Using K-nearest neighbor algorithm to reduce false negatives in P2P secure routing protocols

A peer-to-peer (P2P) system is known for its scalability and dynamic nature, where nodes can join and leave the system easily and at any time. These networks are susceptible to malicious behavior such as nodes dropping messages and misleading other nodes. P2P routing protocols are not immune against such incidents. Additionally, most secure routing protocols in the literature suffer from false negatives. In this paper, we propose to use the K-nearest neighbor (K-nn) algorithm in order to reduce false negatives in P2P secure routing protocols. We incorporate the proposed algorithm in a chord based trust aware P2P routing protocol, and evaluate its performance using the PeerSim simulator. Preliminary simulation results demonstrate that the proposed algorithm reduces the rate of false negatives without impacting the malicious node detection rate.

[1]  Wassim El-Hajj,et al.  Trust Aware System for P2P Routing Protocols , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[2]  Gade Krishna,et al.  A scalable peer-to-peer lookup protocol for Internet applications , 2012 .

[3]  Dong Xuan,et al.  RChord: an enhanced Chord system resilient to routing attacks , 2003, 2003 International Conference on Computer Networks and Mobile Computing, 2003. ICCNMC 2003..

[4]  Chow-Sing Lin,et al.  Dynamic peer buffer adjustment to improve service availability on peer-to-peer on-demand streaming networks , 2014, Peer Peer Netw. Appl..

[6]  D. Milojicic,et al.  Peer-to-Peer Computing , 2010 .

[7]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[8]  Shueng-Han Gary Chan,et al.  Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring , 2010, TOMCCAP.

[9]  Andrei V. Gurtov,et al.  Hierarchical architectures in structured peer-to-peer overlay networks , 2014, Peer Peer Netw. Appl..

[10]  Jianguo Chen,et al.  A Secure Routing Protocol for Peer-to-Peer Network , 2010, J. Convergence Inf. Technol..

[11]  Nipun Bansal,et al.  Peer to Peer Networking and Applications , 2013 .

[12]  Peter E. Hart,et al.  Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.

[13]  Tan Jin,et al.  Efficient Secure Message Routing for Structured Peer-to-Peer Systems , 2009, 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing.

[14]  Reza Akbarinia,et al.  Building a peer-to-peer content distribution network with high performance, scalability and robustness , 2011, Inf. Syst..

[15]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..