By Topic

Reputation Management Techniques in DHT-Based Peer-to-Peer Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Natalya Fedotova ; University of Parma, Italy ; Marco Bertucci ; Luca Veltri

Reputation evaluation and trust management techniques are successfully used in the peer-to-peer (P2P) environment due to its notable similarity to the human community. These techniques present a quite efficient solution to cope with some types of malicious activity in P2P networks. Recently, a great number of P2P platforms use distributed Hash table (DHT) -based overlay-networks that provide effective lookup and storage mechanisms. However, DHT-based networks are a subject to some particular types of attacks. In this paper we present an analysis of applicability of some reputation evaluation techniques as protection from the malicious activity in DHT- based networks.

Published in:

Internet and Web Applications and Services, 2007. ICIW '07. Second International Conference on

Date of Conference:

13-19 May 2007