A Distributed Decision-Making Mechanism for Wireless P2P Networks

  • Wu, Xu (College of Computer Science and Technology, Beijing University of Technology) ;
  • He, Jingsha (College of Computer Science and Technology, Beijing University of Technology) ;
  • Xu, Fei (College of Computer Science and Technology, Beijing University of Technology) ;
  • Zhang, Xi (Networking Technologies Department, Beijing Boren Jirui Company)
  • 발행 : 2009.08.31

초록

Trust-based solutions provide some form of payment to peers to encourage good behavior. The problem with trust management systems is that they require prior knowledge to work. In other words, peers are vulnerable to attack if they do not have knowledge or correct knowledge of other peers in a trust management system. Therefore, considering only trust is inadequate when a decision is made to identify the best set of peers to utilize. In order to solve the problem, we propose a distributed decision-making mechanism for wireless peer-to-peer (P2P) networks based on game theory and relevant trust mechanisms in which we incorporate the element of trust and risk into a single model. The main idea of our mechanism is to use utility function to express the relationship between benefits and costs of peers, and then make the decision based on expected utility as well as risk attitude in a fully distributed fashion. The unique feature of our mechanism is that it not only helps a peer to select its partners, but also mitigates vulnerabilities in trust-based mechanisms. Through analysis and experiments, we believe our approach is useful for peers to make the decision regarding who to interact with. In addition, it is also a good starting point for exploring tradeoffs among risk, trust and utility.

키워드

참고문헌

  1. D. Figueirdo. J. Shapiro. and D. Towsley. "Incentives to promote avail ability in peer-to-peer anonymity systems;' in Proc. 13th ICNP. 2005. pp. 110-121
  2. M. Feldman, K. Lai, and I. Stoica, "Robust incentive techniques for peerto-peer networks," in Proc. 5th ECC/ACM ECC, New York, USA, Oct2004, pp. 102-111
  3. D. Donato, M. Paniccia, M. Selis, C. Castillo, G. Cortese, and S Leonardi, "New metrics for reputation management in P2P networks," in Proc. 3rd Workshop on Adversarial Infonnation Retrieval on the Web, Canada, May 2007, pp.65-72
  4. Z. Yan and P. Zhang, "Trust collaboration in P2P systems based on trusted computing platforms," WSEAS Trans. Mag. , vol. 3, pp. 275-282, Feb 2006
  5. X. Wu, J. S. Hε and F. Xu, "An enhanced trust model based on reputationfor P2P networks," in Proc. SUTC/IEEE, Taichung, Taiwan, June 2008, pp.67-73
  6. R. Anderson and T. Moore, "The economics of information security," imScience 314, Oct. 2000, pp. 610-613
  7. C. English, S. Terzis, and W. Wagealla, "Engineering trust based collaborations in a global computing environment," in Proc. 2th iTRUST/IEEE iTrust, Oxford, UK, 2004, pp. 135-145
  8. M. Deutsch, "Trust and suspicion," Confict Resolution. Mag., vol. 2, pp.265-279, 1958 https://doi.org/10.1177/002200275800200401
  9. S. D. Kamvar and M. T. Schlosser, "The eigenTrust algorithm for rep utation management in P2P networks," in Proc. 12th WWW, Budapest, Bulgaria,May 2003, pp. 640-651
  10. R. Zhou and K. Hwang, "PowerTrust: A robust and scalable reputation system for trusted P2P computing," IEEE Trans. Parallel Distrib. Syst. , vol. 18, May 2007
  11. I. Ajzen, "The theory of planed bεhavior, "Organizational Behavior and Human Decision Processes, vol. 50, pp. 197-211, 1991
  12. J. V. Neumann and O. Morgenstern, Theory of Games and Economic Behavior, Princeton, Princeton Univ, 1947
  13. K. R. Gardner, Games for Business ad Economics, John Wiley and Sons, 1995
  14. C. Q. Tian, S. H. Zou, W.-D. WANG, and S.-D. Cheng, "A new trust modelbased on recommendation evidence for P2P networks," in Proc. Chinese J. Comput. , Zurich, Switzerland, vol. 31, 2008, pp. 271-281
  15. 2004. Cambridge dictionaries online. [Online]. Available: http://diction ary.cambridge.org
  16. L. Xiong and L. Liu, "PeerTrust: Supporting reputation-based trust for peer-to-pεer electronic communities," IEEE Trans. Knowl. Data Eng., vol. 16, pp. 843-857, 2004
  17. Y. Wang and K. J. Lin, "Reputation-oriented trustworthy computing in ecommerce environments, "IEEE Intemet Comput., pp. 55-59, 2008
  18. A. Bieszczad, B. Pagurek, and T. White, "Mobile agents for network management,' IEEE Commun. Surveys, vol. 1, Sept. 1998
  19. 2005. Merriam-webster online. [Online]. http://www.webster.com