Simulating Trust Overlay in P2P Networks
- Cite this paper as:
- Zhang Y., Wang W., Lü S. (2007) Simulating Trust Overlay in P2P Networks. In: Shi Y., van Albada G.D., Dongarra J., Sloot P.M.A. (eds) Computational Science – ICCS 2007. ICCS 2007. Lecture Notes in Computer Science, vol 4487. Springer, Berlin, Heidelberg
Though research on the overlay network has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the overlay networks is a large, uncensored system to which anyone may contribute. This raises the question of how much dependability to give each information source. Traditional overlay network simulators provide accurate low-level models of the network hardware and protocols, but none of them deal with the issue of trust and reliability in the large scale overlay networks. We tackle this problem by employing a trust overlay simulator, which offer a viable solution to simulate trustworthy behavior in overlay networks. With this simulator, we can examine varies kinds of trust and reputation mechanisms in a large scale overlay environment.
Keywordsoverlay networks trust simulator security peer-to-peer
Unable to display preview. Download preview PDF.