Trust based reliable and secure routing in peer-to-peer overlay networks

Raja Waseem Anwar, Farah Abu Shahla, Saqib Ali, Sumitra Sirinvas

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Increasingly on the Internet, applications arc supported by sets of loosely connected machines operating without any form of central coordination and more complex than classical distributed system. Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. Peer-to-peer systems are implemented using an abstract overlay network (An overlay network is a computer network which is built on the top of another network) which makes the P2P system independent from the physical network topology. But current overlays network are not secure; even a small segment of malicious nodes can avoid accurate message delivery throughout the overlay network. This problem is particularly serious in open peer-to-peer systems, where many diverse, sovereign parties without previous trust relationships wish to pool their resources. This paper studies types, categories, characteristics and network applications of peer-to-peer (P2P) overlay networks. Also will review and analyze the type of peer-to- peer (P2P) current security attacks and then will present our Hybrid secure routing mechanism in peer- To- peer overlay networks to overcome the security challenges.

Original languageEnglish
Title of host publication13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012
PublisherEUROSIS
Pages26-31
Number of pages6
Publication statusPublished - 2012
Event13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012 - Muscat, Oman
Duration: Dec 10 2012Dec 12 2012

Other

Other13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012
CountryOman
CityMuscat
Period12/10/1212/12/12

Keywords

  • Overlay networks
  • Peer-to-peer
  • Security
  • Trust

ASJC Scopus subject areas

  • Modelling and Simulation

Fingerprint Dive into the research topics of 'Trust based reliable and secure routing in peer-to-peer overlay networks'. Together they form a unique fingerprint.

Cite this