On Pollution Attacks in Fully Connected P2P Networks Using Trusted Peers

  • Cristóbal Medina-López
  • Ilshat Shakirov
  • L. G. Casado
  • Vicente González-Ruiz
Conference paper

DOI: 10.1007/978-3-319-53480-0_15

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 557)
Cite this paper as:
Medina-López C., Shakirov I., Casado L.G., González-Ruiz V. (2017) On Pollution Attacks in Fully Connected P2P Networks Using Trusted Peers. In: Madureira A., Abraham A., Gamboa D., Novais P. (eds) Intelligent Systems Design and Applications. ISDA 2016. Advances in Intelligent Systems and Computing, vol 557. Springer, Cham

Abstract

This work studies the impact of the pollution attack in a fully connected live video streaming P2P push based overlay network, as well as the effectiveness of using trusted peers as the only defense mechanism. Determining the best strategies for both: (i) trusted peers (TPs) with the aim to detect and expel malicious peers (MPs) and (ii) malicious peers in order to pollute without being detected, is a challenge. Preliminary experimental results for the studied strategies show that the use of TPs is not an enough solution to defeat a large number of MPs because the number of TPs should be at least equal to the number of MPs. Additionally, this study shows the ingredients of a possible game theory problem formulation where the proposed attacker strategy could be improved to detect TPs, which in turn could improve the defense strategy, and so on.

Keywords

P2PSP Content integrity Live streaming Pollution attacks Peer-to-peer networks Network performance evaluation 

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Cristóbal Medina-López
    • 1
  • Ilshat Shakirov
    • 2
  • L. G. Casado
    • 1
  • Vicente González-Ruiz
    • 1
  1. 1.University of Almería (ceiA3)AlmeríaSpain
  2. 2.Perm State UniversityPermRussia

Personalised recommendations