Authentication Algorithm for a Node in Peer-To-Peer Network
Journal: International Journal of Computational Engineering Research(IJCER) (Vol.6, No. 8)Publication Date: 2016-08-31
Authors : G.N.Purohit; Urmil Malik; Upma Yadav;
Page : 46-49
Keywords : ;
Abstract
Peer-to-Peer (P2P) network, an overlay network is a popular file sharing system, however, by default content pollution is a problem in these networks .Due to absence of server in this network a peer, including a malicious node, can enter or leave the network at any time without intimating other peers .At the same time an user in the P2P network needs the trust value of participating nodes in the network .Owing to decentralized structure of the network. trust plays an important role in content distribution, as trust based content distribution is needed between peers .The trust value of a node is measured in terms of its past behavior and satisfaction of other sharing nodes. However, there is an important issue of security in evaluating trust value of a peer ,since a malicious node can provide a negative feedback about a genuine peer .In this paper a robust trust evaluation algorithms is presented using Fuzzy logic. Using this technique the authenticity of a peer can be determined and simulation can be done for this purpose using the proposed algorithm
Other Latest Articles
- Modelling of Non Linear Enzyme Reaction Process Using Variational Iteration Method
- Comparison of Fatigue Characteristic for AISI 1039 Steel with Surface Treatment
- Numerical Simulations on Triaxial Strength of Silty Sand in Drained Conditions
- Interrelation of Friction-Wear and Mechanism of Energy Dissipation for MEMS Application
- Studying the Fatigue Properties Of Hardened For Carbon Steel
Last modified: 2016-09-17 18:22:24