DOI QR코드

DOI QR Code

Malicious Trust Managers Identification (MTMI) in Peer to Peer Networks

  • Received : 2021.09.05
  • Published : 2021.09.30

Abstract

Peer to Peer Networks play an increasing role in today's networks, also it's expected that this type of communication networks evolves more in the future. Since the number of users that is involved in Peer to Peer Networks is huge and will be increased more in the future, security issues will appear and increase as well. Thus, providing a sustainable solution is needed to ensure the security of Peer to Peer Networks. This paper is presenting a new protocol called Malicious Trust Managers Identification (MTMI). This protocol is used to ensure anonymity of trust manager, that computes and stores the trust value for another peer. The proposed protocol builds a secure connection between trust managers by using public key infrastructure. As well as experimental testing has been conducted to validate the proposed protocol.

Keywords

References

  1. M. K. Riaz, F. Yangyu, and I. Akhtar, "A multidimensional trust inference model for the mobile Ad-Hoc networks," in 2019 28th Wireless and Optical Communications Conference (WOCC), 2019: IEEE, pp. 1-5.
  2. N. Rahimi, "Security consideration in peer-to-peer networks with a case study application," International Journal of Network Security & Its Applications (IJNSA) Vol, vol. 12, 2020.
  3. S. K. Awasthi and Y. Singh, "Absolutetrust: algorithm for aggregation of trust in peer-to-peer networks," IEEE transactions on dependable and secure computing, 2020.
  4. M. D. Istin, A. Visan, F. Pop, and V. Cristea, "SOPSys: Self-Organizing Decentralized Peer-to-Peer System Based on Well Balanced Multi-Way Trees," in P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2010 International Conference on, 4-6 Nov. 2010 2010, pp. 369-374, doi: 10.1109/3pgcic.2010.61.
  5. S. Balfe, A. D. Lakhani, and K. G. Paterson, "Trusted computing: providing security for peer-to-peer networks," in Peer-to-Peer Computing, 2005. P2P 2005. Fifth IEEE International Conference on, 31 Aug.-2 Sept. 2005 2005, pp. 117-124, doi: 10.1109/p2p.2005.40.
  6. S. Aameek and L. Ling, "TrustMe: anonymous management of trust relationships in decentralized P2P systems," in Peer-to-Peer Computing, 2003. (P2P 2003). Proceedings. Third International Conference on, 1-3 Sept. 2003 2003, pp. 142-149, doi: 10.1109/ptp.2003.1231514.
  7. Q. Shaojie, C. Xingshu, and T. Changjie, "Trust: Transaction History Based Peer-to-Peer Trust Model," in Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on, 1-3 Nov. 2007 2007, pp. 242-247, doi: 10.1109/isdpe.2007.34.
  8. A. Visan, F. Pop, and V. Cristea, "Decentralized Trust Management in Peer-to-Peer Systems," in Parallel and Distributed Computing (ISPDC), 2011 10th International Symposium on, 6-8 July 2011 2011, pp. 232-239, doi: 10.1109/ispdc.2011.41.
  9. V. Kumar, "Trust and Security in Peer-to-Peer System," in Database and Expert Systems Applications, 2006. DEXA '06. 17th International Workshop on, 0-0 0 2006, pp. 703-707, doi: 10.1109/dexa.2006.142.
  10. S. Marsh. Formalising trust as a computational concept. In Ph.D. Thesis, University of Stirling, 1994.
  11. J. Douceur. The sybil attack. In IPTPS02 Workshop, Cambridge,MA (USA), March 2002.
  12. E. Sit and R. Morris. Security considerations for peer-to-peer distributed hash tables. In IPTPS02 Workshop, Cambridge,MA (USA), March 2002.
  13. Jung-Tae Kim; Hae-Kyeong Park; Eui-Hyun Paik; , "Security issues in peer-to-peer systems," Advanced Communication Technology, 2005, ICACT 2005. The 7th International Conference on , vol.2, no., pp.1059-1063, 0-0 0.
  14. Yu Wang; Wang Yu; Zhao Yue-long; Hou Fang; , "A New Security Trust Model for Peer-to-Peer E-Commerce," Management of e-Commerce and e-Government, 2008.ICMECG '08. International Conference on , vol., no., pp.399-402, 17-19 Oct. 2008.
  15. Schafer, J.; Malinka, K.; Hanacek, P.; , "Peer-to-Peer Networks Security," Internet Monitoring and Protection, 2008. ICIMP '08.The Third International Conference on , vol., no., pp.74-79, June 29 2008-July 5 2008.