Removing dubious feedback from mobile wireless ad hoc peer-to-peer systems

In MObile wireless ad hoc Peer-to-Peer NETworks (MOPNETs), Reputation-based Trust Management (RTM) is essential for peers to choose reliable resources and trusted cooperators. However, outliers or misbehaving peers often overpraise their friends while denigrating strange peers. As a result, it is challenging to guarantee the validation and accuracy of RTM In this paper, we propose an extensive RTM scheme, TruthMOP. TruthMOP encourages peers to provide honest feedback by involving the quality of their evaluations of others into computing reputations. The simulation results show that TruthMOP can effectively mitigate the impact of dubious feedback in MOPNETs.

[1]  Yunhao Liu,et al.  Virtual Surrounding Face Geocasting with Guaranteed Message Delivery for Ad Hoc and Sensor Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[2]  Li Xiao,et al.  Improving Query Response Delivery Quality in Peer-to-Peer Systems , 2006, IEEE Transactions on Parallel and Distributed Systems.

[3]  David K. Y. Yau,et al.  Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach , 2006, IEEE/ACM Transactions on Networking.

[4]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[5]  Yunhao Liu A Two-Hop Solution to Solving Topology Mismatch , 2008, IEEE Transactions on Parallel and Distributed Systems.

[6]  Li Xiao,et al.  Location awareness in unstructured peer-to-peer systems , 2005, IEEE Transactions on Parallel and Distributed Systems.

[7]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[8]  Yunhao Liu,et al.  Difficulty-Aware Hybrid Search in Peer-to-Peer Networks , 2009, IEEE Trans. Parallel Distributed Syst..

[9]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[10]  Li Xiao,et al.  Dynamic Layer Management in Superpeer Architectures , 2005, IEEE Trans. Parallel Distributed Syst..

[11]  Yunhao Liu,et al.  Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems , 2006, IEEE Transactions on Parallel and Distributed Systems.

[12]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[13]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[14]  Yunhao Liu,et al.  VOVO: VCR-Oriented Video-on-Demand in Large-Scale Peer-to-Peer Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[15]  Vana Kalogeraki,et al.  Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.

[16]  Daniel Stutzbach,et al.  Characterizing the two-tier gnutella topology , 2005, SIGMETRICS '05.

[17]  Jean-Yves Le Boudec,et al.  Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).

[18]  Hitay Özbay,et al.  Introduction to Feedback Control Theory , 1999 .

[19]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[20]  Yunhao Liu,et al.  Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , 2007, PerCom.

[21]  Li Xiao,et al.  DiCAS: An Efficient Distributed Caching Mechanism for P2P Systems , 2006, IEEE Transactions on Parallel and Distributed Systems.

[22]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[23]  Yunhao Liu,et al.  Scalable Live Streaming Service Based on Interoverlay Optimization , 2007, IEEE Transactions on Parallel and Distributed Systems.

[24]  Li Fan,et al.  Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[25]  Li Xiao,et al.  Building a Scalable Bipartite P2P Overlay Network , 2007, IEEE Trans. Parallel Distributed Syst..

[26]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[27]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[28]  Ibrahim Matta,et al.  BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.

[29]  Yunhao Liu,et al.  Dubious feedback: fair or not? , 2006, InfoScale '06.

[30]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.