A secure model for controlling the hubs in P2P wireless network based on trust value

Yuhua Liu, Naixue Xiong, Yuling Li, Kaihua Xu, Jong Hyuk Park, Chuan Lin

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

Recently a lot of efforts are focused on the most promising solutions in future communication environments with information and communication security technologies. As a result of anonymity and contribution resources voluntary of nodes in P2P wireless network, the overwhelming nodes lack enthusiasm when they provide service, which is easy to cause free riding phenomenon. Thus, it leads to the emergence of hubs. Due to the existence of hubs in P2P wireless networks, the network becomes much more vulnerable because of great reducing in defending against coordinated attacks. Therefore, in this paper we provide a secure model for controlling the hubs in P2P network based on trust value. In detail, this paper proposes a model based on trust value of nodes against vulnerability, which not only takes into account a node's connections, but also gives full consideration about a node's trust value. The calculation of trust value is broken down to various types of resources. In accordance with the type of pre-transaction resources, the nodes that have higher trust value and fewer connections are chosen to make transaction. Simulation results demonstrate that this model can encourage nodes to participate in sharing recourses with other nodes in the network actively, and simultaneously it can avoid generating hubs effectively. Our model could improve the ability of defending against coordinated attacks, and also could enhance the network robustness and stability.

Original languageEnglish
Pages (from-to)997-1004
Number of pages8
JournalComputer Communications
Volume33
Issue number8
DOIs
StatePublished - 17 May 2010

Keywords

  • Free riding
  • Incentive
  • Peer-to-peer
  • Pyramidal structure
  • Security

Fingerprint

Dive into the research topics of 'A secure model for controlling the hubs in P2P wireless network based on trust value'. Together they form a unique fingerprint.

Cite this