Trust based reliable and secure routing in peer-to-peer overlay networks

Raja Waseem Anwar, Farah Abu Shahla, Saqib Ali, Sumitra Sirinvas

Research output: Contribution to conferencePaperpeer-review

Abstract

Increasingly on the Internet, applications arc supported by sets of loosely connected machines operating without any form of central coordination and more complex than classical distributed system. Peer-to-peer networking, a disruptive technology for large scale distributed applications, has gained widespread attention due to the successes of peer-to-peer (P2P) content sharing, media streaming, and telephony applications. Peer-to-peer systems are implemented using an abstract overlay network (An overlay network is a computer network which is built on the top of another network) which makes the P2P system independent from the physical network topology. But current overlays network are not secure; even a small segment of malicious nodes can avoid accurate message delivery throughout the overlay network. This problem is particularly serious in open peer-to-peer systems, where many diverse, sovereign parties without previous trust relationships wish to pool their resources. This paper studies types, categories, characteristics and network applications of peer-to-peer (P2P) overlay networks. Also will review and analyze the type of peer-to- peer (P2P) current security attacks and then will present our Hybrid secure routing mechanism in peer- To- peer overlay networks to overcome the security challenges.

Original languageEnglish
Pages26-31
Number of pages6
Publication statusPublished - 2012
Event13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012 - Muscat, Oman
Duration: Dec 10 2012Dec 12 2012

Other

Other13th Middle Eastern Simulation and Modelling Multiconference, MESM 2012 - 3rd GAMEON-ARABIA Conference, GAMEON-ARABIA 2012
Country/TerritoryOman
CityMuscat
Period12/10/1212/12/12

Keywords

  • Overlay networks
  • Peer-to-peer
  • Security
  • Trust

ASJC Scopus subject areas

  • Modelling and Simulation

Fingerprint

Dive into the research topics of 'Trust based reliable and secure routing in peer-to-peer overlay networks'. Together they form a unique fingerprint.

Cite this