Simulating Trust Overlay in P2P Networks

  • Yan Zhang
  • Wei Wang
  • Shunying Lü
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4487)


Though research on the overlay network has progressed at a steady pace, its promise has yet to be realized. One major difficulty is that, by its very nature, the overlay networks is a large, uncensored system to which anyone may contribute. This raises the question of how much dependability to give each information source. Traditional overlay network simulators provide accurate low-level models of the network hardware and protocols, but none of them deal with the issue of trust and reliability in the large scale overlay networks. We tackle this problem by employing a trust overlay simulator, which offer a viable solution to simulate trustworthy behavior in overlay networks. With this simulator, we can examine varies kinds of trust and reputation mechanisms in a large scale overlay environment.


overlay networks trust simulator security peer-to-peer 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Joseph, D., Kannan, J., et al.: OCALA: An Architecture for Supporting Legacy Applications over Overlays (2005)Google Scholar
  2. 2.
    Andersen, D., Balakrishnan, H., Kaashoek, F., et al.: Resilient Overlay Networks. In: Proceedings of SOSP’01 (2001)Google Scholar
  3. 3.
    Stoica, I., Adkins, D., Zhuang, S., et al.: Internet Indirection Infrastructure. In: Proceedings of SIGCOMM’02 (2002)Google Scholar
  4. 4.
    Wang, W., Zeng, G.S., Yuan, L.L.: A Semantic Reputation Mechanism in P2P Semantic Web. In: Mizoguchi, R., Shi, Z.-Z., Giunchiglia, F. (eds.) ASWC 2006. LNCS, vol. 4185, pp. 682–688. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  5. 5.
    Berkeley/LNBL/ISI. The NS-2 Network Simulator,
  6. 6.
    He, Q., Ammar, M., Riley, G., et al.: Mapping Peer Behavior to Packet-level Details: A Framework for Packet-level Simulation of Peer-to-Peer Systems. In: Proceedings of MASCOTS 2003, Orlando, FL (2003)Google Scholar
  7. 7.
    Kant, K., Iyer, R.: Modeling and Simulation of Adhoc/P2P Resource Sharing Networks. In: Proceedings of TOOLS’03 (2003)Google Scholar
  8. 8.
    Jelasity, M., Montresor, A., Jesi, G.P.: Peersim Peer-to- Peer Simulator (2004),
  9. 9.
    Mark, J., Alberto, M., Ozalp, B.: Gossip-based aggregation in large dynamic networks. ACM Transactions on Computer Systems 23(3), 219–252 (2005)CrossRefGoogle Scholar
  10. 10.
    Wang, W., Zeng, G.S., Liu, T.: An Autonomous Trust Construction System Based on Bayesian Method. In: Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT’06), Hong Kong, China, December 18-22, 2006, pp. 357–362. IEEE Computer Society Press, Los Alamitos (2006)CrossRefGoogle Scholar
  11. 11.
    Arumugam, M., Sheth, A., Arpinar, I.B.: Towards Peer-to-Peer Semantic Web: A Distributed Environment for Sharing Semantic Knowledge on the Web. Technical report, Large Scale Distributed Information Systems Lab, University of Georgia (2001)Google Scholar
  12. 12.
    Saroiu, S., Gummadi, P.K., Gribble, S.D.: A Measurement Study of Peer-to-Peer File Sharing Systems. In: Proceedings of Multimedia Computing and Networking 2002 (MMCN ’02), San Jose, CA, USA (January 2002)Google Scholar
  13. 13.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM Press, New York (2003)Google Scholar
  14. 14.
    Abdul-Rahman, A.: A Framework for Decentralized Trust Reasoning. PhD thesis, Department of Computer Science, University College London (2004)Google Scholar
  15. 15.
    Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. PhD thesis, Massachusetts Institute of Technology (2003)Google Scholar
  16. 16.
    Kinateder, M., Baschny, E., Rothermel, K.: Towards a Generic Trust Model – Comparison of Various Trust Update Algorithms. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 177–192. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  17. 17.
    DHTSim. Accessed 01-May-2006, Available:
  18. 18.
    P2Psim: A Simulator for Peer-to-Peer (P2P) Protocols (2006), Available:
  19. 19.
    Virgili, U.R.: PlanetSim: An Overlay Network Simulation Framework (2006), Available:

Copyright information

© Springer Berlin Heidelberg 2007

Authors and Affiliations

  • Yan Zhang
    • 1
  • Wei Wang
    • 2
  • Shunying Lü
    • 1
  1. 1.Faculty Mathematics and Computer Science, Hubei University, 430062, WuhanChina
  2. 2.Department of computer Science and Technology, Tongji University, 201804, ShanghaiChina

Personalised recommendations