A novel trust model for P2P networks

The characteristics of P2P networks which are open, anonymous, and loosely coupled inter-node lead to false resources, malicious evaluation, and syndicates. A related cluster based trust model for P2P networks named RCTrust is presented in this paper. Peers gather in clusters according to their interest similarity and communication history. There are two kinds of trust relationships. In RCTrust, measure of transaction success rate, communications similarity, honesty and timeliness of evaluation are used as parameters to evaluate the credit of peers. Simulative analysis shows that RCTrust model has robustness against malicious attacks and provides a higher rate of successful transaction.

[1]  Stefan Rührup,et al.  Botnet detection revisited: Theory and practice of finding malicious P2P networks via Internet connection graphs , 2013, INFOCOM.

[2]  Panayiotis Kotzanikolaou,et al.  Chord-PKI: A distributed trust infrastructure based on P2P networks , 2012, Comput. Networks.

[3]  Xin Liu,et al.  Automatic Patching Based on Social Computing in P2P Network , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.

[4]  Song Liu,et al.  TTMP: A Trust-Based Topology Management Protocol for Unstructured P2P Systems , 2012 .

[5]  Yang Bai,et al.  Detecting Malicious Users in P2P Streaming Systems by Using Feedback Correlations , 2013 .

[6]  Hwan-Seok Yang,et al.  A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P , 2016, Peer Peer Netw. Appl..

[7]  Xiaolong Xu,et al.  METrust: A mutual evaluation-based trust model for P2P networks , 2012, Int. J. Autom. Comput..

[8]  Byong-lae Ha,et al.  A Robust Trust Management Scheme against the Malicious Nodes in Distributed P2P Network , 2013 .

[9]  Zou Peng,et al.  A Recommendation-Based Peer-to-Peer Trust Model , 2004 .

[10]  Zhigang Chen,et al.  KFTrust: P2P trust model based on evaluation rank using Kalman filter , 2015, Int. J. Auton. Adapt. Commun. Syst..

[11]  Byeong-Thaek Oh,et al.  A Peer Mutual Authentication Method using PKI on Super Peer based Peer-to-Peer Systems , 2008, 2008 10th International Conference on Advanced Communication Technology.

[12]  Jeong-Kyung Moon,et al.  A security monitoring method for malicious P2P event detection , 2015, Peer-to-Peer Networking and Applications.

[13]  Jingsong Gui,et al.  Fuzzy Theory for the P2P Subject Trust Evaluation Model , 2012 .

[14]  Anne Boyer,et al.  Local Trust Versus Global Trust Networks in Subjective Logic , 2013, 2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT).

[15]  Cheng Tao-yuan Bayesian network-based multiple granularity trust model in P2P , 2007 .