Consistency-based trust management in P2P networks

  title={Consistency-based trust management in P2P networks},
  author={Yasin Şahin and Ahmet Burak Can},
  journal={Turkish J. Electr. Eng. Comput. Sci.},
Detecting malicious peers is a challenging task in peer-to-peer networks due to their decentralized structure and lack of central authority. Trust models can help identify malicious peers by maintaining information about peer relations and interactions. Keeping information about trust relations helps to reduce risks when providing or using services. This paper introduces two consistency concepts in trust management. Feedback consistency is used to evaluate how consistent feedback is with… 
1 Citations

Figures from this paper

A Trust Management System for Multi-agent System in Smart Grids using Blockchain Technology
A blockchain-based trust management system for MAS that enables an agent to perform direct and indirect trust evaluations of other agents during interactions and is secure against bad-mouthing and on-off attacks.


SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems
This paper presents distributed algorithms that enable a peer to reason about trustworthiness of other peers based on past interactions and recommendations that can mitigate attacks on 16 different malicious behavior models.
A reputation-based trust management system for P2P networks
A reputation-based trust management protocol for P2P networks where users rate the reliability of parties they deal with, and share this information with their peers to establish trust among good peers as well as identifying the malicious ones.
Trust Model Based on Similarity Measure of Vectors in P2P Networks
Recurring to the trust model of society network, a trust model based on similarity measure of vectors and a distributed implementation scheme based on R-Chain are proposed and theoretic analysis and simulation show that this model is effective and has favorable feasibility of implementation.
The Eigentrust algorithm for reputation management in P2P networks
An algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global trust value, based on the peer's history of uploads is described.
FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust Model
A robust feedback credibility (FC) based distributed P2P global trust model (FCTrust) is proposed, used for quantifying and evaluating the trustworthiness of participants, and demonstrates more robustness and effectiveness.
GenTrust: A genetic trust management model for peer-to-peer systems
A Distributed Trust-based Reputation Model in P2P System
  • Yu-Mei Liu, Shoubao Yang, Leitao Guo
  • Computer Science
    Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
  • 2007
A distributed trust-based reputation model in p2p system (TBRM) to avoid the trick of the false reputation feedback and shows that the proposed TBRM algorithm can get quick convergence, high equity for both low and high reputation nodes, and can get a high successful rate of file- downloading.
Managing trust in a peer-2-peer information system
It is expected that scalable methods for trust management are an important factor, if fully decentralized peer-to-peer systems should become the platform for more serious applications than simple file exchange.
STTM: Similarity Transitivity Chain Based Trust Model in P2P Environment
A new trust model, named Similarity Transitivity chain based Trust Model (STTM), is proposed, to evaluate peers' global trust more precisely and sharply decreases the mean error of trust estimation and performs better than other trust models.
Reliable and Resilient Trust Management in Distributed Service Provision Networks
This article presents ServiceTrust++, a feedback quality--sensitive and attack resilient trust management scheme for empowering distributed service networks with effective trust management capability that is highly resilient against all six attack models and highly effective compared to EigenTrust, the most popular and representative trust propagation model to date.