ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Authentication Algorithm for a Node in Peer-To-Peer Network

Journal: International Journal of Computational Engineering Research(IJCER) (Vol.6, No. 8)

Publication Date:

Authors : ; ; ;

Page : 46-49

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal


Peer-to-Peer (P2P) network, an overlay network is a popular file sharing system, however, by default content pollution is a problem in these networks .Due to absence of server in this network a peer, including a malicious node, can enter or leave the network at any time without intimating other peers .At the same time an user in the P2P network needs the trust value of participating nodes in the network .Owing to decentralized structure of the network. trust plays an important role in content distribution, as trust based content distribution is needed between peers .The trust value of a node is measured in terms of its past behavior and satisfaction of other sharing nodes. However, there is an important issue of security in evaluating trust value of a peer ,since a malicious node can provide a negative feedback about a genuine peer .In this paper a robust trust evaluation algorithms is presented using Fuzzy logic. Using this technique the authenticity of a peer can be determined and simulation can be done for this purpose using the proposed algorithm

Last modified: 2016-09-17 18:22:24