Digital signatures for flows and multicasts
IEEE/ACM Transactions on Networking (TON)
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
BRITE: An Approach to Universal Topology Generation
MASCOTS '01 Proceedings of the Ninth International Symposium in Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
PlanetLab: an overlay testbed for broad-coverage services
ACM SIGCOMM Computer Communication Review
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Discouraging Free Riding in a Peer-to-Peer CPU-Sharing Grid
HPDC '04 Proceedings of the 13th IEEE International Symposium on High Performance Distributed Computing
Increasing QoS in Selfish Overlay Networks
IEEE Internet Computing
Defense against Intrusion in a Live Streaming Multicast System
P2P '06 Proceedings of the Sixth IEEE International Conference on Peer-to-Peer Computing
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems
P2P '07 Proceedings of the Seventh IEEE International Conference on Peer-to-Peer Computing
The pollution attack in P2P live video streaming: measurement results and defenses
Proceedings of the 2007 workshop on Peer-to-peer streaming and IP-TV
SecureStream: An intrusion-tolerant protocol for live-streaming dissemination
Computer Communications
The Content Pollution in Peer-to-Peer Live Streaming Systems: Analysis and Implications
ICPP '08 Proceedings of the 2008 37th International Conference on Parallel Processing
Pollution-resistant peer-to-peer live streaming using trust management
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Efficient blacklisting and pollution-level estimation in p2p file-sharing systems
AINTEC'05 Proceedings of the First Asian Internet Engineering conference on Technologies for Advanced Heterogeneous Networks
Characterizing SopCast client behavior
Computer Communications
IPTV over P2P streaming networks: the mesh-pull approach
IEEE Communications Magazine
Routing of multipoint connections
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
Peer-to-Peer (P2P) streaming has become a popular platform for transmitting live content. However, due to their increasing popularity, P2P live streaming systems may be the target of user opportunistic actions and malicious attacks, which may greatly reduce streaming rate or even stop it completely. In this article, we focus on a specific type of attack called content pollution, in which malicious peers tamper or forge media data, introducing fake content before uploading it to their partners in the overlay network. Specifically, we present a new decentralized reputation system, named SimplyRep, that quickly identifies and penalizes content polluters, while incurring in low overhead in terms of bandwidth consumption. We evaluate our method with both simulation and experiments in PlanetLab, comparing it against two previously proposed approaches, namely, a centralized black list and a distributed reputation system, in various scenarios. Our results indicate that SimplyRep greatly outperforms the two alternatives considered. In particular, both black list and the distributed reputation method perform poorly when polluters act jointly in a collusion attack, reaching a data retransmission overhead (triggered by polluted chunks received) of 70% and 30%, respectively, whereas the overhead experienced by SimplyRep is at most 2%. Our results also show that SimplyRep is able to quickly isolate almost all polluters under a dissimulation attack, being also somewhat robust to a whitewashing attack, although the latter remains a challenge to effective P2P streaming.