECTRONICS, TECHNOLOGIES OF INFORMATION AND TELECOMMUNICATIONS (SETIT), 2012, : 549 - 557
  • [33] Incentives for P2P File Sharing in Mobile Ad Hoc Networks
    Mawji, Afzal
    Hassanein, Hossam
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 336 - 340
  • [34] P2P Incentive Model On Evolutionary Game Theory
    Feng, Huibin
    Zhang, Shunyi
    Liu, Chao
    Yan, Junrong
    Zhang, Ming
    [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3325 - 3328
  • [35] A UDP based protocol for distributed P2P file sharing
    Lien, Yao-Nan
    Xu, Hong-Qi
    [J]. EIGHTH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2007, : 318 - +
  • [36] Fuzzy Based Approach for P2P File Sharing Detection
    Chen, Jian-Bo
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2011, 12 (06): : 921 - 929
  • [37] Features Based Approach to Identify the P2P File Sharing
    Chen, Jian-Bo
    [J]. INNOVATIONS AND ADVANCES IN COMPUTER SCIENCES AND ENGINEERING, 2010, : 147 - 151
  • [38] Recommendation Based P2P File Sharing on Disconnected MANET
    Bhargavi, V. Sesha
    Spandana, T.
    [J]. PROCEEDINGS OF 2ND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND APPLICATIONS, 2017, 467 : 209 - 221
  • [39] An Interest-based P2P File Sharing System
    Shen, Haiying
    [J]. 2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 136 - 137
  • [40] Pollution in P2P file sharing systems
    Liang, J
    Kumar, R
    Xi, YJ
    Ross, KW
    [J]. IEEE INFOCOM 2005: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2005, : 1174 - 1185