Scheduling Peers Based on Credit Construction Period in Peer-to-Peer Networks

被引:0
|
作者
Hou, Lei [1 ]
Duan, Haixin [1 ]
Wu, Jianping [1 ]
机构
[1] Tsinghua Univ, Beijing 100084, Peoples R China
关键词
D O I
10.1109/ICPADS.2008.42
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In Peer-to-Peer (P2P) networks if adversaries such as Sybil attackers have got most identities in the network, they will control routing table or traffic. In this paper, we propose a framework based on two complementary techniques to defense malicious node after they transmit data to other malicious peers instead of honest peers. The first approach, based on behaviors of destination nodes, is used to count the local nodes' credit values in a period of Credit Construction Time. The second approach is updating the global nodes' credit values between schedulers. We propose scheduler to maintain the trust relationship between global nodes. In order to assess the effectiveness of the above techniques, we extend Eclipse attack code in simulator p2pSim-0.3 and implement scheduler defense malicious attack behavior algorithm based on both credit and proximity. We adopt Chord protocol and Euclidean topology to implement scheduling algorithm, but the same methodology can be applied to other protocols and topologies as well.
引用
收藏
页码:470 / 477
页数:8
相关论文
共 50 条
  • [1] An analysis of peer-to-peer networks with altruistic peers
    Vassilakis, Dimitrios K.
    Vassalos, Vasilis
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2009, 2 (02) : 109 - 127
  • [2] An analysis of peer-to-peer networks with altruistic peers
    Dimitrios K. Vassilakis
    Vasilis Vassalos
    [J]. Peer-to-Peer Networking and Applications, 2009, 2 : 109 - 127
  • [3] Seed Scheduling for Peer-to-Peer Networks
    Esposito, Flavio
    Matta, Ibrahim
    Michiardi, Pietro
    Mitsutake, Nobuyuki
    Carra, Damiano
    [J]. 2009 8TH IEEE INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS, 2009, : 28 - +
  • [4] Satistiability and trustworthiness of peers in peer-to-peer overlay networks
    Nakajima, Yoshio
    Watanabe, Kenichi
    Hayashibara, Naohiro
    Enokido, Tomoya
    Takizawa, Makoto
    Deen, S. Misbah
    [J]. FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 42 - +
  • [5] On the impact of seed scheduling in peer-to-peer networks
    Esposito, Flavio
    Matta, Ibrahim
    Bera, Debajyoti
    Michiardi, Pietro
    [J]. COMPUTER NETWORKS, 2011, 55 (15) : 3303 - 3317
  • [6] Cluster Based Peers Configuration using HCNP in Peer-to-Peer Overlay Networks
    Kazmi, Irum
    Aslam, Saira
    Javed, M. Y.
    [J]. 2010 SECOND INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2010, : 158 - 163
  • [7] Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches
    Li, Gengxian
    Wang, Chundong
    Wang, Huaibin
    [J]. FUTURE INTERNET, 2022, 14 (10):
  • [8] Online scheduling of splittable tasks in peer-to-peer networks
    Epstein, L
    van Stee, R
    [J]. ALGORITHM THEORY- SWAT 2004, 2004, 3111 : 408 - 419
  • [9] A Simple Analysis of the Transient Period in Peer-to-Peer Networks
    Ko, Young Myoung
    [J]. IEEE COMMUNICATIONS LETTERS, 2015, 19 (09) : 1528 - 1531
  • [10] Dynamic Resource Allocation for Credit-based Peer-to-Peer Multimedia Streaming Networks
    Kang, Xin
    Wu, Yongdong
    [J]. 2013 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2013, : 1501 - 1506