Reputation management algorithms for DHT-based peer-to-peer environment
Computer Communications
WTR: a reputation metric for distributed hash tables based on a risk and credibility factor
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
Secure routing strategies in DHT-based systems
Globe'10 Proceedings of the Third international conference on Data management in grid and peer-to-peer systems
Hi-index | 0.00 |
Reputation evaluation and trust management techniques are successfully used in the peer-to-peer (P2P) environment due to its notable similarity to the human community. These techniques present a quite efficient solution to cope with some types of malicious activity in P2P networks. Recently, a great number of P2P platforms use Distributed Hash Table (DHT) -based overlay-networks that provide effective lookup and storage mechanisms. However, DHT-based networks are a subject to some particular types of attacks. In this paper we present an analysis of applicability of some reputation evaluation techniques as protection from the malicious activity in DHT-based networks.