Abstract | ||
---|---|---|
With the increasing deployment of P2P networks, supervising the malicious behaviours of participants, which degrade the quality and performance of the overall delivered service, is a real challenge. In this paper, we propose a fully distributed and adaptive revocation mechanism based on the reputation of the peers. The originality of our approach is that the revocation is integrated in the core of the P2P protocol and does not need complex consensus and cryptographic mechanisms, hardly scalable. The reputation criteria evolve with the contribution of a peer to the network in order to highlight and help fight against selfish or malicious behaviours. The preliminary results show that the user perceived delays are not highly impacted and that our solution is resistant to reputation and revocation attacks. |
Year | DOI | Venue |
---|---|---|
2008 | 10.1109/ICN.2008.124 | ICN |
Keywords | Field | DocType |
cryptographic mechanism,p2p network,revocation attack,adaptive revocation mechanism,increasing deployment,preliminary result,reputation criterion,p2p networks,complex consensus,malicious behaviour,p2p protocol,indium,fault tolerance,p2p,cryptography,networks,collaboration,operations research,degradation,adaptive systems,beryllium,cryptographic protocols,indexing terms | Software deployment,Computer security,Cryptography,Adaptive system,Computer science,Computer network,Peer to peer computing,Originality,Revocation,Scalability,Reputation | Conference |
Citations | PageRank | References |
5 | 0.47 | 10 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Thibault Cholez | 1 | 100 | 11.89 |
Isabelle Chrisment | 2 | 225 | 25.75 |
Olivier Festor | 3 | 665 | 85.40 |