Trust based reliable and secure routing in peer-to-peer overlay networks

Raja Waseem Anwar, Farah Abu Shahla, Saqib Ali, Sumitra Sirinvas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Increasingly on the Internet, applications arc supported by sets of loosely connected machines operating without any form of central coordination and more complex than classical distributed system. Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. Peer-to-peer systems are implemented using an abstract overlay network (An overlay network is a computer network which is built on the top of another network) which makes the P2P system independent from the physical network topology. But current overlays network are not secure; even a small segment of malicious nodes can avoid accurate message delivery throughout the overlay network. This problem is particularly serious in open peer-to-peer systems, where many diverse, sovereign parties without previous trust relationships wish to pool their resources. This paper studies types, categories, characteristics and network applications of peer-to-peer (P2P) overlay networks. Also will review and analyze the type of peer-to- peer (P2P) current security attacks and then will present our Hybrid secure routing mechanism in peer- To- peer overlay networks to overcome the security challenges.

Original languageEnglish
Title of host publication13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012
PublisherEUROSIS
Pages26-31
Number of pages6
Publication statusPublished - 2012
Event13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012 - Muscat, Oman
Duration: Dec 10 2012Dec 12 2012

Other

Other13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012
CountryOman
CityMuscat
Period12/10/1212/12/12

Fingerprint

Overlay networks
Peer to peer networks
Overlay Networks
Peer-to-peer Networks
Routing
Peer-to-peer (P2P)
Peer-to-peer Systems
Media Streaming
Media streaming
P2P Systems
P2P Network
Distributed Applications
Open Systems
Computer Networks
Peer to Peer
Computer networks
Networking
Network Topology
Distributed Systems
Sharing

Keywords

  • Overlay networks
  • Peer-to-peer
  • Security
  • Trust

ASJC Scopus subject areas

  • Modelling and Simulation

Cite this

Anwar, R. W., Shahla, F. A., Ali, S., & Sirinvas, S. (2012). Trust based reliable and secure routing in peer-to-peer overlay networks. In 13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012 (pp. 26-31). EUROSIS.

Trust based reliable and secure routing in peer-to-peer overlay networks. / Anwar, Raja Waseem; Shahla, Farah Abu; Ali, Saqib; Sirinvas, Sumitra.

13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012. EUROSIS, 2012. p. 26-31.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Anwar, RW, Shahla, FA, Ali, S & Sirinvas, S 2012, Trust based reliable and secure routing in peer-to-peer overlay networks. in 13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012. EUROSIS, pp. 26-31, 13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012, Muscat, Oman, 12/10/12.
Anwar RW, Shahla FA, Ali S, Sirinvas S. Trust based reliable and secure routing in peer-to-peer overlay networks. In 13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012. EUROSIS. 2012. p. 26-31
Anwar, Raja Waseem ; Shahla, Farah Abu ; Ali, Saqib ; Sirinvas, Sumitra. / Trust based reliable and secure routing in peer-to-peer overlay networks. 13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012. EUROSIS, 2012. pp. 26-31
@inproceedings{de80c28486964ee49ae5066cbf994fae,
title = "Trust based reliable and secure routing in peer-to-peer overlay networks",
abstract = "Increasingly on the Internet, applications arc supported by sets of loosely connected machines operating without any form of central coordination and more complex than classical distributed system. Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. Peer-to-peer systems are implemented using an abstract overlay network (An overlay network is a computer network which is built on the top of another network) which makes the P2P system independent from the physical network topology. But current overlays network are not secure; even a small segment of malicious nodes can avoid accurate message delivery throughout the overlay network. This problem is particularly serious in open peer-to-peer systems, where many diverse, sovereign parties without previous trust relationships wish to pool their resources. This paper studies types, categories, characteristics and network applications of peer-to-peer (P2P) overlay networks. Also will review and analyze the type of peer-to- peer (P2P) current security attacks and then will present our Hybrid secure routing mechanism in peer- To- peer overlay networks to overcome the security challenges.",
keywords = "Overlay networks, Peer-to-peer, Security, Trust",
author = "Anwar, {Raja Waseem} and Shahla, {Farah Abu} and Saqib Ali and Sumitra Sirinvas",
year = "2012",
language = "English",
pages = "26--31",
booktitle = "13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012",
publisher = "EUROSIS",

}

TY - GEN

T1 - Trust based reliable and secure routing in peer-to-peer overlay networks

AU - Anwar, Raja Waseem

AU - Shahla, Farah Abu

AU - Ali, Saqib

AU - Sirinvas, Sumitra

PY - 2012

Y1 - 2012

N2 - Increasingly on the Internet, applications arc supported by sets of loosely connected machines operating without any form of central coordination and more complex than classical distributed system. Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. Peer-to-peer systems are implemented using an abstract overlay network (An overlay network is a computer network which is built on the top of another network) which makes the P2P system independent from the physical network topology. But current overlays network are not secure; even a small segment of malicious nodes can avoid accurate message delivery throughout the overlay network. This problem is particularly serious in open peer-to-peer systems, where many diverse, sovereign parties without previous trust relationships wish to pool their resources. This paper studies types, categories, characteristics and network applications of peer-to-peer (P2P) overlay networks. Also will review and analyze the type of peer-to- peer (P2P) current security attacks and then will present our Hybrid secure routing mechanism in peer- To- peer overlay networks to overcome the security challenges.

AB - Increasingly on the Internet, applications arc supported by sets of loosely connected machines operating without any form of central coordination and more complex than classical distributed system. Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. Peer-to-peer systems are implemented using an abstract overlay network (An overlay network is a computer network which is built on the top of another network) which makes the P2P system independent from the physical network topology. But current overlays network are not secure; even a small segment of malicious nodes can avoid accurate message delivery throughout the overlay network. This problem is particularly serious in open peer-to-peer systems, where many diverse, sovereign parties without previous trust relationships wish to pool their resources. This paper studies types, categories, characteristics and network applications of peer-to-peer (P2P) overlay networks. Also will review and analyze the type of peer-to- peer (P2P) current security attacks and then will present our Hybrid secure routing mechanism in peer- To- peer overlay networks to overcome the security challenges.

KW - Overlay networks

KW - Peer-to-peer

KW - Security

KW - Trust

UR - http://www.scopus.com/inward/record.url?scp=84898942301&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84898942301&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84898942301

SP - 26

EP - 31

BT - 13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012

PB - EUROSIS

ER -