By Topic

A reputation management model using ID based cryptosystem in overlay networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
H. Hakan Kilinc ; Dept. of Electronic Eng., Gebze Institute of Technology, Kocaeli, Turkey

Dealing with malicious nodes is an important issue for many types of overlay networks. In overlay networks, malicious nodes can drop, delay or in other ways subvert user traffic, modify packets and break protocols required for the successful operation of the system. We propose a reputation management model supported by an ID based cryptosystem to reveal a malicious node with the aid of altruistic legitimate nodes who wish to identify a malicious node. We propose a deterrent structure using simple mathematical methods to calculate reputation of nodes. Evaluations show that the cost of malicious behaviours for nodes can be extremely high.

Published in:

2011 7th International Wireless Communications and Mobile Computing Conference

Date of Conference:

4-8 July 2011