Skip to Main Content
Reputation evaluation and trust management techniques are successfully used in the peer-to-peer (P2P) environment due to its notable similarity to the human community. These techniques present a quite efficient solution to cope with some types of malicious activity in P2P networks. Recently, a great number of P2P platforms use distributed Hash table (DHT) -based overlay-networks that provide effective lookup and storage mechanisms. However, DHT-based networks are a subject to some particular types of attacks. In this paper we present an analysis of applicability of some reputation evaluation techniques as protection from the malicious activity in DHT- based networks.