Implementation of P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains

Free registration required

Executive Summary

In this paper, the authors investigate Reputation Systems for P2P networks more ambitious approach to protect the P2P network without using any central component, and thereby harnessing the full benefits of the P2P network. The reputations of the peers are used to determine whether a peer is a malicious peer or a good peer. Once detected, the malicious peers are ostracized from the network as the good peers do not perform any transactions with the malicious peers. Expulsion of malicious peers from the network significantly reduces the volume of malicious activities. All peers in the P2P network are identified by identity certificates.

  • Format: PDF
  • Size: 1110.3 KB