Title :
A Study of Mutual Authentication for P2P Trust Management
Author :
Wang, Chunling ; Feng, Jingyu
Author_Institution :
Coll. of Comput. Sci., Xi´´an Polytech. Univ., Xi´´an, China
Abstract :
Current study of P2P trust management mainly focuses on identifying malicious servers who could attack other peers by providing vicious resources in a P2P file-sharing network. This trust management based on one-way authentication has few effects in reducing denial-of-service attacks of malicious consumers and free riding of selfish peers. In this paper, we introduce mutual authentication to P2P trust management and propose a trust model based on mutual authentication (MA model). The model is built on two kinds of authentication mechanism: server and consumer authentic-cation mechanism. Server authentication mechanism is used to identify malicious servers, and consumer authentication mechanism is employed to handle requests from consumers. The implementation strategies of MA model are also described. The simulation shows that MA model is more effective on suppressing malicious servers and consumers, or even encouraging selfish peers to share their resources.
Keywords :
message authentication; peer-to-peer computing; P2P file-sharing network; P2P trust management; consumer authentication mechanism; denial-of-service attacks; free riding; malicious consumers; malicious servers; mutual authentication; one-way authentication; selfish peers; server authentication mechanism; trust model; Analytical models; Authentication; Computational modeling; Computer crime; Exchange rates; Peer to peer computing; Servers; P2P; file-sharing; mutual authentication; trust management;
Conference_Titel :
Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2010 Sixth International Conference on
Conference_Location :
Darmstadt
Print_ISBN :
978-1-4244-8378-5
Electronic_ISBN :
978-0-7695-4222-5
DOI :
10.1109/IIHMSP.2010.121