By Topic

SPTM: A Security Protocol for Protecting the P2P Trust Information Management

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jianli Hu ; Sch. of Comput., Nat. Univ. of Defense Technol., Changsha ; Quanyuan Wu ; Bin Zhou

The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peerspsila behaviors with the trust mechanism and how to establish the reputation-based trust management mechanism, but takes no consideration of the security problems in trust information management. As for this issue, this paper proposes a security protocol for protecting the P2P trust information management (SPTM). Theoretical analysis and simulation experiments show that, SPTM can effectively suppress the sybil attackers and trust information tamper peers in transmissions with little time overhead. Moreover, it can be easily integrated into various reputation-based TMSs.

Published in:

Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC '09. International Conference on  (Volume:1 )

Date of Conference:

25-26 April 2009