Simulating Trust Overlay in P2P Networks

  • Yan Zhang
  • Wei Wang
  • Shunying Lü
Conference paper

DOI: 10.1007/978-3-540-72584-8_84

Volume 4487 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Zhang Y., Wang W., Lü S. (2007) Simulating Trust Overlay in P2P Networks. In: Shi Y., van Albada G.D., Dongarra J., Sloot P.M.A. (eds) Computational Science – ICCS 2007. ICCS 2007. Lecture Notes in Computer Science, vol 4487. Springer, Berlin, Heidelberg

Abstract

Though research on the overlay network has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the overlay networks is a large, uncensored system to which anyone may contribute. This raises the question of how much dependability to give each information source. Traditional overlay network simulators provide accurate low-level models of the network hardware and protocols, but none of them deal with the issue of trust and reliability in the large scale overlay networks. We tackle this problem by employing a trust overlay simulator, which offer a viable solution to simulate trustworthy behavior in overlay networks. With this simulator, we can examine varies kinds of trust and reputation mechanisms in a large scale overlay environment.

Keywords

overlay networks trust simulator security peer-to-peer 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Yan Zhang
    • 1
  • Wei Wang
    • 2
  • Shunying Lü
    • 1
  1. 1.Faculty Mathematics and Computer Science, Hubei University, 430062, WuhanChina
  2. 2.Department of computer Science and Technology, Tongji University, 201804, ShanghaiChina