Nature-Inspired Computing Technology and Applications
BT Technology Journal
Data on Air: Organization and Access
IEEE Transactions on Knowledge and Data Engineering
Multipoint Relaying for Flooding Broadcast Messages in Mobile Wireless Networks
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 9 - Volume 9
Utilising Push and Pull Mechanism in Wireless E-Health Environment
EEE '04 Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce and e-Service (EEE'04)
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
IEEE Intelligent Systems
Global Indexing Scheme for Location-Dependent Queries in Multi Channels Mobile Broadcast Environment
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 1
Estimating network proximity and latency
ACM SIGCOMM Computer Communication Review
Ant-based Reputation Evidence Distribution in P2P Networks
GCC '06 Proceedings of the Fifth International Conference on Grid and Cooperative Computing
Research in mobile database query optimization and processing
Mobile Information Systems
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
Compact samples for data dissemination
Journal of Computer and System Sciences
Simulation-based development of Peer-to-Peer systems with the RealPeer methodology and framework
Journal of Systems Architecture: the EUROMICRO Journal
GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks
IEEE Transactions on Knowledge and Data Engineering
Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps
IEEE Transactions on Parallel and Distributed Systems
Mobile service oriented architectures for NN-queries
Journal of Network and Computer Applications
Efficient information retrieval in mobile peer-to-peer networks
Proceedings of the 18th ACM conference on Information and knowledge management
Peer-to-peer's most wanted: Malicious peers
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Reputation-based policies that provide the right incentives in peer-to-peer environments
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
IEEE Transactions on Wireless Communications
A protocol for reliably, flexibly, and efficiently making agreement among peers
International Journal of Web and Grid Services
Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)
Trustworthiness among Peer Processes in Distributed Agreement Protocol
AINA '10 Proceedings of the 2010 24th IEEE International Conference on Advanced Information Networking and Applications
Group-Based Negotiations in P2P Systems
IEEE Transactions on Parallel and Distributed Systems
TBB-Scheme for Reliably Broadcast Messages among Peer Processes
NBIS '10 Proceedings of the 2010 13th International Conference on Network-Based Information Systems
A simple public-goods game based incentive mechanism for resource provision in P2P networks
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
P2P soft security: On evolutionary dynamics of P2P incentive mechanism
Computer Communications
Network trust management in emergency situations
Journal of Computer and System Sciences
Event sharing in vehicular networks using geographic vectors and maps
Mobile Information Systems
QSSA: A QoS-aware Service Selection Approach
International Journal of Web and Grid Services
Adjustable flooding-based discovery with multiple QoSs for cloud services acquisition
International Journal of Web and Grid Services
CuboidTrust: a global reputation-based trust model in peer-to-peer networks
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
International Journal of Data Warehousing and Mining
Foreword: Special Issue on Multidisciplinary Emerging Networks and Systems
Journal of Computer and System Sciences
Quorum-based synchronization protocols for multimedia replicas
Cluster Computing
Hi-index | 0.00 |
In a decentralised system like P2P where each individual peers are considerably autonomous, the notion of mutual trust between peers is critical. In addition, when the environment is subject to inherent resource constraints, any efficiency efforts are essentially needed. In light of these two issues, we propose a novel trustworthy-based efficient broadcast scheme in a resource-constrained P2P environment. The trustworthiness is associated with the peer@?s reputation. A peer holds a personalised view of reputation towards other peers in four categories namely SpEed, Correctness, qUality, and Risk-freE (SeCuRE). The value of each category constitutes a fraction of the reliability of individual peer. Another factor that contributes to the reliability of a peer is the peer@?s credibility concerning trustworthiness in providing recommendation about other peers. Our trust management scheme is applied in conjunction with our trust model in order to detect malicious and collaborative-based malicious peers. Knowledge of trustworthiness among peers is used in our proposed broadcast model named trustworthy-based estafet multi-point relays (TEMPR). This model is designed to minimise the communication overhead between peers while considering the trustworthiness of the peers such that only trustworthy peer may relay messages to other peers. With our approach, each peer is able to disseminate messages in the most efficient and reliable manner.