Skip to main content

Self-protection in P2P Networks: Choosing the Right Neighbourhood

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 4124))

Abstract

In unstructured peer-to-peer networks, as in real life, a good neighbourhood is not only crucial for a peaceful sleep, but also for an exchange of important gossips and for finding good service.

This work investigates self-protection mechanisms based on reputation in unstructured peer-to-peer networks. We use a simple approach where each peer rates the service provided by others and exchanges the collected knowledge with its direct neighbours. Based on reputation values peers manage their connections to direct neighbours and make service provisioning decisions.

To quantify the impact of our proposed scheme, we implement a simple protocol in a fully unstructured peer-to-peer network. We show that free riding and the impact of malicious peers trying to poison the network with bad files is minimised. Furthermore, we show that a good neighbourhood protects peers from selecting bad files, while free riders suffer in a bad neighbourhood of malicious peers.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: CIKM 2001: Proceedings of the 10th International Conference on Information and Knowledge Management, pp. 310–317 (2001)

    Google Scholar 

  2. Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: MobiHoc 2002: Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking & Computing, pp. 226–236 (2002)

    Google Scholar 

  3. Buchegger, S., Le Boudec, J.Y.: A Robust Reputation System for Mobile Ad-hoc. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems (2004)

    Google Scholar 

  4. Capkun, S., Buttyán, L., Hubaux, J.-P.: Self-Organized Public-Key Management for Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing 2(1), 52–64 (2003)

    Article  Google Scholar 

  5. Christin, N., Weigend, A.S., Chuang, J.: Content Availability, Pollution and Poisoning in File Sharing Peer-to-peer Networks. In: EC 2005: Proceedings of the 6th ACM Conference on Electronic commerce, pp. 68–77 (2005)

    Google Scholar 

  6. Condie, T., Kamvar, S.D., Garcia-Molina, H.: Adaptive Peer-to-Peer Topologies. IEEE Transactions On Systems, Man and Cybernetics, Part A 35(3), 385–395 (2005)

    Article  Google Scholar 

  7. Crespo, A., Garcia-Molina, H.: Semantic Overlay Networks for P2P Systems. Technical report (October 2002)

    Google Scholar 

  8. Damiani, E., De Capitani di Vimercati, S., Paraboschi, S., Samarati, P.: Managing and Sharing Servents’ Reputations in P2P Systems. IEEE Transactions on Data and Knowledge Engineering 15(4), 840–854 (2003)

    Article  Google Scholar 

  9. Dewan, P., Dasgupta, P.: Pride: Peer-to-peer Reputation Infrastructure for Decentralized Environments. In: WWW Alt 2004: Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers & Posters, pp. 480–481 (2004)

    Google Scholar 

  10. Efstathiou, E.C., Frangoudis, P.A., Polyzos, G.C.: Stimulating Participation in Wireless Community Networks. Technical report (June 2005)

    Google Scholar 

  11. Feldman, M., Chuang, J.: Overcoming Free-riding Behavior in Peer-to-Peer Systems. SIGcom Exch. 5(4), 41–50 (2005)

    Article  Google Scholar 

  12. Gnutella Developer Forum. The Annotated Gnutella Protocol Specification v0.4 (2006), http://rfc-gnutella.sourceforge.net/developer

  13. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust Algorithm for Reputation Management in P2P Networks. In: WWW 2003: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651 (May 2003)

    Google Scholar 

  14. Liang, J., Kumar, R., Xi, Y., Ross, K.: Pollution in P2P File Sharing Systems. In: IEEE INFOCOM, Miami, FL, USA (March 2005)

    Google Scholar 

  15. Liebau, N., Darlagiannis, V., Mauthe, A., Steinmetz, R.: Token-based Accounting for P2P-Systems. In: Proceeding of Kommunikation in Verteilten Systemen KiVS 2005, pp. 16–28 (February 2005)

    Google Scholar 

  16. Luemkemann, H.: Leistungsfaehige Verteilte Suche in Peer-to-Peer File-Sharing-Systemen. Master Thesis, CS Department, University of Dortmund (2002)

    Google Scholar 

  17. Saroiu, S., Gummadi, P., Gribble, S.: A Measurement Study of Peer-to-Peer File Sharing Systems. In: Proceedings of Multimedia Computing and Networking 2002 (MMCN 2002) (January 2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Martinovic, I., Leng, C., Zdarsky, F.A., Mauthe, A., Steinmetz, R., Schmitt, J.B. (2006). Self-protection in P2P Networks: Choosing the Right Neighbourhood. In: de Meer, H., Sterbenz, J.P.G. (eds) Self-Organizing Systems. EuroNGI IWSOS 2006 2006. Lecture Notes in Computer Science, vol 4124. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11822035_4

Download citation

  • DOI: https://doi.org/10.1007/11822035_4

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37658-3

  • Online ISBN: 978-3-540-37669-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics