A Trust Model for Identifying Malicious Behavior in P2P Networks

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
Peer-To-Peer (P2P) systems allow all peers to communicate and share resources with equal responsibility thereby eliminating the need for central authorities. These networks have gained wide popularity in providing services ranging from file sharing to distributed computing applications. In P2P networks the peers can join or leave the system dynamically and so the network topology changes due to this behavior. These features of a P2P make it vulnerable to different types of attacks. Trust and Reputation models can be used to minimize the impact of such threats. This paper proposes a trust model to identify malicious nodes in a P2P network.

Find By Topic