Skip to main content

Finding Reliable Path for Peer to Peer Application in Mobile Environment

  • Conference paper
Trends in Computer Science, Engineering and Information Technology (CCSEIT 2011)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 204))

  • 1566 Accesses

Abstract

Peer-to-Peer (P2P) as well as mobile ad hoc networks (MANETs) follows the same idea of creating a network without the help of central entities. However, P2P and MANETs operate on different network layers. A combination of both, creates new services and possibilities, but also faces several problems. As smarter mobile devices are increasingly adopted by the wider public, to access p2p applications, the question of who to trust while on the move becomes a crucial one. When operating within ad-hoc type p2p networks, a trust-based framework is the logical solution to provide ways to distinguish the most trustworthy neighbors. This promotes reliable information transfer, and encourages content and resource sharing. This paper proposes a scheme to set up such trusted paths, based upon aggregating individual peers’ trust, given out by their nearest neighbor.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Poslad, S.: Ubiquitous Computing: Smart, Devices, Environments and Interactions, pp. 309–311. Wiley, Chichester (2009) ISBN: 978-0-470-03560-3

    Book  Google Scholar 

  2. Chakravorty, R., Agarwal, S., Banerjee, S., Pratt, I.: MoB: A mobile bazaar for wide-area wireless services. In: Proceedings of MobiCom 2005, pp. 228–242 (2005); Quercia, D., Hailes, S., Capra, L.: MobiRate: Making Mobile Raters Stick to their Word. In: Proceedings of UbiComp 2008, Seoul, Korea (2008)

    Google Scholar 

  3. Quercia, D., Hailes, S., Capra, L.: B-trust: Bayesian Trust Framework for Pervasive Computing. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 298–312. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  4. Wen, D., Huaimin, W., Yan, J., et al.: A recommendation-based peer-to-peer trust model. Journal of Software 15(4), 571–583 (2004)

    MathSciNet  MATH  Google Scholar 

  5. Schollmeier, R., Gruber, I., Niethammer, F.: Protocol for Peer-to-Peer Networking inMobile Environments. In: Proc. 12th International Conference on Computer Communications and Networks (ICCCN 2003), October 20-22, pp. 121–127. IEEE, Los Alamitos (2003)

    Google Scholar 

  6. Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P., Violante, F.: A reputation based approach for choosing reliable resources in peer to peer networks. In: Proceedings of ACM CCS 2002, p. 207 (November 2002)

    Google Scholar 

  7. GNutella, http://www.GNutella.com/

  8. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th International WWW Conference, Budapest, Hungary (May 2003)

    Google Scholar 

  9. Marti, S., Garcia-Molina, H.: Limited reputation sharing in p2p systems. In: Proceedings of ACM EC 2004, New York, USA, pp. 91–101 (May 2004)

    Google Scholar 

  10. Wang, Y., Varadharajan, V.: Interaction trust evaluation in decentralized environments. In: Bauknecht, K., Bichler, M., Pröll, B. (eds.) EC-Web 2004. LNCS, vol. 3182, pp. 144–153. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  11. Yu, B., Singh, M.P., Sycara, K.: Developing trust in largescale peer-to-peer systems. In: Proceedings of 2004 IEEE First Symposium on Multi-Agent Security and Survivability, pp. 1–10 (August 2004)

    Google Scholar 

  12. Wang, Y., Varadharajan, V.: Trust2: Developing trust in peer-to-peer environments. In: Proceedings of 2005 IEEE International Conference on Services Computing (SCC 2005), Orlando, Florida, USA, pp. 24–31 (2005)

    Google Scholar 

  13. Lin, K.J., Lu, H., Yu, T., Tai, C.E.: A reputation and trust management broker framework for web applications. In: Proceedings of The 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE 2005), pp. 262–269 (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jayashree, D., Yogesh, P. (2011). Finding Reliable Path for Peer to Peer Application in Mobile Environment. In: Nagamalai, D., Renault, E., Dhanuskodi, M. (eds) Trends in Computer Science, Engineering and Information Technology. CCSEIT 2011. Communications in Computer and Information Science, vol 204. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24043-0_65

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24043-0_65

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24042-3

  • Online ISBN: 978-3-642-24043-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics