1
PENG Hao et al:A Mechanism Based on Reputation in P2P Networks to …
2015, Vol.*No.*, ***-***
Article ID
DOI
Title:字体Arial Black,字号小一
1
PENG Hao et al:A Mechanism Based on Reputation in P2P Networks to …
□Author 如:PENG **[U1]1, LU **1,2†[U2],
(姓前名后,姓全部大写,名首字母大写)
1. Ele[U3]ctronic Engineering Department, Shanghai Jiao Tong University, Shanghai 200240, China;
2. School of Information Security Engineering, Shanghai Jiao Tong University, Shanghai200240, China
© Wuha[U4]n University and Springer-VerlagBerlin Heidelberg 2011
Abstract:[U5]In P2P (Peer-to-Peer) networks, some malicious peers can impact overall networks performance. One of the malicious behaviors of these peers is malicious packet dropping. In this paper, our focus is to detect and to exclude peers that misbehave by dropping some or all packets. Here, we propose a reputation-based mechanism for solving the problem efficiently. The proposed[U6] mechanism uses both direct reputation information and indirect reputation information to compute comprehensive reputation of a peer. At the same time, history reputation information is also taken into account when providing in faults tolerance capability and we regulate the imprecision based on the fact that the cause of packet dropping can be complex. Finally, the peers with bad comprehensive reputation can be detected easily and then will be excluded from the network. In this way, our proposed mechanism improves the performance of P2P networks without increasing computational overhead.
Keywords:P2P(Peer-to-Peer); reputation; malicious peers; packet dropping(关键词以分号隔开)
CLC number:TP 305
Received date[U7]:2011-06-23[U8]
Foundation item:Supported by the National Key Basic Research Program of China(973 Program)(2010CB731403) and the Opening Project of Key Lab of Information Network Security of Ministry of Public Security (C09607).(注意基金格式)
Biography:PENG Hao, male, Ph.D. candidate, research direction: network communications and information security.E-mail: penghao2007@ sjtu.edu.cn
†[U9]To whom correspondence should be addressed. E-mail:
0 Introduction[U10](标题每个实词首字母大写)
正文内容:字体Times New Romans,字号五号。公式字号用10.5磅
Peer-to-Peer (P2P)(正文中第一次出现缩写要先写全称后缩写,后文出现用缩写,专有名词首字母大写)networking hasbecome a very active research area in recent years because of its advantages over the traditional Client/Server model for applications like file sharing,distributed computing, collaborative applications, etc. However, the open nature of P2P networksmakes themvulnerablefor malicious peers trying to manipulate the network.
To solve this problem, many researchers have proposed various methods based on the reputation model and achieved degrees of success.There are mainly three kinds of reputation models: web-based, policy-based, and reputation-based reputation model [1,2](参考文献上标,并需在文中按数字顺序出现). These models can be directly or indirectly introduced into P2P networks to build reputation between peers. However, while peers’ identity privacy is important, it is difficult to be achieved in fully distributed P2P networks,because reputation usually depends on information related to identity.
Previous works have focused on developing various reputation models and enhancing identity privacy for P2P networks in a number of ways. Ref.[3](当以Ref.[*]类型出现时不上标)discusses the conflicts between privacy and reputation and proposes a trade-off model between them. In this model, it introduces multi-pseudonym to protect peers’ identity privacy. Although all the pseudonyms of a peer may not be linked together by attackers, privacy is not well protected because each pseudonym’s transaction can still be linked. Ref. [4] alleviates the identity privacy problem in reputation negotiation by hiding the peers’ credentials. However, the negotiation process also depends on the disclosure of information related to each peer’s identity. Ref.[5] proposes a reputation-based P2P network to achieve peers’ anonymity by changing the pseudonym. However, it is implemented using an online Trusted Third Part(TTP).
It is acknowledged that identity privacy in fully distributed P2P networks is desirable and necessary, but hard to achieve when building reputation. Therefore, in this paper we propose an assessmentmechanismfor P2P networks based on reputation to alleviate thisproblem. A reputation model is also developed to improve the safety of P2P networks by implementing a reputation management method.
The rest of the paper is structured as follows. Section 1 describes the proposed mechanism. Section 2simulates the mechanism and analyzes its performance. Finally, Section 3 concludes the paper.(引言中简单介绍研究背景,针对某些问题的研究现状,这些前人的研究存在某些不足,引出本文的研究。最后一段简单介绍本文的结构)
1 Proposed Mechanism
In our design, the way of preventing malicious packet dropping in P2P networks is the detection andexclusion mechanism.Neighbor detecting reputation mechanism has been suggested asa means to reduce the opposite effect ofmalicious peers. In this section, a reputation-basedmechanism will be stated in detail for detectingmalicious peers.
Our mechanism requires the followingassumptions to accomplish its functions properly:
①[U11]All peers canoperate in local modefor neighbor detecting.
②Misbehaving peers are considered to be selfish andnot malicious.
③Intrusionprevention measures, suchas authentication and digital signature, serve as the first line of defense.
④The network is a multi-forwarding network.
1.1 Rep[U12]utation Model
As mentioned above, the properties of P2P networks, such as peer-independence and lack of central management, means that detecting in P2P networks can only beperformed in a fully distributed way. Thus, eachpeer should be responsible for detecting itsneighbors’ behaviors for itself.
We present a reputation-basedassessment mechanism for detectingandexcludingmalicious peers. Theproposed mechanism relies on reputationmechanism for detecting neighbor peers’ forwarding and for computing whether a peer is malicious or not. Hereare some related definitions.
Definition1[U13] Assessment of direct reputation repr- esentsdirect experience of detecting toa neighboringpeer.
Definition 2 Assessment of indirect reputation re- presents thesynthesis resulting by aggregating multiplerecommendation opinions about a peer.
Definition 3 Assessment of comprehensive reputation represents the final evaluation to neighboringpeers. It can be defined as one peer’scomprehensive perception of another peer withregard to performing forwarding operation. Apeer with a good comprehensive reputationmeansit behaves very well, while peers with badcomprehensive reputation are malicious.
1.2 Assessment of Direct Reputation
In P2P networks, only fully distributeddetecting techniques can be applied in P2P networks because of the lack of a centralmanagement peer. Assessment of direct reputation in our mechanism depends on neighbor observations and analysis. Each peer overhearsits neighboring peers’ packet forwarding activities and detects any abnormal behaviors independently.
The reputationvalue is hard to quantify becausemany dynamic factors are involved. If a peer detects a packet dropping of aneighboring peer by overhearing, it cannot determinewhether the neighbor is selfish or failed to forwardbecause of congestion or collision. Then, anapproach based on fuzzy analysis can be used todeal with this problem.
In our design, the assessment of direct reputation is not onlyrelated to a peer’s packet-forwarding ratio,but also related to the busy state of peers. Considering these, we define a packet forwarding ratio andbusy degree to evaluate it. Peer “A[U14]” computes packet-forwarding ratio of peer “B”using the followingmetric:
[U15] (1)
In formula (1), (单字符变量斜体,多字符变量一律正体,下标是单字符下标斜体,多字符下标正体)is the number of packetsforwarded by peer “B” during a fixed time,is the total number ofpackets forwarded by peer “B” during a fixedtime.
Peer “A” computes peer “B” busy degreeusing the following metric:
(2)
In formula (2), is the number of packets forwarded by peer “B” per unit time,is the maximum number of packets that can beforwarded per unit time.
According to the rules above, peer “A”computes peer “B”direct reputation D (a, b) using thefollowing metric:
(3)
whereis aweight of packet-forwarding ratio and [U16] is a weight of busy degree. Packet-forwarding ratio may be deemed to bemore important than busy degree, sopacket-forwarding ratio will be givengreaterweight in the reputation calculations.
1.3 Assessment of Indirect Reputation
Direct observations may not always be effective because of the weakness described in Ref. [6]. Ifa peer makes decisions only based on firsthandinformation, itis hard to make surewhetherall of its neighboring peers are normal or not. Using second-hand information canaccelerate the detection andsubsequent isolation of malicious peers in P2P networks.
Collaborative detection between peers can beachieved by broadcasting reputation information tothe neighboring peers. In our design, when peer “A”receivesrecommendation reputations of peer “B” from l neighboring peers, peer “A” computes the indirect reputation of peer “B”using the followingformula:
(4)
where[U17] is the recommendation reputation value of peer“B” from peerNi andis thecomprehensive reputation value of peerNistoredin peer “A”.
1.4 Assessment of Comprehensive Reputation
In our assessment mechanism, every peer has atablethatstores a comprehensive reputation value about its neighbors. Peer“A” updates the comprehensive reputation value of peer “B” onthe basis ofD(a,b)and.Peer“A”computescomprehensive reputationof peer “B”usingthe following formula:
(5)
whereis the weight of the direct reputation andA peer can makebigger to increase theweight of its own observation and then to decreasebad influence caused by false information frommisbehaving peers. When, itmeans the peer doesnot receive recommendation.
Reputation value should be updateddynamically because of the dynamic environmentin P2P networks. So our design takes into accountthe peer’s historical reputation, which helps us calculate a peer’s comprehensive reputation. In this way, peer “A” can compute the comprehensive reputationof peer “B”using the following formula:
(6)
The first part describes the comprehensive reputation value of peer ‘B’ figured in the reputation value table of peer“A” in the past. The secondpartreflects the peer B’s newcomprehensive reputation value computedcurrently based on formula (5).is the weight of the peer’s past comprehensive reputation value and. If, history reputation value will play animportant role and vice-versa.
Each comprehensive reputation isinitialized to 0.5.The lower the comprehensive reputation thepeer has, the higher the possibility of misbehavior thepeer has. When the comprehensive reputation value of a peer is below acertain threshold, it is broadcasted to all theneighboring peers.
2 Simulation Results
To evaluate the effectiveness of the proposed assessment mechanism, a software simulator built from scratch is adopted. In our simulation design, we use a mesh topology with 25000[U18] peers selectedrandomly. This mesh representsa general topology and it can also be applied to specific P2Pnetworks [7].The simulator relies on a discrete time paradigm and thetime step is equal to 225 ms[U19].
To perform the simulationanalysis, we adopted the following parameter values. For thesake of clarity only 10 minutes of the overall simulation ispresented. To obtain a realistic simulation welimited theavailable bandwidth. According to the application characteristics of P2P networks,the bandwidth is unable to keep a sustained speed of 5.00 Mb/s, but rather tends to stabilize around a maximum 2.75 Mb/s. Themovement of all peers wasrandomly generatedwith a maximum speed of 2.5Mb/s and an averagepause of 30s.Eachsimulation runs 500 simulation seconds. Theresult is shown in Fig. 1[U20]. The vertical axisshows the comprehensive reputation value indifferent forwarding rate, while the horizontal shows the time.
From Fig.1(Figure在句中作主语是写成Figure 1作其他成分写成Fig.1), it is found that normalpeers can obtain a high reputation value rangingfrom 0.787 to 0.964 after a while; the comprehensivereputation of a peer that forwards packets with arate of 80%[U21] can reach a reputation value rangingfrom 0.609 to 0.824. Asthe forwarding rate decreases, the comprehensive reputation ofthe malicious peer decreases from the value 0.5 toa value close to 0.011 gradually.
The changing of comprehensive reputation is gradual. This is because we takehistory reputation into consideration anddeliberate that faults are tolerant. However,the differences of comprehensive reputation between malicious peer and normalpeers are still obvious. In this way, we can decide to select which peers to communicateand isolate the maliciouspeers.
1
PENG Hao et al:A Mechanism Based on Reputation in P2P Networks to …
Fig. 1 Comparison of c[U22]omprehensive reputations of different forwarding rates
1
PENG Hao et al:A Mechanism Based on Reputation in P2P Networks to …
3 Conclusion
In this paper, we proposed a reputation-based mechanism to counter malicious packet dropping in P2P networks. It can offer defense against malicious peers and improve the peer’s quality of service, thus it can ensure P2P network’s communication security and robustness. However, the mechanism proposed in the paper only uses a reputation threshold to avoid attackers and then attackers in P2P networks may also adjust adaptively. To enhance our design here, in future work, we will introduce other mechanisms such as anonymity and load balance to optimize the mechanism.
References[U23][1]Bertino E, FerrariE, Squicciarini A. Reputation-X: A peer-to-peer framework for reputation establishment [J].IEEE Transaction on Knowledge and Data Engineering, 2004, 16(7):827-842.
[2]Song S, Hwang K, Zhou R, et al.Reputationed P2P transactions with fuzzy reputationaggregation[J]. IEEE Internet Computing, 2005, 9(6):24-34.
[3]Seigneur JM, Jensen CD.Trading privacy for reputation[C]//Proc2nd International Confon Reputation Management(LNCS2995).Oxford:Springer-Verlag, 2004:93-107.
[4]Bradshaw RW, Holt JE, Seamons KE. Concealing complex policies with hidden credentials[C]//Proc11th ACM Conf on Computer and Communications Security,New York: ACM Press,2004:146-157.
[5]Miranda H, RodriguesL. A framework to provide anonymity in reputation networks[C]// Proc 3rd Annual International Conf on Mobile and Ubiquitous networks: Networks and Services.San Jose: IEEE Press, 2006:1-4.
[6]DespotovicZ, AbererK. P2P reputation management: Probabilistic estimationvs. social networks [J].Computer Networks, 2006, 50(4): 485-500.
[7]LuaEK, CrowcroftJ, Pias M, et al.A survey andcomparison of peer-to-peer overlay network mechanisms [J].IEEE Commun.Survey and Tutorial, 2005, 7(2): 72-93.
1
PENG Hao et al:A Mechanism Based on Reputation in P2P Networks to …
请参考本刊的参考文献格式:注意标点符号,字母大小写,正斜体,期卷起止页码等信息,会议论文注意出版地,出版商等信息齐全)
参考文献标准格式(武汉大学自然科学学报英文版)
参考文献中的人名,无论是中国人还是外国人,所有作者姓前名后,姓写全(首字母大写),名字缩写,首字母大写:Anderson R;日本、韩国作者发表的外文文献按原格式。
注意:文章名后面方括号里面是文献类型标记,期刊是[J],书是[M],会议文集是[C],若原文献是中文,再最后面加(Ch).
应特别注意字体,字号,黑白体,大小写,正斜体
不同的文献类型的格式如下:
1文献来自期刊:
[文献序号] 作者名(超过三个作者的,第三个作者以后用et al斜体).文章名(仅仅首单词首字母大写,其余小写)[J].期刊名(实词首字母大写,斜体),年,卷(加粗)(期):起止页.(times new roman 小五号字)
例
[1]Bertino E, FerrariE, Squicciarini A. Reputation-X: A peer-to-peer framework for reputation establishment [J].IEEE Transaction on Knowledge and Data Engineering, 2004, 16(7): 827-842.
[2] Bernecker T, Kriegel H P, Mamoulis N, et al. Scalable probabilistic similarity ranking in uncertain databases[J]. IEEE Trans Knowl Data Eng, 2010,22(9):1234-1246.
2 文献来自书籍:
[文献序号] 作者名(超过三个作者的,第三个作者以后用et al斜体).书名(实词首字母大写,斜体)[M].出版城市:出版社,出版年.
例
[2]Mollin R A. An Introduction to Cryptography[M]. Boca Raton: CRC Press, 2006.
3 文献来自会议文集:
[文献序号] 作者名(超过三个作者的,第三个作者以后用et al斜体)).文章题目[C]//会议名称(实词首字母大写,斜体).出版地:出版社,出版年: 起止页(任选).
例
[3]Miranda H, Rodrigues L. A framework to provide anonymity in reputation networks[C]// Proc 3rd Annual International Conf on Mobile and Ubiquitous networks: Networks and Services.San Jose: IEEE Press, 2006: 1-4.
4文献来自会议学位论文:
[文献序号] 作者名(超过三个作者的,第三个作者以后用et al斜体).Title(实词首字母大写,斜体)[D].城市:大学,出版年份.
[4]Li R X. Research on Methods of Financial Documents Content Authentication Based on Watermarking [D].Wuhan: South-Central University for Nationalities, 2010(Ch).
5文献来自网上电子公告:
[文献序号] 作者名(超过三个作者的,第三个作者以后用et al斜体)).题目[EB/OL].[年-月-日](截取时间).网址(斜体). 网址中冒号“:”是正体
例
[5]Kunk A, Bohman P, Shaw E. VMM Based Rootkit Detection on Android[EB/OL]. [2011-05-10].
6文献来自国际或国家标准:
[文献序号]颁布机构. 标准编号,标准名称(斜体)(标准号)[S]. 出版城市:出版社,出版年
[6]Environmental Protection Department. Leachate Treatment Project Technical Specification of Municipal Solid Waste Landfill (HJ564-2010)[S]. Beijing: China Environmental Science Press, 2010(Ch).
7文献来自专利:
[文献序号]作者名(超过三个作者的,第三个作者以后用et al斜体)).专利名(斜体)[P].专利国家:专利号,公开日期.
例
[7]Brickell E F, Hall C D, Cihula J F, et al. Method of Improving Computer Security Through Sandboxing[P]. US: 7908653, 2011-03-15.
[8]Ashok R K, Jemiolo D E, Kaplinger T E, et al. Secure Access to a Virtual Machine[P]. US: 13/420,102, 2012-03-14.
[U1]Arial 加粗 五号
姓前名后,姓全部大写,名首字母大写
[U2]有一个单位以上,在作者名后加上标1,2,…若学生为第一作者,导师为通讯作者,则导师名字后加†
[U3]作者单位具体到二级单位,给出城市,times new roman 小五号 首行缩进2字符
[U4]Times new roman 六号字
[U5]Arial 小五 加粗
[U6]Times new roman 小五
[U7]Arial 六号 加粗
[U8]Times new roman 六号
[U9]作者名后若有,则脚注也应该有,前后呼应
[U10]一级标题从0开始,实词首字母大写,Arial 加粗,四号
[U11]1,2,3用带圈数字
[U12]数字与标题之间空两格,二级标题Arial 五号 加粗,三级标题Times new Roman 五号(与中文一致,实词首字母大写)
[U13]类似的定义、算法、定理、公理、引理等都需加粗,且空两格接正文
[U14]单字符变量斜体,多字符变量正体
[U15]公式居中,10.5磅
[U16]减号和半字线需要分开
[U17]多字符变量正体
[U18](数字达到3位数以上,每3位空一格,小数亦如是)
[U19]数字和单位之间空格
[U20]除Figure在句首用全称外,在句中都用缩写。
[U21]数字与百分号之间不空格
[U22]Times new roman 小五号 加粗,首单词首字母大写。图中字体用Times new roman 小五号
[U23]