Correlation Trust Authentication Model for Peer-to-Peer Networks
- DOI
- 10.2991/iccia.2012.65How to use a DOI?
- Keywords
- p2p, network security, trust model
- Abstract
A requester node requesting a service in a peer to peer network transmits a request to a service provider node. The request may include a communication history of the requester node identifying other nodes with which the requester node has previously communicated. The service provider node authenticates the requester node based on the communication history. The service provider node may ask other nodes with which the requester node has communicated for evaluation of the requester node. The other nodes may calculate a trust metric of the requester node and provide this metric to the service provider node. The service provider node may use this trust metric in combination with a similarity calculation of the requester node and the service provider node to make a determination whether the requester node is to be authenticated. The service provider node may evaluate the requester node and store the evaluation in its communication history.
- Copyright
- © 2013, the Authors. Published by Atlantis Press.
- Open Access
- This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).
Cite this article
TY - CONF AU - Wei Cheng AU - Zhenhua Tan PY - 2014/05 DA - 2014/05 TI - Correlation Trust Authentication Model for Peer-to-Peer Networks BT - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012) PB - Atlantis Press SP - 267 EP - 270 SN - 1951-6851 UR - https://doi.org/10.2991/iccia.2012.65 DO - 10.2991/iccia.2012.65 ID - Cheng2014/05 ER -