By Topic

A novel feedback based fast adaptive trust model for P2P networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Das, A. ; Dept. of Comput. Sci. &'||';'||' Eng., Bangladesh Univ. of Eng. &'||';'||' Technol., Dhaka, Bangladesh ; Islam, M.M.

Peer-to-peer (P2P) networks have shown great potentials in providing a wide range of services starting from simple file sharing to distributed computing. However, P2P systems present ominous threats due to its anonymous and dynamic nature. One feasible way to minimize the threats is to evaluate the trust and reputation of the interacting peers. Trust models have often been deployed in determining the trust of peers in the network with the view to avoiding the malicious ones. Most of the existing trust models can successfully isolate malicious peers when the peers behave in a predictable way while others even fail to do so. On the other hand, these models suffer greatly when peers start to behave in a unpredictable way. Moreover, these models are ineffective in providing quick response to a peer's dynamic personality. To cope with such strategically altering behavior we present in this paper, a feedback based fast adaptive trust model which takes into account various factors in computing the trust of peers including recent trend, historical trend, sudden deviation of trust and so on. Simulations show that our model compared to other existing models can effectively identify and isolate the dynamic behavioral change of malicious peers.

Published in:

Local Computer Networks (LCN), 2010 IEEE 35th Conference on

Date of Conference:

10-14 Oct. 2010