Peer-to-Peer (P2P) systems have the ability to bond with millions of clients in business and knowledge
scenario. The mechanism that leads users to distribute files without the need of centralized servers has
achieved wide recognition among internet users. This also permits for a range of applications further than
simple file sharing. he main problem lies in the fact that peers have to customarily intermingle with
mysterious peers in the absence of trusted third parties. Usually the lack of incentives often makes these
strange peers to act as freeriders and thus reduce the system performance. The trustworthiness among
peers is portrayed by applying the knowledge obtained as a result of reputation mechanisms. This paper
endows with a new reputation model in association with a detailed survey of diverse reputation models. The
proposed model suggests a hybrid reputation model through dynamic regrouping..
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model IJECEIAES
In order to evaluate the trustworthiness of participating peers in unstructured peer-to-peer networks, Reputation aggregation methods are used in this method. Each and every peer of the network will collect the local scores of each transaction and will compute global scores by aggregating all the local scores with the help of global scores, each individual peer can interact with its suitable peers. But the existing method will not consider the score of the new peer. In this condition, requests are handled by existing peers who leads to failure in downloading process. To rectify this, NP-TRUST model is used to distribute the request to all peers including the newly joined peers. The proposed method is compared with gossip and DFR-TRUST model in Transaction Success rate and variation in file request.
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct trust is the impact of either first impression over the entity or acquired during some direct interaction. Indirect trust is the trust may be due to either reputation gained or recommendations received from various recommenders of a particular domain in a grid or any other domain outside that grid or outside that grid itself. Unfortunately, malicious indirect trust leads to the misuse of valuable resources of the grid. This paper proposes the mechanism of identifying and purging the untrustworthy recommendations in the grid environment. Through the obtained results, we show the way of purging of untrustworthy entities.
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
The trust and reputation models were introduced to restrain the impacts caused by rational but selfish
peers in P2P streaming systems. However, these models face with two major challenges from dishonest
feedback and strategic altering behaviors. To answer these challenges, we present a global trust model
based on network community, evaluation correlations, and punishment mechanism. We also propose a
two-layered overlay to provide the function of peers’ behaviors collection and malicious detection.
Furthermore, we analysis several security threats in P2P streaming systems, and discuss how to defend
with them by our trust mechanism. The simulation results show that our trust framework can successfully
filter out dishonest feedbacks by using correlation coefficients. It can effectively defend against the
security threats with good load balance as well.
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
Recommender systems have become an important tool for personalization of online services. Generating
recommendations in online services depends on privacy-sensitive data collected from the users. Traditional
data protection mechanisms focus on access control and secure transmission, which provide security only
against malicious third parties, but not the service provider. This creates a serious privacy risk for the
users. This paper aims to protect the private data against the service provider while preserving the
functionality of the system. This paper provides a general framework that, with the help of a preprocessing
phase that is independent of the inputs of the users, allows an arbitrary number of users to securely
outsource a computation to two non-colluding external servers. This paper use these techniques to
implement a secure recommender system based on collaborative filtering that becomes more secure, and
significantly more efficient than previously known implementations of such systems.
An exaustive survey of trust models in p2 p networkijwscjournal
Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Abstract Peers are more likely to get exposed to malicious activities in P2P system due to its open nature, building the trust environment in P2P can mitigate these attacks. This paper is about the implementation of SORT model in peer to peer systems. The SORT model deals with the isolation of malicious and trusted peer in the LAN (Local Area Network). The isolation is done on the basis of the file uploaded by a peer, i.e. if he uploads an infected file in the proximity then the SORT model restricts the download of the infected file and thus protect the other peers from getting affected by the virus. File download is treated as an interaction. On each interaction there is calculation of some trust factor and the values are assigned by the downloader according to his satisfaction. Every peer calculates its own trust values regarding to other peers. These values are need to decide the further interactions in the network. Two types of attacks are mitigated by this model are Service based and Recommendation based. This project mainly deals with the security in the P2P system and acknowledges the peer whether the service he wants to use is clean or infected. This Project is implemented in Advanced JAVA and the MySQL database is used. The MVC architecture is used for building of this project. Peer calculate the trust metrics of each peer in its proximity they does this locally and do not tend to be global. Keywords: P2P systems, Trusted Environment, Reputation, Recommendation, Security, Services.
A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model IJECEIAES
In order to evaluate the trustworthiness of participating peers in unstructured peer-to-peer networks, Reputation aggregation methods are used in this method. Each and every peer of the network will collect the local scores of each transaction and will compute global scores by aggregating all the local scores with the help of global scores, each individual peer can interact with its suitable peers. But the existing method will not consider the score of the new peer. In this condition, requests are handled by existing peers who leads to failure in downloading process. To rectify this, NP-TRUST model is used to distribute the request to all peers including the newly joined peers. The proposed method is compared with gossip and DFR-TRUST model in Transaction Success rate and variation in file request.
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
In grid computing, trust has massive significance. There is lot of research to propose various models in providing trusted resource sharing mechanisms. The trust is a belief or perception that various researchers have tried to correlate with some computational model. Trust on any entity can be direct or indirect. Direct trust is the impact of either first impression over the entity or acquired during some direct interaction. Indirect trust is the trust may be due to either reputation gained or recommendations received from various recommenders of a particular domain in a grid or any other domain outside that grid or outside that grid itself. Unfortunately, malicious indirect trust leads to the misuse of valuable resources of the grid. This paper proposes the mechanism of identifying and purging the untrustworthy recommendations in the grid environment. Through the obtained results, we show the way of purging of untrustworthy entities.
A MALICIOUS USERS DETECTING MODEL BASED ON FEEDBACK CORRELATIONSIJCNC
The trust and reputation models were introduced to restrain the impacts caused by rational but selfish
peers in P2P streaming systems. However, these models face with two major challenges from dishonest
feedback and strategic altering behaviors. To answer these challenges, we present a global trust model
based on network community, evaluation correlations, and punishment mechanism. We also propose a
two-layered overlay to provide the function of peers’ behaviors collection and malicious detection.
Furthermore, we analysis several security threats in P2P streaming systems, and discuss how to defend
with them by our trust mechanism. The simulation results show that our trust framework can successfully
filter out dishonest feedbacks by using correlation coefficients. It can effectively defend against the
security threats with good load balance as well.
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
Recommender systems have become an important tool for personalization of online services. Generating
recommendations in online services depends on privacy-sensitive data collected from the users. Traditional
data protection mechanisms focus on access control and secure transmission, which provide security only
against malicious third parties, but not the service provider. This creates a serious privacy risk for the
users. This paper aims to protect the private data against the service provider while preserving the
functionality of the system. This paper provides a general framework that, with the help of a preprocessing
phase that is independent of the inputs of the users, allows an arbitrary number of users to securely
outsource a computation to two non-colluding external servers. This paper use these techniques to
implement a secure recommender system based on collaborative filtering that becomes more secure, and
significantly more efficient than previously known implementations of such systems.
An exaustive survey of trust models in p2 p networkijwscjournal
Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
SelCSP: A Framework to Facilitate Selection of Cloud Service Providers1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
Abstract Peers are more likely to get exposed to malicious activities in P2P system due to its open nature, building the trust environment in P2P can mitigate these attacks. This paper is about the implementation of SORT model in peer to peer systems. The SORT model deals with the isolation of malicious and trusted peer in the LAN (Local Area Network). The isolation is done on the basis of the file uploaded by a peer, i.e. if he uploads an infected file in the proximity then the SORT model restricts the download of the infected file and thus protect the other peers from getting affected by the virus. File download is treated as an interaction. On each interaction there is calculation of some trust factor and the values are assigned by the downloader according to his satisfaction. Every peer calculates its own trust values regarding to other peers. These values are need to decide the further interactions in the network. Two types of attacks are mitigated by this model are Service based and Recommendation based. This project mainly deals with the security in the P2P system and acknowledges the peer whether the service he wants to use is clean or infected. This Project is implemented in Advanced JAVA and the MySQL database is used. The MVC architecture is used for building of this project. Peer calculate the trust metrics of each peer in its proximity they does this locally and do not tend to be global. Keywords: P2P systems, Trusted Environment, Reputation, Recommendation, Security, Services.
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsNicolas Kourtellis
Social applications implemented on a peer-to-peer (P2P) architecture mine the social graph of their users for improved performance in search, recommendations, resource
sharing and others. In such applications, the social graph that connects their users is distributed on the peer-to-peer system: the traversal of the social graph translates to a socially-informed routing in the peer-to-peer layer.
In this work we introduce the model of a projection graph that is the result of mapping a social graph onto a peer-to-peer network. We analytically formulate the relation between metrics in the social graph and in the projection graph. We focus on three such graph metrics: degree centrality, node betweenness centrality, and edge betweenness centrality. We evaluate experimentally the feasibility of estimating these metrics in the projection graph from the metrics of the social graph. Our experiments on real networks show that when mapping communities of 50-150 users on a peer, there is an optimal organization of the projection graph with respect to degree and node betweenness centrality. In this range, the association between the properties of the social graph and the projection graph is the highest, and thus the properties of the (dynamic) projection graph can be inferred from
the properties of the (slower changing) social graph. We discuss the applicability of our findings to aspects of peer-to-peer systems such as data dissemination, social search, peer vulnerability, and data placement and caching.
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems. Nicolas Kourtellis and Adriana Iamnitchi. In Proceedings of 11th IEEE International Conference on Peer-to-Peer Computing (P2P'11), Kyoto, Japan, Aug 2011
Heterogeneous Device-to-Device mobile networks
are characterised by frequent network disruption and unreliability
of peers delivering messages to destinations. Trust-based
protocols has been widely used to mitigate the security and
performance problems in D2D networks. Despite several efforts
made by previous researchers in the design of trust-based routing
for efficient collaborative networks, there are fewer related
studies that focus on the peers’ neighbourhood as a routing
metrics’ element for a secure and efficient trust-based protocol.
In this paper, we propose and validate a trust-based protocol
that takes into account the similarity of peers’ neighbourhood
coefficients to improve routing performance in mobile HetNets
environments. The results of this study demonstrate that peers’
neighbourhood connectivity in the network is a characteristic
that can influence peers’ routing performance. Furthermore, our
analysis shows that our proposed protocol only forwards the
message to the companions with a higher probability of delivering
the packets, thus improving the delivery ratio and minimising
latency and mitigating the problem of malicious peers ( using
packet dropping strategy).
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
Recent advances in mobile communication and development of sophisticated equipments lead to the wide spread use of Location Based Services (LBS). A major concern for large-scale deployment of LBSs is the potential abuse of their client location data, which may imply sensitive personal information. Protecting location information of the mobile user is challenging because a location itself may reveal user identity. Several schemes have been proposed for location cloaking. In our paper, we propose a generic Enhanced Location Privacy Model (LPM), which describes the concept, the architecture, algorithms and the functionalities for location privacy in LBS. As per the architecture, the system ensures location privacy, without trusting anybody including the peers or LBS servers. The system is fully distributed and evaluation shows its efficiency and high level of privacy with QoS
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...IJCNCJournal
In this paper, we consider the problem of calculating the node reputation in a Peer-toPeer (P2P) system from fragments of partial knowledge concerned with the trustfulness of nodes which are subjectively given by each node (i.e., evaluator) participating in the system. We are particularly interested in the distributed processing of the calculation of reputation scores while preserving the privacy of evaluators. The basic idea of the proposed method is to extend the EigenTrust reputation management system with the notion of homomorphic cryptosystem. More specifically, it calculates the main eigenvector of a linear system which models the trustfulness of the users (nodes) in the P2P system in a distributed manner, in such a way that: 1) it blocks accesses to the trust value by the nodes to have the secret key used for the decryption, 2) it improves the efficiency of calculation by offloading a part of the task to the participating nodes, and 3) it uses different public keys during the calculation to improve the robustness against the leave of nodes. The performance of the proposed method is evaluated through numerical calculations.
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
Security is considered as one of the major challenge when it comes to infrastructure less and self dependent network without any centralized control. The vulnerability of Adhoc Network makes it susceptible to external attacks like flooding of hello messages or propagating fake routing messages etc. Such attacks generates a variety of problems like disturbing the network by flooding messages that results in waste of battery which is a vital resource to maintain the life span of the network. Most importantly cause agents to die when unable to reach destination due to fake routing messages causing a heavy loss on part of the nodes generating them to maintain the route knowledge. The paper proposes a novel technique to identify the flooding attack and measure to overcome them using Multi-Agent system
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...IJCNCJournal
Machine learning (ML) and Deep Learning (DL) methods are being adopted rapidly, especially in computer network security, such as fraud detection, network anomaly detection, intrusion detection, and much more. However, the lack of transparency of ML and DL based models is a major obstacle to their implementation and criticized due to its black-box nature, even with such tremendous results. Explainable Artificial Intelligence (XAI) is a promising area that can improve the trustworthiness of these models by giving explanations and interpreting its output. If the internal working of the ML and DL based models is understandable, then it can further help to improve its performance. The objective of this paper is to show that how XAI can be used to interpret the results of the DL model, the autoencoder in this case. And, based on the interpretation, we improved its performance for computer network anomaly detection. The kernel SHAP method, which is based on the shapley values, is used as a novel feature selection technique. This method is used to identify only those features that are actually causing the anomalous behaviour of the set of attack/anomaly instances. Later, these feature sets are used to train and validate the autoencoderbut on benign data only. Finally, the built SHAP_Model outperformed the other two models proposed based on the feature selection method. This whole experiment is conducted on the subset of the latest CICIDS2017 network dataset. The overall accuracy and AUC of SHAP_Model is 94% and 0.969, respectively.
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
Mobile Adhoc Networks are becoming very popular in current Wireless Technology, which is been
associated to business, socially and in some critical applications like Military etc, The network which is
formed by self configuring wireless links which are connected to each other. These applications are
categorized by hostile environment that they serve while communicating between nodes. However in such
Wireless Network will be more exposed to different types of security attacks. The challenge is to meet
secure network communication. In this paper we focus on cluster based secure communication to improve
the reliability between clusters. In this scheme the Cluster Members (CM) submits a report to the Cluster
Head (CH) and temporarily stores Evidences as a security tokens. The reports contain digital signatures.
The CH will verify the consistency of the CM report and updates to Accounting Centre (AC). AC will verify
the uniformity of reports and clears the cryptographic operations. For attacker nodes, the security tokens
are requested to classify and expel the attacker nodes which submit wrong reports.
P2P DOMAIN CLASSIFICATION USING DECISION TREE ijp2p
The increasing interest in Peer-to-Peer systems (such as Gnutella) has inspired many research activities
in this area. Although many demonstrations have been performed that show that the performance of a
Peer-to-Peer system is highly dependent on the underlying network characteristics, much of the
evaluation of Peer-to-Peer proposals has used simplified models that fail to include a detailed model of
the underlying network. This can be largely attributed to the complexity in experimenting with a scalable
Peer-to-Peer system simulator built on top of a scalable network simulator. A major problem of
unstructured P2P systems is their heavy network traffic. In Peer-to-Peer context, a challenging problem
is how to find the appropriate peer to deal with a given query without overly consuming bandwidth?
Different methods proposed routing strategies of queries taking into account the P2P network at hand.
This paper considers an unstructured P2P system based on an organization of peers around Super-Peers
that are connected to Super-Super-Peer according to their semantic domains; in addition to integrating
Decision Trees in P2P architectures to produce Query-Suitable Super-Peers, representing a community
of peers where one among them is able to answer the given query. By analyzing the queries log file, a
predictive model that avoids flooding queries in the P2P network is constructed after predicting the
appropriate Super-Peer, and hence the peer to answer the query. A challenging problem in a schemabased Peer-to-Peer (P2P) system is how to locate peers that are relevant to a given query. In this paper,
architecture, based on (Super-)Peers is proposed, focusing on query routing. The approach to be
implemented, groups together (Super-)Peers that have similar interests for an efficient query routing
method. In such groups, called Super-Super-Peers (SSP), Super-Peers submit queries that are often
processed by members of this group. A SSP is a specific Super-Peer which contains knowledge about: 1.
its Super-Peers and 2. The other SSP. Knowledge is extracted by using data mining techniques (e.g.
Decision Tree algorithms) starting from queries of peers that transit on the network. The advantage of
this distributed knowledge is that, it avoids making semantic mapping between heterogeneous data
sources owned by (Super-)Peers, each time the system decides to route query to other (Super-) Peers.
The set of SSP improves the robustness in queries routing mechanism, and the scalability in P2P
Network. Compared with a baseline approach,the proposal architecture shows the effect of the data
mining with better performance in respect to response time and precision.
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Study on security and quality of service implementations in p2 p overlay netw...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and reputation models in P2P network regarding service provisioning is presented and challenges are listed. Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
ABSTRACT
Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
MEKDA: Multi-Level ECC based Key Distribution and Authentication in Internet ...IJCNCJournal
The Internet of Things (IoT) is an extensive system of networks and connected devices with minimal human interaction and swift growth. The constraints of the System and limitations of Devices pose several challenges, including security; hence billions of devices must protect from attacks and compromises. The resource-constrained nature of IoT devices amplifies security challenges. Thus standard data communication and security measures are inefficient in the IoT environment. The ubiquity of IoT devices and their deployment in sensitive applications increase the vulnerability of any security breaches to risk lives. Hence, IoT-related security challenges are of great concern. Authentication is the solution to the vulnerability of a malicious device in the IoT environment. The proposed Multi-level Elliptic Curve Cryptography based Key Distribution and Authentication in IoT enhances the security by Multi-level Authentication when the devices enter or exit the Cluster in an IoT system. The decreased Computation Time and Energy Consumption by generating and distributing Keys using Elliptic Curve Cryptography extends the availability of the IoT devices. The Performance analysis shows the improvement over the Fast Authentication and Data Transfer method.
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
An ad hoc network is a group of wireless mobile hosts that are connected momentarily through
wireless connections in the dearth of any centralized control or some supporting services. The
mobile ad hoc network is at risk by its environment because of the vulnerabilities at channel and
node level. The conventional security mechanisms deals with only protecting resources from unauthorized access, but are not capable to safeguard the network from who offer resources. Adding trust to the on hand security infrastructures would improvise the security of these environments. A trust oriented security framework for adhoc network using ontological engineering approach is proposed by modeling ad hoc network, the OLSR (Optimized Link State Routing) protocol and trust model as OWL (Ontology Web language) ontologies, which are integrated using Jena. In this model, a trustor can calculate its trust about trustee and use the calculated trust values to make decisions depending on the context of the application or interaction about granting or rejecting it. A number of experiments with a potential implementation of suggested framework are performed to validate the characteristics of a trust oriented model suggested by the literature by this framework
Inferring Peer Centrality in Socially-Informed Peer-to-Peer SystemsNicolas Kourtellis
Social applications implemented on a peer-to-peer (P2P) architecture mine the social graph of their users for improved performance in search, recommendations, resource
sharing and others. In such applications, the social graph that connects their users is distributed on the peer-to-peer system: the traversal of the social graph translates to a socially-informed routing in the peer-to-peer layer.
In this work we introduce the model of a projection graph that is the result of mapping a social graph onto a peer-to-peer network. We analytically formulate the relation between metrics in the social graph and in the projection graph. We focus on three such graph metrics: degree centrality, node betweenness centrality, and edge betweenness centrality. We evaluate experimentally the feasibility of estimating these metrics in the projection graph from the metrics of the social graph. Our experiments on real networks show that when mapping communities of 50-150 users on a peer, there is an optimal organization of the projection graph with respect to degree and node betweenness centrality. In this range, the association between the properties of the social graph and the projection graph is the highest, and thus the properties of the (dynamic) projection graph can be inferred from
the properties of the (slower changing) social graph. We discuss the applicability of our findings to aspects of peer-to-peer systems such as data dissemination, social search, peer vulnerability, and data placement and caching.
Inferring Peer Centrality in Socially-Informed Peer-to-Peer Systems. Nicolas Kourtellis and Adriana Iamnitchi. In Proceedings of 11th IEEE International Conference on Peer-to-Peer Computing (P2P'11), Kyoto, Japan, Aug 2011
Heterogeneous Device-to-Device mobile networks
are characterised by frequent network disruption and unreliability
of peers delivering messages to destinations. Trust-based
protocols has been widely used to mitigate the security and
performance problems in D2D networks. Despite several efforts
made by previous researchers in the design of trust-based routing
for efficient collaborative networks, there are fewer related
studies that focus on the peers’ neighbourhood as a routing
metrics’ element for a secure and efficient trust-based protocol.
In this paper, we propose and validate a trust-based protocol
that takes into account the similarity of peers’ neighbourhood
coefficients to improve routing performance in mobile HetNets
environments. The results of this study demonstrate that peers’
neighbourhood connectivity in the network is a characteristic
that can influence peers’ routing performance. Furthermore, our
analysis shows that our proposed protocol only forwards the
message to the companions with a higher probability of delivering
the packets, thus improving the delivery ratio and minimising
latency and mitigating the problem of malicious peers ( using
packet dropping strategy).
A survey on cost effective survivable network design in wireless access networkijcses
In today’s technology, the essential property for wireless communication network is to exhibit as a
dependable network. The dependability network incorporates the property like availability, reliability and
survivability. Although these factors are well taken care by protocol for wired network, still there exists
huge lack of efficacy for wireless network. Further, the wireless access network is more complicated with
difficulties like frequencies allocation, quality of services, user requests. Adding to it, the wireless access
network is severely vulnerable to link and node failures. Therefore, the survivability in wireless access
network is very important factor to be considered will performing wireless network designing. This paper
focuses on discussion of survivability in wireless access network. Capability of a wireless access network to
perform its dedicated accessibility services even in case of infrastructure failure is known as survivability.
Given available capacity, connectivity and reliability the survivable problem in hierarchical network is to
minimize the overall connection cost for multiple requests. The various failure scenario of wireless access
network as existing in literature is been explored. The existing survivability models for access network like
shared link, multi homing, overlay network, sonnet ring, and multimodal devices are discussed in detail
here. Further comparison between various existing survivability solutions is also tabulated.
SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATIONIJNSA Journal
Peer-to-Peer (P2P) overlay networks wide adoption has also created vast dangers due to the millions of users who are not conversant with the potential security risks. Lack of centralized control creates great risks to the P2P systems. This is mainly due to the inability to implement proper authentication approaches for threat management. The best possible solutions, however, include encryption, utilization of administration, implementing cryptographic protocols, avoiding personal file sharing, and unauthorized downloads. Recently a new non-DHT based structured P2P system is very suitable for designing secured communication protocols. This approach is based on Linear Diophantine Equation (LDE) [1]. The P2P architectures based on this protocol offer simplified methods to integrate symmetric and asymmetric cryptographies’ solutions into the P2P architecture with no need of utilizing Transport Layer Security (TLS), and its predecessor, Secure Sockets Layer (SSL) protocols.
LPM: A DISTRIBUTED ARCHITECTURE AND ALGORITHMS FOR LOCATION PRIVACY IN LBSIJNSA Journal
Recent advances in mobile communication and development of sophisticated equipments lead to the wide spread use of Location Based Services (LBS). A major concern for large-scale deployment of LBSs is the potential abuse of their client location data, which may imply sensitive personal information. Protecting location information of the mobile user is challenging because a location itself may reveal user identity. Several schemes have been proposed for location cloaking. In our paper, we propose a generic Enhanced Location Privacy Model (LPM), which describes the concept, the architecture, algorithms and the functionalities for location privacy in LBS. As per the architecture, the system ensures location privacy, without trusting anybody including the peers or LBS servers. The system is fully distributed and evaluation shows its efficiency and high level of privacy with QoS
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...IJCNCJournal
In this paper, we consider the problem of calculating the node reputation in a Peer-toPeer (P2P) system from fragments of partial knowledge concerned with the trustfulness of nodes which are subjectively given by each node (i.e., evaluator) participating in the system. We are particularly interested in the distributed processing of the calculation of reputation scores while preserving the privacy of evaluators. The basic idea of the proposed method is to extend the EigenTrust reputation management system with the notion of homomorphic cryptosystem. More specifically, it calculates the main eigenvector of a linear system which models the trustfulness of the users (nodes) in the P2P system in a distributed manner, in such a way that: 1) it blocks accesses to the trust value by the nodes to have the secret key used for the decryption, 2) it improves the efficiency of calculation by offloading a part of the task to the participating nodes, and 3) it uses different public keys during the calculation to improve the robustness against the leave of nodes. The performance of the proposed method is evaluated through numerical calculations.
Security Measure to Detect and Avoid Flooding Attacks using Multi-Agent Syste...IJECEIAES
Security is considered as one of the major challenge when it comes to infrastructure less and self dependent network without any centralized control. The vulnerability of Adhoc Network makes it susceptible to external attacks like flooding of hello messages or propagating fake routing messages etc. Such attacks generates a variety of problems like disturbing the network by flooding messages that results in waste of battery which is a vital resource to maintain the life span of the network. Most importantly cause agents to die when unable to reach destination due to fake routing messages causing a heavy loss on part of the nodes generating them to maintain the route knowledge. The paper proposes a novel technique to identify the flooding attack and measure to overcome them using Multi-Agent system
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...IJCNCJournal
Machine learning (ML) and Deep Learning (DL) methods are being adopted rapidly, especially in computer network security, such as fraud detection, network anomaly detection, intrusion detection, and much more. However, the lack of transparency of ML and DL based models is a major obstacle to their implementation and criticized due to its black-box nature, even with such tremendous results. Explainable Artificial Intelligence (XAI) is a promising area that can improve the trustworthiness of these models by giving explanations and interpreting its output. If the internal working of the ML and DL based models is understandable, then it can further help to improve its performance. The objective of this paper is to show that how XAI can be used to interpret the results of the DL model, the autoencoder in this case. And, based on the interpretation, we improved its performance for computer network anomaly detection. The kernel SHAP method, which is based on the shapley values, is used as a novel feature selection technique. This method is used to identify only those features that are actually causing the anomalous behaviour of the set of attack/anomaly instances. Later, these feature sets are used to train and validate the autoencoderbut on benign data only. Finally, the built SHAP_Model outperformed the other two models proposed based on the feature selection method. This whole experiment is conducted on the subset of the latest CICIDS2017 network dataset. The overall accuracy and AUC of SHAP_Model is 94% and 0.969, respectively.
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
Mobile Adhoc Networks are becoming very popular in current Wireless Technology, which is been
associated to business, socially and in some critical applications like Military etc, The network which is
formed by self configuring wireless links which are connected to each other. These applications are
categorized by hostile environment that they serve while communicating between nodes. However in such
Wireless Network will be more exposed to different types of security attacks. The challenge is to meet
secure network communication. In this paper we focus on cluster based secure communication to improve
the reliability between clusters. In this scheme the Cluster Members (CM) submits a report to the Cluster
Head (CH) and temporarily stores Evidences as a security tokens. The reports contain digital signatures.
The CH will verify the consistency of the CM report and updates to Accounting Centre (AC). AC will verify
the uniformity of reports and clears the cryptographic operations. For attacker nodes, the security tokens
are requested to classify and expel the attacker nodes which submit wrong reports.
P2P DOMAIN CLASSIFICATION USING DECISION TREE ijp2p
The increasing interest in Peer-to-Peer systems (such as Gnutella) has inspired many research activities
in this area. Although many demonstrations have been performed that show that the performance of a
Peer-to-Peer system is highly dependent on the underlying network characteristics, much of the
evaluation of Peer-to-Peer proposals has used simplified models that fail to include a detailed model of
the underlying network. This can be largely attributed to the complexity in experimenting with a scalable
Peer-to-Peer system simulator built on top of a scalable network simulator. A major problem of
unstructured P2P systems is their heavy network traffic. In Peer-to-Peer context, a challenging problem
is how to find the appropriate peer to deal with a given query without overly consuming bandwidth?
Different methods proposed routing strategies of queries taking into account the P2P network at hand.
This paper considers an unstructured P2P system based on an organization of peers around Super-Peers
that are connected to Super-Super-Peer according to their semantic domains; in addition to integrating
Decision Trees in P2P architectures to produce Query-Suitable Super-Peers, representing a community
of peers where one among them is able to answer the given query. By analyzing the queries log file, a
predictive model that avoids flooding queries in the P2P network is constructed after predicting the
appropriate Super-Peer, and hence the peer to answer the query. A challenging problem in a schemabased Peer-to-Peer (P2P) system is how to locate peers that are relevant to a given query. In this paper,
architecture, based on (Super-)Peers is proposed, focusing on query routing. The approach to be
implemented, groups together (Super-)Peers that have similar interests for an efficient query routing
method. In such groups, called Super-Super-Peers (SSP), Super-Peers submit queries that are often
processed by members of this group. A SSP is a specific Super-Peer which contains knowledge about: 1.
its Super-Peers and 2. The other SSP. Knowledge is extracted by using data mining techniques (e.g.
Decision Tree algorithms) starting from queries of peers that transit on the network. The advantage of
this distributed knowledge is that, it avoids making semantic mapping between heterogeneous data
sources owned by (Super-)Peers, each time the system decides to route query to other (Super-) Peers.
The set of SSP improves the robustness in queries routing mechanism, and the scalability in P2P
Network. Compared with a baseline approach,the proposal architecture shows the effect of the data
mining with better performance in respect to response time and precision.
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...Nexgen Technology
Nexgen Technology Address:
Nexgen Technology
No :66,4th cross,Venkata nagar,
Near SBI ATM,
Puducherry.
Email Id: praveen@nexgenproject.com.
www.nexgenproject.com
Mobile: 9751442511,9791938249
Telephone: 0413-2211159.
NEXGEN TECHNOLOGY as an efficient Software Training Center located at Pondicherry with IT Training on IEEE Projects in Android,IEEE IT B.Tech Student Projects, Android Projects Training with Placements Pondicherry, IEEE projects in pondicherry, final IEEE Projects in Pondicherry , MCA, BTech, BCA Projects in Pondicherry, Bulk IEEE PROJECTS IN Pondicherry.So far we have reached almost all engineering colleges located in Pondicherry and around 90km
Study on security and quality of service implementations in p2 p overlay netw...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
Most of the peers accessing the services are under the assumption that the service accessed in a P2P network is utmost secured. By means of prevailing hard security mechanisms, security goals like authentication, authorization, privacy, non repudiation of services and other hard security issues are resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and reputation models in P2P network regarding service provisioning is presented and challenges are listed. Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
ABSTRACT
Most of the peers accessing the services are under the assumption that the service accessed in a P2P
network is utmost secured. By means of prevailing hard security mechanisms, security goals like
authentication, authorization, privacy, non repudiation of services and other hard security issues are
resolved. But these mechanisms fail to provide soft security. An exhaustive survey of existing trust and
reputation models in P2P network regarding service provisioning is presented and challenges are listed.
Trust issues like trust bootstrapping, trust evidence procurement, trust assessment, trust interaction
outcome evaluation and other trust based classification of peer’s behavior into trusted,, inconsistent, un
trusted, malicious, betraying, redemptive are discussed,
Trust Based Content Distribution for Peer-ToPeer Overlay NetworksIJNSA Journal
In peer-to-peer content distribution the lack of a central authority makes authentication difficult. Without authentication, adversary nodes can spoof identity and falsify messages in the overlay. This enables malicious nodes to launch man-in-the-middle or denial-of-service attacks. In this paper, we present a trust based content distribution for peer-to-peer overlay networks, which is built on the trust management scheme. The main concept is, before sending or accepting the traffic, the trust of the peer must be validated. Based on the success of data delivery and searching time, we calculate the trust index of a node. Then the aggregated trust index of the peers whose value is below the threshold value is considered as distrusted and the corresponding traffic is blocked. By simulation results we show that our proposed scheme achieves increased success ratio with reduced delay and drop.
Privacy Preserving Reputation Calculation in P2P Systems with Homomorphic Enc...IJCNCJournal
In this paper, we consider the problem of calculating the node reputation in a Peer-toPeer (P2P) system from fragments of partial knowledge concerned with the trustfulness of nodes which are subjectively given by each node (i.e., evaluator) participating in the system. We are particularly interested in the distributed processing of the calculation of reputation scores while preserving the privacy of evaluators. The basic idea of the proposed method is to extend the EigenTrust reputation management system with the notion of homomorphic cryptosystem. More specifically, it calculates the main eigenvector of a linear system which models the trustfulness of the users (nodes) in the P2P system in a distributed manner, in such a way that: 1) it blocks accesses to the trust value by the nodes to have the secret key used for the decryption, 2) it improves the efficiency of calculation by offloading a part of the task to the participating nodes, and 3) it uses different public keys during the calculation to improve the robustness against the leave of nodes. The performance of the proposed method is evaluated through numerical calculations.
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
Dr.G.Anandharaj1, Dr.P.Srimanchari2
1Associate Professor and Head, Department of Computer Science
Adhiparasakthi College of Arts and Science (Autonomous), Kalavai, Vellore (Dt) -632506
2 Assistant Professor and Head, Department of Computer Applications
Erode Arts and Science College (Autonomous), Erode (Dt) - 638001
ABSTRACT
In unpredictable increase in mobile apps, more and more threats migrate from outmoded PC client to mobile device. Compared
with traditional windows Intel alliance in PC, Android alliance dominates in Mobile Internet, the apps replace the PC client
software as the foremost target of hateful usage. In this paper, to improve the confidence status of recent mobile apps, we
propose a methodology to estimate mobile apps based on cloud computing platform and data mining. Compared with
traditional method, such as permission pattern based method, combines the dynamic and static analysis methods to
comprehensively evaluate an Android applications The Internet of Things (IoT) indicates a worldwide network of
interconnected items uniquely addressable, via standard communication protocols. Accordingly, preparing us for the
forthcoming invasion of things, a tool called data fusion can be used to manipulate and manage such data in order to improve
progression efficiency and provide advanced intelligence. In this paper, we propose an efficient multidimensional fusion
algorithm for IoT data based on partitioning. Finally, the attribute reduction and rule extraction methods are used to obtain the
synthesis results. By means of proving a few theorems and simulation, the correctness and effectiveness of this algorithm is
illustrated. This paper introduces and investigates large iterative multitier ensemble (LIME) classifiers specifically tailored for
big data. These classifiers are very hefty, but are quite easy to generate and use. They can be so large that it makes sense to use
them only for big data. Our experiments compare LIME classifiers with various vile classifiers and standard ordinary ensemble
Meta classifiers. The results obtained demonstrate that LIME classifiers can significantly increase the accuracy of
classifications. LIME classifiers made better than the base classifiers and standard ensemble Meta classifiers.
Keywords: LIME classifiers, ensemble Meta classifiers, Internet of Things, Big data
A COMPARATIVE STUDY OF INCENTIVE MECHANISMS USED IN PEER-TO-PEER SYSTEMcscpconf
Incentive mechanism tells how to encourage nodes in a peer-to-peer system to contribute their
resources. A peer avoids contributing resources to the p2p system because of the factors like:
cost of bandwidth, security reason as it has to open several ports in order to allow others to take
out its resources and slowing down of self downloading process. In this paper we present a
comparative study on some incentive models after going through several research papers in the
line. A few models are implemented to show the simulation results. Finally conclusion is made byidentifying the best incentive mechanism for p2p system and improvements are suggested basedon the findings.
A STUDY ON PEER TO PEER NETWORK IN CURRENT NETWORKING IAEME Publication
Due to the truth that traditional centralized trusting mechanism cannot adapt to the call for of P2P network, we need installation a dispensed trusting mechanism to power the reliability of device. The accept as true with models consciousness o the participants. It divides P2P network into numerous overlapped companies with unique features and treats it as undergo in mind courting of companies preserve in thoughts relationship among agencies and friends and agree with dating amongst pals within the same organization. in a single corporation the evaluations among individuals come into being thru combos of records statistics of item peers written thru participants and individual experience of appreciators moreover via amending those statistics in keeping with versions of human beings abilities to statement. In P2P community the agree with evaluation among companies are obtained by means of way of the usage of a technique of global hold in mind. At last the take into account degree of aimed pals is calculated with the useful aid of valuations among participants in the same employer and receive as right with reviews amongst agencies, then corresponding selection of trade can be made via the recall degree. The experiments in simulation have demonstrated our version has strong ability for protective malicious peers and it has fewer errors in desires searching. It additionally costs little charge inside the re-convergence technique whilst community topology changes.
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
Trust is an important issue in social interactions, especially in using cyberspace services. In this paper, a trust and evaluation model are proposed based on which the government can provide reliable services to users. The model is a distributed and hierarchical model. First, the number 12 trust criteria and the weight of these criteria were extracted using the analytical hierarchy process (AHP) and analytic network process (ANP) techniques. Second, to obtain the trust in the service examined, for each criterion, a graph of trusted entities is proposed. Then, a weighted graph with the number of trusted entities called trust pathways measure will be obtained. To test the model, the effect of the 12 criteria on three important evaluation factors over seven widely used social services was rated by three experts. The trust of each service was obtained, which was satisfactory as compared to a valid organizational evaluation. Finally, the correlation coefficient of this comparison was 70.37%, indicating that the results from this model were appropriate.
Making Trust Relationship For Peer To Peer System With Secure ProtocolIJMER
In the peer-to-peer systems exposes them to malicious activity. Building trust relationships
among peers can mitigate attacks of malicious peers. This paper presents distributed algorithms that
enable a peer to reason about trust worthiness of other peers based on past interactions and
recommendations. Peers create their own trust network in their proximity by using local information
available and do not try to learn global trust information. Two contexts of trust, service, and
recommendation contexts are defined to measure trustworthiness in providing services and giving
recommendations. So, neighbouring node will give the recommendation to peer. Based on the
recommendation only Peer decides whether the node is good (or) malicious. Find the node is
malicious node means peer will not interact with malicious node. Isolate the malicious node from the
network. Find the node is good means peer interact with good peer. Peer stores a separate history of
interactions for each Acquaintance. This paper also discuss the malicious threats, privacy concerns,
and security risks of three commonpeer-to-peer network systems that are gaining popularity today.
The malicious threats discussed willinclude how malicious threats can harness existing peer-to-peer
networks, and how peer-to-peernetworking provides an additional (potentially unprotected) vector of
delivery for malicious code.
Trust Metrics In Recommender System : A Surveyaciijournal
Information overload is a new challenge in e-commerce sites. The problem refers to the fast growing of
information that lead following the information flow in real world be impossible. Recommender systems, as
the most successful application of information filtering, help users to find items of their interest from huge
datasets. Collaborative filtering, as the most successful technique for recommendation, utilises social
behaviours of users to detect their interests. Traditional challenges of Collaborative filtering, such as cold
start, sparcity problem, accuracy and malicious attacks, derived researchers to use new metadata to
improve accuracy of recommenders and solve the traditional problems. Trust based recommender systems
focus on trustworthy value on relation among users to make more reliable and accurate recommends. In
this paper our focus is on trust based approach and discuss about the process of making recommendation
in these method. Furthermore, we review different proposed trust metrics, as the most important step in this
process.
Abstract
Mobile ad-hoc network (MANET) is one of the most propitious area in research and development of wireless network. Popularity
of mobile device and wireless networks significantly increased over the past years. MANET has no centralized control to handle
the network, so this may cause to fails the functioning. This characteristic force a component node to be careful when
communicating with other nodes as the behavior of nodes change with time and environmental conditions, so the security issues
may arise like impersonation etc. Therefore behavior of node should consider improving the security of MANET. This is mostly
important in big network where heterogeneous nodes are the parts of network for e.g. tactical and social network. The behavior of
node is shown in the form of numerical value called as trust. Trust is calculated and aggregated and shared among network.
Every node’s generated trust is on the basis of serious study, others node opinion, and previous interaction and their own policy.
In this report, we have analyzed different proposed trust based mechanism and trust evaluation based security solution. These
techniques are proposed to make trust security solutions more effective.
Keywords: Manet, Trust, Smrti, Maturity-Based Model, Rep, Truism
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYaciijournal
Information overload is a new challenge in e-commerce sites. The problem refers to the fast growing of
information that lead following the information flow in real world be impossible. Recommender systems, as
the most successful application of information filtering, help users to find items of their interest from huge
datasets. Collaborative filtering, as the most successful technique for recommendation, utilises social
behaviours of users to detect their interests. Traditional challenges of Collaborative filtering, such as cold
start, sparcity problem, accuracy and malicious attacks, derived researchers to use new metadata to
improve accuracy of recommenders and solve the traditional problems. Trust based recommender systems
focus on trustworthy value on relation among users to make more reliable and accurate recommends. In
this paper our focus is on trust based approach and discuss about the process of making recommendation
in these method. Furthermore, we review different proposed trust metrics, as the most important step in this
process.
A Cooperative Peer Clustering Scheme for Unstructured Peer-to-Peer Systemsijp2p
This paper proposes a peer clustering scheme for unstructured Peer-to-Peer (P2P) systems. The proposed
scheme consists of an identification of critical links, local reconfiguration of incident links, and a
retaliation rule. The simulation result indicates that the proposed scheme improves the performance of
previous schemes and that a peer taking a cooperative action will receive a higher profit than selfish peers
Similar to IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING (20)
COMPARATIVE STUDY OF CAN, PASTRY, KADEMLIA AND CHORD DHTSijp2p
Peer-to-Peer (P2P) systems allow decentralization, sharing of all the resources of a network with direct
communication and collaboration between nodes. There are three main families of P2P networks: the
centralized architecture, the decentralized architecture that can be structured or unstructured and the
hybrid architecture. Today, there are several implementations for structured decentralized architectures.
This implies that the insertion and search algorithms are different. Among them we have; Chord, Pastry,
Kademlia, CAN(Content Addressable Network) . The choice of these DHTs (Distributed Hash Table) for an
application is made on the basis of their performances. Studies of each of these DHTs mentioned have been
done, proving their performance. But a comparative study of the four DHTs Chord, Pastry, CAN, Kademlia
has not been clearly addressed by previous works. In this paper, we have conducted a comparative
theoretical study of the DHTs Chord, Pastry, CAN, Kademlia. Then, by simulation, we have evaluated the
performances in terms of latency, number of hops and number of transmitted messages. Our study clearly
shows the differences between mathematically established performance and actual performance in an
environment with less restriction. This analysis was made from the data obtained by using the simple
network layer of the PeerfactSim simulator. This simulator abstracts the different network layers, which
gives the advantage of testing the performances with reasonable accuracy. The use of the single network
layer can be considered an ideal case because the node searches are done locally.
International Journal of Peer to Peer Networks .docxijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of P2P networks.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results
in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best
practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems,
large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety
of fields can exchange ideas to further research and improve practices in all areas of P2P.
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022)ijp2p
2nd International Conference on Big Data, IoT and Machine Learning (BIOM 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Big Data, Internet of Things (IoT) and Machine Learning. It will also serve to facilitate the exchange of information between researchers and industry professionals to discuss the latest issues and advancement in the area of Big Data, IoT and Machine Learning.
7th International Conference on Networks, Communications, Wireless and Mobile...ijp2p
7th International Conference on Networks, Communications, Wireless and Mobile Computing (NCWMC 2022) looks for significant contributions to the Computer Networks, Communications, wireless and mobile computing for wired and wireless networks in theoretical and practical aspects. Original papers are invited on computer Networks, network protocols and wireless networks, Data communication Technologies, network security and mobile computing. The goal of this Conference is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
4th International Conference on Internet of Things (CIoT 2022)ijp2p
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
11th International conference on Parallel, Distributed Computing and Applicat...ijp2p
11th International conference on Parallel, Distributed Computing and Applications (IPDCA 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Parallel, Distributed Computing. Original papers are invited on Algorithms and Applications, computer Networks, Cyber trust and security, Wireless networks and mobile Computing and Bioinformatics. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022)ijp2p
3rd International Conference on Machine learning and Cloud Computing (MLCL 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Cloud computing. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
4th International Conference on Internet of Things (CIoT 2022) ijp2p
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
3rd International Conference on Networks, Blockchain and Internet of Things (...ijp2p
3rd International Conference on Networks, Blockchain and Internet of Things (NBIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Networks, Blockchain and Internet of Things. The Conference looks for significant contributions to all major fields of the Networks, Blockchain and Internet of Things in theoretical and practical aspects.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas but are not limited to:
3rd International Conference on NLP & Information Retrieval (NLPI 2022)ijp2p
3rd International Conference on NLP & Information Retrieval (NLPI 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Natural Language Computing and Information Retrieval.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the following areas, but are not limited to.
CALL FOR PAPERS - 14th International Conference on Wireless & Mobile Networks...ijp2p
14th International Conference on Wireless & Mobile Networks (WiMoNe 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Wireless & Mobile computing Environment. Current information age is witnessing a dramatic use of digital and electronic devices in the workplace and beyond. Wireless, Mobile Networks & its applications had received a significant and sustained research interest in terms of designing and deploying large scale and high performance computational applications in real life. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.
PUBLISH YOUR PAPER - INTERNATIONAL JOURNAL OF PEER-TO-PEER NETWORKS (IJP2P)ijp2p
Authors are solicited to contribute to the journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of P2P networks.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
3rd International Conference on Blockchain and Internet of Things (BIoT 2022)ijp2p
3rd International Conference on Blockchain and Internet of Things (BIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and
applications of Blockchain and Internet of Things. The Conference looks for significant contributions to all major fields of the Blockchain and Internet of Things in theoretical and
practical aspects. Authors are solicited to contribute to the conference by submitting articles that illustrate research
results, projects, surveying works and industrial experiences that describe significant advances in the areas of Blockchain and Internet of Things.
International Journal of peer-to-peer networks (IJP2P)ijp2p
The International Journal of peer-to-peer networking is a quarterly open access peer-reviewed journal that publishes articles that contribute new results in all areas of P2P Networks. The journal provides a platform to disseminate new ideas and new research, advance theories, and propagate best practices in the area of P2P networking. This will include works that relate to peer-to-peer systems, peer-to-peer applications, grid systems, large-scale distributed systems, and overlay networks. The journal offers a forum in which academics, consultants, and practitioners in a variety of fields can exchange ideas to further research and improve practices in all areas of P2P.
CALL FOR PAPERS - 4th International Conference on Internet of Things (CIoT 2022)ijp2p
4th International Conference on Internet of Things (CIoT 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of IoT.
Authors are solicited to contribute to the conference by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the areas of Internet of Things.
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
1. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
DOI : 10.5121/ijp2p.2012.3301 1
IMPROVING HYBRID REPUTATION MODEL
THROUGH DYNAMIC REGROUPING
Sreenu G 1
and Dhanya P M 2
1
Department of Computer Science, RSET, Rajagiri valley, Cochin, India
gsreenug@gmail.com
2
Department of Computer Science, RSET, Rajagiri valley, Cochin, India
dhanya.rajeshks@gmail.com
ABSTRACT
Peer-to-Peer (P2P) systems have the ability to bond with millions of clients in business and knowledge
scenario. The mechanism that leads users to distribute files without the need of centralized servers has
achieved wide recognition among internet users. This also permits for a range of applications further than
simple file sharing. he main problem lies in the fact that peers have to customarily intermingle with
mysterious peers in the absence of trusted third parties. Usually the lack of incentives often makes these
strange peers to act as freeriders and thus reduce the system performance. The trustworthiness among
peers is portrayed by applying the knowledge obtained as a result of reputation mechanisms. This paper
endows with a new reputation model in association with a detailed survey of diverse reputation models. The
proposed model suggests a hybrid reputation model through dynamic regrouping..
KEYWORDS
Hybrid Reputation, Compatibility Coefficient, Group splitting
1. INTRODUCTION
Presently the thought of P2P system has been fascinated plenty of curiosity in the network field.
The sophisticated features like decentralized processing, independent nature of nodes and
scalability makes the system more advantageous. One of the prevailing features that differentiate
P2P system is the overlay network. Overlay network allows the P2P systems to connect diverse
systems on top of existing network configurations.
Overlay network supports an open environment which in turn supports participation of all types
of nodes. The presence of malicious nodes cannot be easily detected in the case of an open
network and it raises a severe problem to the security of the network. On the better side the open
nature of P2P network can be used to share the computing resources but the open nature itself
creates a hazardous state through the inclusion of malicious peers. These malicious peers can
diminish the system popularity by degrading the performance through malicious behavior like
altering the message when it is passing through the transmission medium and denial of services of
other peers.
To increase the number of participants the system must be competitive to provide good quality of
service. As the number of participants increases the performance of the system will increase. On
hand techniques to address these security issues include reputation mechanism, cryptographic
techniques, and access control and data integrity mechanisms.
2. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
2
This paper summarizes features of different reputation models along with proposed hybrid
reputation model. Hybrid reputation model suggests a new reputation model for finding the
reputation score of each peer through group formation. It demonstrates the different procedures
involved in the formation of groups, trust calculation and behavior judgment. Furthermore, the
paper discusses the main advantages and issues identified in the model. Finally the projected
result analyses the possible outcome of the project.
2. EXISTING SOLUTIONS
The P2P systems are facing the main problem of communication with strangers. So the whole
thing is based on mutual trust among communicating peers. Trust value calculation can take input
from reputation systems in the form of predictions on peer behavior in future founded on past
behavior. Reputation value can also be extracted in the form of recommendations from other
participating peers. A detailed survey of various reputation mechanisms includes the following
methods.
1. eBAY [1]: This is a centralized reputation system as a solution to identify reputed peers
involved in the transaction. The participating peers uses an online feedback system to rate
other peers after each transaction and overall reputation of a participating peer is
calculated as the sum of ratings over previous six months.
2. Xrep [2]: The main procedures involved in resource searching are vote polling and vote
clustering. The peer will post the required service and collect the responses from all
participating peers. In vote polling phase the participating peers will record their opinion
about the peer. In vote clustering phase the recorded opinions will be aggregated. The
peer behaviour is predicted based on the total votes collected.
3. TrustMe [3] : A bootstrap server will assign the trust value of participating peers to
certain trust holding peers. These THA peers will give the trust values in response to the
broadcasted queries from requesting peers. Security, anonymity and use of cryptographic
keys are the main feature identified in the method.
4. NICE [4] : Cooperative distributed applications can be effectively implemented in a
NICE platform. The service provider can check the reputation of the peer by considering
the signed set of certificates. Moreover the service provider also conducts a search about
the reputation of the peer. So finally the reputation value will be a considered as a
combination of the certificates and referenced search.
5. EigenTrust [5]: EigenTrust uses concept of global trust value .Each peer is having a trust
value about the peer that is globally accepted inside the network. By considering the
global reputation the peer behavior can be determined as malicious or normal peer.
6. PeerTrust [6]:System architecture of PeerTrust has no central database. The trust data is
distributes across the network. The trust manager associated with each peer will perform
the functions of feedback submission and trust computation.
7. PowerTrust [7] : Trust overlay network is built on top of all peers in the network. Highly
reputed power nodes will be selected using a distributed ranking mechanism. The
PowerTrust system will take its input in the form of local trust scores send by peers after
each transaction. The global reputation value of each peer will be calculated by the
PowerTrust system by aggregating all the local trust scores.
8. FuzzyTrust [8]: Approximated reasoning is highly supported by FuzzyTrust. Uncertainty,
fuzziness and incomplete information is better handled by FuzzyTrust. FuzzyTrust
applies fuzzy inference on local trust value calculation and uses fuzzy inference to obtain
global reputation aggregation weights.
9. GossipTrust [9]: Suggests a reputation aggregation scheme for unstructured networks.The
process itself includes different steps and cycles. The peers are exchanging local scores
3. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
3
with randomly chosen neighbours and update the peers trust value. This repeats and
finally the trust value congregates in one cycle. The next cycle will use the previous cycle
congregated value and again find the new congregated value.The main feature is the
method aggregate the reputation values in a completely distributed and scalable way.
10. Dual-EigenRep [10]: The method considers the recommended and recommending roles
of each peer. The unified association between these two behaviors finally forms different
trust communities which categorize different types of peers.
11. Three-Dimensional Based Trust Management Scheme for Virus Control in P2P Networks
[11]: The method reflects on the trust values of peers and infection values of both the
peers and content. A three dimensional normalization is used in ratio based normalization
models to enhance the efficiency on the trust value computation.
2.1. Assessment of assorted active Methods
The above methods can be analysed in different ways. The main advantages and disadvantages
analysed in different methods can be illustrated in the following way.
1. eBAY: A central server is present to manage the reputation values. The advantage is that
users can put their feedback in an online feedback form. It is an actually used reputation
system. The feedback can be recorded using numeric values. The main disadvantage is
the lack of security.
2. Xrep: The main advantage is that the method combines the peer based reputation and
resource based reputation. The disadvantage is that increase in the number of resources
compared to number of peers will create astorage overhead problems.
3. TrustMe: The anonymous nature of storage of reputation values will create a secure
environment. The performance will be affected if the network size is very large. As result
of this method lots of messages will be generated. Furthermore the large network size
will result a delay in time taken to transfer the global reputation value among peers.
4. NICE: The search and inference performance of the system will be enhanced if the users
store added information. One drawback is the method not describing about the speed of
transactions.
5. EigenTrust: Use of power iteration provides a distributed and secure method to compute
global trust value. The inference that the peers which exchange trusted files will report
sincere trust values is one disadvantage.
6. PeerTrust: The method will deal with the deceitful feedbacks and also handle the lack of
incentives problem. The problem identified in this method is that it is not easy to
implement in large scale P2P networks.
7. PowerTrust: The functioning competence can be achieved through the presence of power
nodes. Since the power nodes can act as hotspots there is a chance congestion in the
network.
8. FuzzyTrust: The malicious peers can be detected in a fast manner. The problem identified
is that the method is not handling the collusion attack and freeriding .
9. GossipTrust: The application of bloom filters can be used for efficient reputation storage
and identity based cryptography is used for secure communication. The drawback
identified is that there is no method is defined to punish the malicious nodes.
10. Dual-EigenRep: The method is very efficient against different types of security issues
like collusion,disguise and exaggeration.The method is not mentioning about the speed of
transactions.
11. Three-Dimensional Based Trust Management Scheme for Virus Control in P2P
Networks: The propagation of virus can be limited to a small number of peers. The main
feature is that these activities will not affect the file downloading process. The method is
not mentioning about the transaction speed.
4. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
4
An assessment of above listed methods shows that some of them are efficient in detecting
malicious peers. Some methods are efficient in efficient storage of reputation scores, and others
are useful in efficient computation of trust values. This paper suggests a hybrid reputation model
which brings together all these factors to provide an efficient reputation model.
3. PROPOSED SOLUTION
The proposed model focuses on the group formation based on the similarity of functions. All the
participating peers will have a set of services and requirements. The requirements and services are
needed to be shared among other participating peers. Functions are the combinations of services
and requirements. Mutually complementing functions will share same group. The functional
similarity is evaluated with the help of Compatibility Coefficient (CC). The CC computation is
done through prefixed threshold values.
Different peers can communicate within their group through intra group communication and
different groups can communicate through inter group communication. In order to analyse the
peer behaviour the trust value is evaluated. The peers with a trust value below the fixed threshold
will consider as malicious and are prohibited from further communication. Furthermore based on
the transmission rate the groups will be regrouped. The necessity of group splitting and precise
behaviour forecasting will be explained in later sections. Figure 1 represents a model of the
proposed hybrid reputation model.
Figure 1. Model of the proposed system [12]
The detailed procedure of Hybrid Reputation Model is explained in following divisions.
3.1. Node Registration at central coordinator
The initial procedure of the system is node registration. This procedure is done at the entry point
of the system that is the central coordinator. During registration the nodes will list their services
and requirements.
5. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
5
3.2. Compatibility Coefficient (CC)
The central coordinator will calculate the CC value. The function of central coordinator is the
computation of CC value and group peers according to CC value.
3.3. Calculation of CC
Based on the calculated CC value the participating peers are categorized into different groups.
Each group should have a coordinator. The peer which led to the formation of a new group will
act as the coordinator for that group. The CC value calculation is done by fixing two threshold
values t1 and t2. Initially the opening node will act as the coordinator for the first group. All the
arriving nodes will send their services and requirements with already existing group coordinators.
The group coordinators will calculate the CC value between their group and arriving node. The
central coordinator will compare the CC value calculated in all coordinators.
The CC value will be incremented by 1 if there is a match in between the services of arriving
node i and requirements of coordinator node j and vice versa. Finally the CC values will be
aggregated and compared with threshold values.
3.4. Group Formation
The central coordinator will compare the CC value of different group coordinators and initiate the
group formation.
1. If the CC value between arriving node i and coordinator j is above threshold t1 then node
i will join with coordinator j.
2. If the CC value is below threshold t2 the arriving node will form a new group.
3. If the CC value between arriving node and different coordinators is between t1 and t2 a
regrouping will be performed.
4. If there is more than one group having threshold value greater than t1 then the group with
highest CC value will be selected for group formation.
Figure 2 shows the diagram of peers in a group. Each peer is associated with reputation table.
Figure 2. Group of peers allocated with reputation table[12]
6. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
6
3.5. Intra group Communication
Different peers in a group can communicate within their group. Each peer can satisfy other peers
requirements. Since the group formation is based on similarity of functions the time taken to
complete each request will be reduced.
3.6. Response Gathering
After the completion of each transaction the service requesting peers have to record their
feedback about service provider. All the peers will be associated with a reputation table. The
feedback about service provider should be recorded in the corresponding column of reputation
table of service requestor. The reputation table contains space for all participating nodes in their
group. After each local update the feedback scores will be globally updated using GossipTrust
algorithm.
3.7. Appraisal of aggregated response values
The feedback recorded will represent the corresponding trust value. Each successful transaction
will record a positive feedback. The positive feedback will be added by 1 and negative feedback
will be decremented by 1. Before each transaction the peers will verify the reputation table. If the
feedback (trust value) recorded for a node is below a fixed threshold the node will be consider as
malicious and avoid from the remaining communication.
3.8. Intergroup Communication
If the requests for a peer will not satisfied within their group the request will be forwarded to
other group coordinators. The group coordinators will check within their group and send a reply
to the requestor coordinator if the requested service is available with required trust value.
3.9. Dynamic Regrouping
The size of each group is fixed based on the transmission rate within their group. After the
joining of a new peer each group will be examined for its transmission criteria. The transmission
criterion is evaluated using following parameters.
1. Number of packets per second
2. The available bandwidth
If the number of packets per second exceeds the available bandwidth the group will be divided.
3.10. Group splitting
At regular intervals of time the central coordinator will split the groups and reorder the groups.
This reordering will help to avoid the malicious nodes from appearing to the next level. This will
also reorder the nodes based on the changes in services and requests.
7. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
7
4. IDENTIFIED ISSUES AND RECOGNIZED SOLUTION IN PROPOSED
MODEL
The chance of failure of central coordinator and group coordinator should be handled effectively.
The failure of central coordinator can be handled by applying election algorithm [13] among the
existing group coordinators. The group coordinator failure can be handled by applying election
algorithm within the group itself.
5. GUARANTEED QUALITIES OF THE SYSTEM
5.1. Less Flooding
Since the peers are arranged in different groups most of the requests will be satisfied within the
group. So unnecessary flooding can be avoided.
5.2. Small Sized Reputation Table
Each peer has to store a reputation table which containe entries for the peers in the same group.
So the size of reputation table can be reduced.
5.3. Fast access
Less flooding will naturally reduce the access time.
5.4. Enhanced quality
The grouping of peers will limit the number of peers in each groups and that in turn reduce the
traffic in each group. Reduced traffic will avoid congestion and loss of packets. All the services
will be provided with less delay and high quality.
6. RESULT ANALYSIS
The proposed model suggests a less delayed high quality reputation model. The inclusion of
regrouping will increase the transmission quality and the inclusion of group splitting will reduce
the chance of malicious peers. The application of group splitting will not allow malicious peers
from past transactions to enter into new transactions. So the reduction of malicious peers can be
seen in each step after group splitting. The quality of a transmission consists of the reduction in
transmission delay, fast detection of malicious peers and the large number of successful requests.
The expected outcome of the project as plotted in Figure3, 4and 5 shown the above discussed
three factors.
8. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
8
Figure 3. Transaction delay
Figure 4. Number of Successful Requests
Figure 5. Detection of Malicious peers
7. CONCLUSION
A detailed study of existing reputation models is presented with a good analysis. The proposed
model is a solution to the identified deficiencies in the existing methods. The entire working is
illustrated in different steps including group formation, trust calculation and behavior
determination. The paper also discusses the merits and demerits of the proposal. The identified
solutions for these drawbacks are also presented. Finally the expected result is explained with the
help of different pie charts.
9. International Journal of Peer to Peer Networks (IJP2P) Vol.3, No.3/4, July 2012
9
REFERENCES
[1] eBay. eBay home page, ( 2009) http://www.ebay.com..
[2] E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante, (2002) ”A Reputation-based
Approach for Choosing Reliable Resources in Peer-to-Peer Networks”, ACM Symposium on
Computer Communication Security, pp.207 -216.
[3] A. Singh and L. Liu, (2003) “TrustMe: Anonymous Management of Trust Relationships in
Decentralized P2P Systems”, IEEE IntI. Conf. on Peer-to-Peer Computing, pp.142-149.
[4] S. Lee, R. Sherwood, and B. Bhattacharjee, (2003) Cooperative peer groups in NICE.
[5] D. Kamvar, M. Schlosser, and H. Garcis-Molina, (2003) "The EigenTrust Algorithm for Reputation
Management in P2P Networks," Proc.Word Wide Web Conf. (WWW2003), ACM Press, pp. 640-
651.
[6] L. Xiong and L. Liu, (2004) “PeerTrust: Supporting Reputation-Based Trust for peer-to-peer
Electronic Communities”, IEEE Transactions on Knowledge and Data Engineering,16(7):843–
857,Second International Conference on Availability, Reliability and Security (ARES'07)
[7] R. Zhou and K. Hwang, (2006) "PowerTrust: A Robust and Scalable Reputation System for Trusted
Peer-to-Peer Computing" IEEE Trans. Parallel and Distributed Systems., vol. 18, no4 , ppA60-473.
[8] S. Song, K. Hwang, R. Zhou and YK. Kwok, (2005) ”Trusted P2P Transactions with Fuzzy
Reputation Aggregation”, IEEE Internet Computing, Vol. 9, No. 6, pp.24-34.
[9] R Zhou and K. Hwang, (2007) "Gossip-based reputation aggregation for unstructured peer-to-peer
networks," in Proceedings of IEEE International Conference Parallel and Distributed Processing
Symposium, pp. 1-10. V3-23.
[10] Xinxin Fan, Mingchu Li, Yizhi Ren and Jianhua Ma, (2010) “Dual-EigenRep: A Reputation-based
Trust Model for P2P File-Sharing Networks”uic-atc,pp.358-363, Symposia and Workshops on
Ubiquitous, Autonomic and Trusted Computing.
[11] Lin Cai and Roberto Rojas-Cessa, (2010) "Three-Dimensional Based Trust Management Scheme for
Virus Control in P2P Networks," Proc. IEEE ICC 2010, 5 pp., Cape Town, South Africa, May 23-27.
[12] Sreenu G, Dhanya P.M,(2012) “ A Hybrid Reputation Model through Federation of Peers Having
Analogous Function “ , Advances in Computer Science , eng.& Appl., AISC 166,pp.837-
846.springerlink.com
[13] Andrew S. Tanenbaum , (1994) Distributed Operating Systems, Prentice Hall; 1 edition
Authors
1. Sreenu G is a post graduate student in M.Tech CSESIS, Department of Computer
Science and Engineering, RSET, Kochi, INDIA. Her interested areas are reputation
models in P2P security and Distributed computing. She has been working as a
lecturer in the same department.
2. Dhanya P.M is working as Assistant professor in the Department of Computer
Science and Engineering, RSET, Kochi, INDIA. Her areas of interest are P2P
networking, Distributed Computing and natural language processing. She is now a
research scholar in CUSAT, KOCHI.