{"title":"Performance Improvement of Overlay Networks for P2P Systems Using Trust-Based Mechanisms","authors":"Ayaz H. Khan, Shoieb Arshad","doi":"10.1109/ISMS.2012.135","DOIUrl":null,"url":null,"abstract":"Emergence of peer-to-peer (P2P) networks has provided a new dimension to overlay networks. People can help each other by sharing the contents of which other people may not have strength to purchase. Besides these generous peers, there are some other peers who always try to harm the network by providing harmful data or just block the activities with invalid responses and dropping lookup queries to fail the searches by the source peers. These problems force the researchers to introduce trust system into the peer-to-peer networks to isolate the malicious nodes from the generous nodes. In this paper, we have evaluated the effects of malicious nodes in the network by running the simulation of GIA (GIAnduia: an unstructured P2P network, creates the overlay network based on nodes capacities) using OverSim and found out that how we can improve the performance of P2P systems by creating the network based on trust -- based topologies.","PeriodicalId":200002,"journal":{"name":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Third International Conference on Intelligent Systems Modelling and Simulation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISMS.2012.135","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Emergence of peer-to-peer (P2P) networks has provided a new dimension to overlay networks. People can help each other by sharing the contents of which other people may not have strength to purchase. Besides these generous peers, there are some other peers who always try to harm the network by providing harmful data or just block the activities with invalid responses and dropping lookup queries to fail the searches by the source peers. These problems force the researchers to introduce trust system into the peer-to-peer networks to isolate the malicious nodes from the generous nodes. In this paper, we have evaluated the effects of malicious nodes in the network by running the simulation of GIA (GIAnduia: an unstructured P2P network, creates the overlay network based on nodes capacities) using OverSim and found out that how we can improve the performance of P2P systems by creating the network based on trust -- based topologies.