A secure model for controlling the hubs in P2P wireless network based on trust value

  • Authors:
  • Yuhua Liu;Naixue Xiong;Yuling Li;Kaihua Xu;Jong Hyuk Park;Chuan Lin

  • Affiliations:
  • Department of Computer Science, Huazhong Normal University, Wuhan, China;Department of Computer Science, Georgia State University, Atlanta, GA, USA;Department of Computer Science, Huazhong Normal University, Wuhan, China;Research Center of the Digital Space Technology, Huazhong Normal University, China;Department of Computer Science and Engineering, Seoul National University of Technology, Republic of Korea;School of Mathematics and Statistics, Wuhan University, China

  • Venue:
  • Computer Communications
  • Year:
  • 2010

Quantified Score

Hi-index 0.24

Visualization

Abstract

Recently a lot of efforts are focused on the most promising solutions in future communication environments with information and communication security technologies. As a result of anonymity and contribution resources voluntary of nodes in P2P wireless network, the overwhelming nodes lack enthusiasm when they provide service, which is easy to cause free riding phenomenon. Thus, it leads to the emergence of hubs. Due to the existence of hubs in P2P wireless networks, the network becomes much more vulnerable because of great reducing in defending against coordinated attacks. Therefore, in this paper we provide a secure model for controlling the hubs in P2P network based on trust value. In detail, this paper proposes a model based on trust value of nodes against vulnerability, which not only takes into account a node's connections, but also gives full consideration about a node's trust value. The calculation of trust value is broken down to various types of resources. In accordance with the type of pre-transaction resources, the nodes that have higher trust value and fewer connections are chosen to make transaction. Simulation results demonstrate that this model can encourage nodes to participate in sharing recourses with other nodes in the network actively, and simultaneously it can avoid generating hubs effectively. Our model could improve the ability of defending against coordinated attacks, and also could enhance the network robustness and stability.