International Journal of Computer Applications
Peer-To-Peer (P2P) systems allow all peers to communicate and share resources with equal responsibility thereby eliminating the need for central authorities. These networks have gained wide popularity in providing services ranging from file sharing to distributed computing applications. In P2P networks the peers can join or leave the system dynamically and so the network topology changes due to this behavior. These features of a P2P make it vulnerable to different types of attacks. Trust and Reputation models can be used to minimize the impact of such threats. This paper proposes a trust model to identify malicious nodes in a P2P network.