Skip to main content
Log in

A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

P2P network has been widely used because of advantages such as efficient use of network bandwidth, saving of computing resources, and quick information exchange. In particular, the infra that manages each nodes centrally in P2P network does not exist and each node is a structure performing the sender and receiver roles. The service applying P2P technique in MANET is increased because this structure is very similar to the structure of MANET. However, the reliability may be lower by providing an erroneous service from malicious nodes because the supervision of management for nodes participating in P2P does not perform. In this paper, we propose hybrid trust evaluation technique based on Trust Zone structure to improve the reliability between nodes. TZM node is elected for trust evaluation of member nodes internal each TrustZone. The certificate of member nodes is issued in the elected TZM and the information is stored in TZMT. The data transmission of malicious nodes is blocked by limiting the data transmission of nodes that do not issued the certificate. The reputation-based trust management technique was applied to perform the fair file transmission of nodes and block the behavior of selfish nodes. The excellent performance of the proposed technique in this paper was confirmed through experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Agarwal, DA, Chevassut, O, Thompson, MR, Tsudik, G (2001) An Integrates Solution for Secure Group Communication in Wide-Area Networks. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, 3-5, 22–28 July 2001

  2. B Xu and O Wolfson, (2004) Data Management in Mobile P2P Networks. Springer Verlag Lecture Notes In: Computer Science, Proc. of the 2nd International Workshop on Databases, Information Systems, and P2P Computing (DBISP2P'04), Toronto, Aug 2004

  3. AI Wang, T Bjørnsgzerd, and K Saxlund (2007) Peer2Me - rapid application framework for mobile peer-to-peer applications. In: The 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007), 21-25 May 2007

  4. K Takeshita, M Sasabe, H Nakano (2008) Mobile P2P Networks for Highly Dynamic Environments. In: Proceedings of the 6th IEEE International Conference on Pervasive Computing and Communications, Hong Kong, 453–457 2008

  5. N Li, J Mitchell, and W Winsborough (2002) Design of a role-based trust management framework. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, 114–130

  6. Tian CQ, Zou SH, et al. (2008) A New Trust Model Based on Recommendation Evidence for P2P Networks. Chin J Comput 31(2):271–281

    Google Scholar 

  7. Y Wang and J Vassileva, (2003) Trust and Reputation Model in Peer-to-Peer Networks. In: Proceedings 3th International Conference on Peer-to-Peer Computing, Sweden, 150–157 September 2003

  8. SD Kamvar, MT Schlosser and HG Molina (2003) The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proceedings 12th International Conference on Word Wide Web, Budapest, Bulgaria, 640–651 May 2003

  9. Zhou R, Hwang K, Cai M (2008) Gossiptrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans Knowl Data Eng 20(9):1282–1295

    Article  Google Scholar 

  10. Li J, Jing Y, Xiao X, Wang X, Zhang G (2007) A trust model based on similarity-weighted recommendation for P2P environments. Chin J Softw 18(1):157–167

    Article  MATH  Google Scholar 

  11. Xiong L, Liu L (2004) Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  12. Luo J, Liu X, Fan M (2004) A trust model based on fuzzy recommendation for mobile ad-hoc networks. Comput Netw 53(14):2396–2407

    Article  MATH  Google Scholar 

  13. Tian C, Zhou S, Wang W, Cheng S (2004) Trust model based on reputation for peer-to-peer networks. J Commun 29(4):63–70

    Google Scholar 

  14. Chen K, Hwang K, Chen G (2009) Heuristic discovery of rolebased trust chains in peer-to-peer network. IEEE Trans Parallel Distrib Syst 20(1):83–96

    Article  MathSciNet  Google Scholar 

  15. Fu J, Xiong H, Li Z, et al. (2008) PerformTrust: trust model integrated past and current performance in P2P file sharing system. IEEE/ACS Int Conf Comput Syst Appl:718–725

  16. Tian C, Zou S, Wang W, Cheng S (2008) A new trust model based on recommendation evidence for P2P networks. Chin J Comput 31(2):270–280

    Article  Google Scholar 

  17. Qureshi B, Min G, Kouvatsos D (2010) M-Trust: A trust management scheme for mobile P2P networks. IEEE/IFIP 8th International Conference on Embedded and Ubiquitous, Hong Kong, China, 476–483 2010

  18. Chang BJ, Kuo SL (2008) Markov chain trust model for trustvalue analysis and key management in distributed multicast MANETs. IEEE Trans Veh Technol 58(4):1846–1863

    Article  Google Scholar 

  19. S Kamvar and M Schlosser (2003) The Eigentrust Algorithm for Reputation Management in P2P Networks. In: Proceedings of the 12th International Conference on World Wide Web, 640–651 2003

  20. Abrams Z, McGrew R, Plotk S (2005) A Non-manipulabe trust system based on EigenTrust. ACM SIGecom Exchanges 5(4):21–30

    Article  Google Scholar 

  21. Zhou RF, Hwan K (2007) PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18(4):460–473

    Article  Google Scholar 

  22. YC Zhang, SS Chen and G Yang (2009) SFTrust: A Double Trust Metric based Trust Model in Unstructured P2P System, In: Proceedings of the 23rd IEEE International Parallel & Distributed Processing Symposium, 1–7 2009

  23. ZQ Liang and WS Shi (2005) PET: A Personalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing. In: Proceedings of the 38th International Conference on System Science, Vol. 7, pp 201

  24. Tian C, Yangc B (2011) R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks. Futur Gener Comput Syst 27(8):1135–1141

    Article  Google Scholar 

  25. Kwon OH et al. (2007) FileTrust : Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks. IEUCE Trans Commun E90-B(4):826–835

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jae-Hoon Sun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Yang, HS., Sun, JH. A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P. Peer-to-Peer Netw. Appl. 9, 578–587 (2016). https://doi.org/10.1007/s12083-015-0411-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0411-6

Keywords

Navigation