On Pollution Attacks in Fully Connected P2P Networks Using Trusted Peers

Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 557)


This work studies the impact of the pollution attack in a fully connected live video streaming P2P push based overlay network, as well as the effectiveness of using trusted peers as the only defense mechanism. Determining the best strategies for both: (i) trusted peers (TPs) with the aim to detect and expel malicious peers (MPs) and (ii) malicious peers in order to pollute without being detected, is a challenge. Preliminary experimental results for the studied strategies show that the use of TPs is not an enough solution to defeat a large number of MPs because the number of TPs should be at least equal to the number of MPs. Additionally, this study shows the ingredients of a possible game theory problem formulation where the proposed attacker strategy could be improved to detect TPs, which in turn could improve the defense strategy, and so on.


P2PSP Content integrity Live streaming Pollution attacks Peer-to-peer networks Network performance evaluation 



This paper has been supported by the Spanish Ministry (TIN2015-66680), in part financed by the European Regional Development Fund (ERDF). Cristóbal is supported by an FPU Fellowship (FPU14/00635) from the Spanish Ministry of Education (MECD). The work done by Ilshat was funded by Google Summer of Code (GSoC) 2015 initiative.


  1. 1.
    Bellovin, S.M.: Security problems in the TCP/IP protocol suite. SIGCOMM Comput. Commun. Rev. 19(2), 32–48 (1989)CrossRefGoogle Scholar
  2. 2.
    Borges, A., Almeida, J., Campos, S.: Fighting pollution in P2P live streaming systems. In: 2008 IEEE International Conference on Multimedia and Expo, pp. 481–484. IEEE (2008)Google Scholar
  3. 3.
    Conner, W., Nahrstedt, K.: Securing peer-to-peer media streaming systems from selfish and malicious behavior. In: Proceedings of the 4th on Middleware Doctoral Symposium, MDS 2007, pp. 13:1–13:6. ACM, New York (2007)Google Scholar
  4. 4.
    Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 Workshop on Peer-to-Peer Streaming and IP-TV, pp. 323–328. ACM (2007)Google Scholar
  5. 5.
    Gaeta, R., Grangetto, M.: Identification of malicious nodes in peer-to-peer streaming: A belief propagation-based technique. IEEE Trans. Parallel Distrib. Syst. 24(10), 1994–2003 (2013)CrossRefGoogle Scholar
  6. 6.
    Hu, B., Zhao, H.V.: Pollution-resistant peer-to-peer live streaming using trust management. In: 2009 16th IEEE International Conference on Image Processing (ICIP), pp. 3057–3060, November 2009Google Scholar
  7. 7.
    Kang, X., Yongdong, W.: A trust-based pollution attack prevention scheme in peer-to-peer streaming networks. Comput. Netw. 72, 62–73 (2014)CrossRefGoogle Scholar
  8. 8.
    Lin, E., de Castro, D.M.N., Wang, M., Aycock, J.: SPoIm: A close look at pollution attacks in P2P live streaming. In: 2010 18th International Workshop on Quality of Service (IWQoS), pp. 1–9 (2010)Google Scholar
  9. 9.
    Marti, S., Garcia-Molina, H.: Identity crisis: anonymity vs reputation in P2P systems. In: 2003 Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P 2003), pp. 134–141. IEEE (2003)Google Scholar
  10. 10.
    Medina-López, C., Casado, L.G., González-Ruiz, V.: Pollution attacks detection in the P2PSP live streaming system. In: Herrero, Á., Baruque, B., Sedano, J., Quintian, H., Corchado, E. (eds.) International Joint Conference. AISC, pp. 401–410. Springer, Heidelberg (2015)CrossRefGoogle Scholar
  11. 11.
    Stutzbach, D., Rejaie, R.: Understanding churn in peer-to-peer networks. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006, pp. 189–202. ACM, New York (2006)Google Scholar
  12. 12.
    The P2PSP Team: P2PSP war-games repository.
  13. 13.
    The P2PSP Team: Peer to Peer Straightforward Protocol Source Code.

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.University of Almería (ceiA3)AlmeríaSpain
  2. 2.Perm State UniversityPermRussia

Personalised recommendations