Enhancing security properties of Rumor Riding protocol under various attacks scenario in P2P network

Non Path Anonymous P2P protocol is called Rumor Riding(RR). In RR protocol the initiator sends the key message and cipher text to different neighbors. The key and cipher text takes random walks separately in the system. Each walk is called rumor. Through the random walk rumor automatically constructs the anonymous path. The initiator nor the responder need not be concerned with the path structure and maintenance. The rumor Riding protocol uses random walk based algorithms which can be easily exploited by uncooperative and malicious nodes. Rumor Riding protocol focuses only on anonymous searching and downloading on P2P systems. But anonymity opens the door to possible misuses and abuses, exploiting the P2P network, giving the chance to attacks like reply attack, Trojan Horse, IP Spoofing. In the Rumor Riding protocol, if the initiator acts as a malicious node, it may send fake request message to the responder, causing network traffic and reduces the performance of the network. If the responder acts as a malicious node, then there are possibilities for replay attack to occur. In reply attack, IP Spoofing takes place where a malicious node can use the IP address of the responder node and acts as the responders node. This eventually reduces the performance of the network. If the Intermediate node acts as a malicious node, it can be a selfish node, making packet drooping and increases the delay in response. So in this paper, we analyze the security issues of Rumor Riding protocol and the simulation results shows less packet delivery ratio, more delay time and less throughput and the poor performance of the Rumor Riding protocol when these attacks occur in RR protocol.