Item-based collaborative filtering recommendation algorithms
Proceedings of the 10th international conference on World Wide Web
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Free Riding on Gnutella Revisited: The Bell Tolls?
IEEE Distributed Systems Online
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks
IEEE Transactions on Knowledge and Data Engineering
Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks
IEEE Transactions on Parallel and Distributed Systems
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
This paper proposed an anti-collusion trust model in order to resist collusion attack which has become the first threat in trust models of P2P networks. This trust model could detect the existing colluding peers and give them a penalty by introducing two penalty factors. When we evaluate the global trust value of a peer in the network, we consider not only the local trust values but also the recommended trust value of this peer. The convergence of iteration of global trust value is also taken into consideration and proved as well. Experiment results show that our anti-collusion trust model is effective in resisting collusion and also increasing the fraction of authentic downloads.