Proxy-Based Security-Feedback Trust Model in MP2P Network

Article Preview

Abstract:

Trust problem is a key issue for Mobile P2P (MP2P) network security. In MP2P network, terminals addressing mode, communication way and display identifier are different to traditional P2P network. Some security issues such as: malicious slander and collusion, free ride phenomenon, are even more serious compared to traditional P2P network. Aimed at these above issues, a Proxy-based Security-Feedback Trust Model (PSTM) is proposed. Different types of terminals access to different proxy servers to shield the discrepancy between different terminal equipments on MP2P equipment access network layer. Meanwhile, proxy servers can reduce the problem of single point failure with method of trust related tables backup and recovery. Certificate Feedback Raters identification and qualification through security resource-selection protocol then integrate trust information according to similarity of terminal and resource types with weight. Furthermore, set global contribution value and evaluation value in multi-granularity trust computation to motivate mobile peers honest feedbacks. Divide mobile peers direct trust value into peer-oriented and resource-oriented values to make trust feedbacks more authentic. Simulation experiments show that PSTM can reduce malicious slander and collusion effectively. It also can restrain self-ish peers free ride behaviors and increase successful cooperation rate of high-contributed nodes in MP2P network.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1144-1151

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Basit Q, Geyong M. A distributed reputation and trust management scheme for mobile peer-to-peer networks[J]. Computer Communications. Vol. 35(5) (2011), pp.608-618.

DOI: 10.1016/j.comcom.2011.07.008

Google Scholar

[2] Xu Wu. A distributed trust management model for mobile P2P networks[J]. Peer-to-Peer Networking and Applications. Springer Science. pp.193-204 (2012).

DOI: 10.1007/s12083-011-0103-9

Google Scholar

[3] Zhiyuan Li. A dynamic security trust model for mobile P2P networks[J]. Chinese Journal of Electronics, Vol. 40(1) (2012), pp.1-7 (In Chinese).

Google Scholar

[4] Yan Ren, Pingan Ren, Zhenqiang Wu, et al. Multiple granularity trust model in mobile P2P network [J]. Computer Engineering and Applications. Vol. 45(6) (2009), pp.137-140(In Chinese).

Google Scholar

[5] Jameel H, Hung L, Kalim U, et al. A trust model for ubiquitous systems based on vectors of trust values[C]. /Proc of the 7th IEEE Int'l Symp. on Multimedia. Washington: IEEE Computer Society Press, p.674−679 (2005).

DOI: 10.1109/ism.2005.22

Google Scholar