Scheduling Peers Based on Credit Construction Period in Peer-to-Peer Networks

Lei Hou,Haixin Duan,Jianping Wu
DOI: https://doi.org/10.1109/icpads.2008.42
2008-01-01
Abstract:In Peer-to-Peer (P2P) networks if adversaries such as Sybil attackers have got most identities in the network, they will control routing table or traffic. In this paper, we propose a framework based on two complementary techniques to defense malicious node after they transmit data to other malicious peers instead of honest peers. The first approach, based on behaviors of destination nodes, is used to count the local nodes’ credit values in a period of Credit Construction Time. The second approach is updating the global nodes’ credit values between schedulers. We propose scheduler to maintain the trust relationship between global nodes. In order to assess the effectiveness of the above techniques, we extend Eclipse attack code in simulator p2pSim-0.3 and implement scheduler defense malicious attack behavior algorithm based on both credit and proximity. We adopt Chord protocol and Euclidean topology to implement scheduling algorithm, but the same methodology can be applied to other protocols and topologies as well.
What problem does this paper attempt to address?