Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)

Correlation Trust Authentication Model for Peer-to-Peer Networks

Authors
Wei Cheng, Zhenhua Tan
Corresponding Author
Wei Cheng
Available Online May 2014.
DOI
https://doi.org/10.2991/iccia.2012.65How to use a DOI?
Keywords
p2p, network security, trust model
Abstract

A requester node requesting a service in a peer to peer network transmits a request to a service provider node. The request may include a communication history of the requester node identifying other nodes with which the requester node has previously communicated. The service provider node authenticates the requester node based on the communication history. The service provider node may ask other nodes with which the requester node has communicated for evaluation of the requester node. The other nodes may calculate a trust metric of the requester node and provide this metric to the service provider node. The service provider node may use this trust metric in combination with a similarity calculation of the requester node and the service provider node to make a determination whether the requester node is to be authenticated. The service provider node may evaluate the requester node and store the evaluation in its communication history.

Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Download article (PDF)

Volume Title
Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)
Series
Advances in Intelligent Systems Research
Publication Date
May 2014
ISBN
978-94-91216-41-1
ISSN
1951-6851
DOI
https://doi.org/10.2991/iccia.2012.65How to use a DOI?
Copyright
© 2013, the Authors. Published by Atlantis Press.
Open Access
This is an open access article distributed under the CC BY-NC license (http://creativecommons.org/licenses/by-nc/4.0/).

Cite this article

TY  - CONF
AU  - Wei Cheng
AU  - Zhenhua Tan
PY  - 2014/05
DA  - 2014/05
TI  - Correlation Trust Authentication Model for Peer-to-Peer Networks
BT  - Proceedings of the 2012 2nd International Conference on Computer and Information Application (ICCIA 2012)
PB  - Atlantis Press
SP  - 267
EP  - 270
SN  - 1951-6851
UR  - https://doi.org/10.2991/iccia.2012.65
DO  - https://doi.org/10.2991/iccia.2012.65
ID  - Cheng2014/05
ER  -