Non Path Anonymous P2P protocol is called Rumor Riding(RR). In RR protocol the initiator sends the key message and cipher text to different neighbors. The key and cipher text takes random walks separately in the system. Each walk is called rumor. Through the random walk rumor automatically constructs the anonymous path. The initiator nor the responder need not be concerned with the path structure and maintenance. The rumor Riding protocol uses random walk based algorithms which can be easily exploited by uncooperative and malicious nodes. Rumor Riding protocol focuses only on anonymous searching and downloading on P2P systems. But anonymity opens the door to possible misuses and abuses, exploiting the P2P network, giving the chance to attacks like reply attack, Trojan Horse, IP Spoofing. In the Rumor Riding protocol, if the initiator acts as a malicious node, it may send fake request message to the responder, causing network traffic and reduces the performance of the network. If the responder acts as a malicious node, then there are possibilities for replay attack to occur. In reply attack, IP Spoofing takes place where a malicious node can use the IP address of the responder node and acts as the responders node. This eventually reduces the performance of the network. If the Intermediate node acts as a malicious node, it can be a selfish node, making packet drooping and increases the delay in response. So in this paper, we analyze the security issues of Rumor Riding protocol and the simulation results shows less packet delivery ratio, more delay time and less throughput and the poor performance of the Rumor Riding protocol when these attacks occur in RR protocol.
[1]
Stefan Kraxberger,et al.
Trusted Identity Management for Overlay Networks
,
2013,
ISPEC.
[2]
Yunhao Liu,et al.
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
,
2007,
2007 IEEE International Parallel and Distributed Processing Symposium.
[3]
Wei Cheng,et al.
Correlation Trust Authentication Model for Peer-to-Peer Networks
,
2013
.
[4]
P. Devika,et al.
Bruit Bait : Peer To Peer Systems
,
2012
.
[5]
Xingming Sun,et al.
Survey of Anonymity and Authentication in P2P Networks
,
2010
.
[6]
Yunhao Liu,et al.
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
,
2011,
IEEE Trans. Parallel Distributed Syst..
[7]
James Li,et al.
A Survey of Peer-to-Peer Network Security Issues
,
2008
.
[8]
Yong Wang,et al.
Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems
,
2014,
Wirel. Pers. Commun..