Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model

被引:14
|
作者
Shareh, Morteza Babazadeh [1 ]
Navidi, Hamidreza [2 ]
Javadi, Hamid Haj Seyyed [2 ]
HosseinZadeh, Mehdi [3 ,4 ]
机构
[1] Islamic Azad Univ, Sci & Res Branch, Dept Comp, Tehran, Iran
[2] Shahed Univ, Dept Math & Comp Sci, Tehran, Iran
[3] Iran Univ Med Sci, Tehran, Iran
[4] Univ Human Dept, Comp Sci, Sulaimanieh, Iraq
关键词
Sybil attacks; Evolutionary game model; Peer-to-Peer file sharing; Free rider; INCENTIVE MECHANISM; SOCIAL NETWORK; PROTOCOL; SCHEMES; NODES;
D O I
10.1016/j.ins.2018.08.054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cooperative Peer-to-Peer (P2P) networks, a number of users, called Free-riders, try to receive service from others without cooperating with them. Some others, called Sybil nodes, break the rules of the system by colluding and showing fake identities. P2P networks are highly vulnerable to these attacks. In previous research, no method has been suggested to counter these two attacks simultaneously. In the proposed method, a new centrality relationship has been used in the incentive mechanism to deal with both problems at the same time. In this regard, the more varied the nodes receiving service from a peer are, the better the peer reputation will be. The results show that the longer the network life goes on, the more free-riders are detected, and the number of services delivered to the collusive nodes will also be reduced. (C) 2018 Published by Elsevier Inc.
引用
收藏
页码:94 / 108
页数:15
相关论文
共 50 条
  • [41] Reliable P2P file sharing service
    Shin, Jung-Hwa
    Shin, Weon
    Rhee, Kyung-Hyune
    [J]. AGENTS AND PEER-TO-PEER COMPUTING, 2008, 4461 : 143 - +
  • [42] A conservative strategy to protect P2P file sharing systems from pollution attacks
    Barcellos, Marinho Pilla
    Gaspary, Luciano Paschoal
    da Costa Cordeiro, Weverton Luis
    Antunes, Rodolfo Stoffel
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2011, 23 (01): : 117 - 141
  • [43] A Method of Identifying the P2P File Sharing
    Chen, Jian-Bo
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (11): : 111 - 115
  • [44] The power of P2P beyond file sharing
    Zhang, XD
    [J]. 25th IEEE International Conference on Distributed Computing Systems Workshops, Proceedings, 2005, : 781 - 781
  • [45] A Preventing Fraud Trust Model in P2P Networks
    Liu, Siming
    Yu, Yang
    Xu, Jiaxing
    Huang, Zhenguang
    [J]. 2012 IEEE 26TH INTERNATIONAL PARALLEL AND DISTRIBUTED PROCESSING SYMPOSIUM WORKSHOPS & PHD FORUM (IPDPSW), 2012, : 2305 - 2311
  • [46] Research on the Epidemic Model in P2P File-sharing System
    Yang, Wei
    Ying, Wei
    Chang, Gui-ran
    Zhang, Zhuo-qun
    [J]. HIS 2009: 2009 NINTH INTERNATIONAL CONFERENCE ON HYBRID INTELLIGENT SYSTEMS, VOL 2, PROCEEDINGS, 2009, : 386 - +
  • [47] Security access model of P2P file-sharing system
    Wang, Jinsong
    Wang, Ning
    Liu, Weiwei
    Wu, GongYi
    [J]. DCABES 2007 Proceedings, Vols I and II, 2007, : 544 - 547
  • [48] Dynamic Model of Growing File-Sharing P2P Network
    A. I. Kononova
    L. G. Gagarina
    [J]. Automatic Control and Computer Sciences, 2020, 54 : 645 - 651
  • [49] Research of Trust Model in P2P File-Sharing System
    Zhao Yulan
    Jiang Chunfeng
    [J]. 2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B, 2012, 12 : 1208 - 1212
  • [50] Dynamic Model of Growing File-Sharing P2P Network
    Kononova, A. I.
    Gagarina, L. G.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (07) : 645 - 651