Identifying Collusion Attacks in P2P Trust and Reputation Systems

@inproceedings{Saini2014IdentifyingCA,
  title={Identifying Collusion Attacks in P2P Trust and Reputation Systems},
  author={Nitin Saini and Amit Chaturvedi and R. C. Yadav},
  year={2014}
}
Internet became today a medium of sharing large amount of data among different nodes situated anywhere in the world. Due to its fairly open nature Peer to Peer applications gain-ing popularity in sharing of large data rather then conventional client-server systems. Many P2P applications has been designed for the purpose of content distribution over Internet and most of them are based on decentralized Peer to peer architecture. Although absence of a central server, peers can communicate directly… CONTINUE READING

Citations

Publications citing this paper.

Robustness of trust-based protection (TUBE) scheme to reputation attacks in military mobile ad-hoc networks

  • 2015 International Conference on Military Communications and Information Systems (ICMCIS)
  • 2015
VIEW 1 EXCERPT
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-10 OF 16 REFERENCES

A reputation system model based on indication to combat pollution in p2p networks

Fabiola Bento Soares, Newarney Torrezao da Costa, Luis Fernando. Faina, Jamil Salem Barbar
  • CTRQ
  • 2012

́ınez P ́erez. Security threats scenarios in trust and reputation models for distributed systems

Felix Gomez Marmol, Gregorio Mart
  • Com-puters & Security,
  • 2009
VIEW 2 EXCERPTS

An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System

  • 27th International Conference on Distributed Computing Systems (ICDCS '07)
  • 2007
VIEW 2 EXCERPTS

Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems

  • Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007)
  • 2007