Document Type: Original Research Paper

Author

School of Electrical and Computer Engineering, Guilan University, Guilan, Iran

Abstract

Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic programing for achieving trust of a peer without central monitoring . A model of confidence management is proposed here in which every peer ranks other peers according to calculated local confidence based on recommendations and previous interactions . The results show that this model identifies malicious nodes without the use of a central supervisor or overall confidence value and thus the system functions.
Index Terms — peer - to - peer systems , confidence , genetic programing , malicious nodes .

Keywords

Main Subjects

 [1]      Kang, Xin, and Yong dong Wu. "A trust-based pollution attack prevention scheme in peer-to-peer streaming networks." Computer Networks 72 (2014): 62-73.

[2]      Hendrikx, Ferry, Kris Bubendorfer, and Ryan Chard. "Reputation systems: A survey and taxonomy." Journal of Parallel and Distributed Computing 75 (2015): 184-197.

[3]      England, Philip, et al. "A Survey of Trust Management in Mobile Ad-Hoc Networks." Proceedings of the 13th annual post graduate symposium on the convergence of telecommunications, networking, and broadcasting, PGNET. 2012.

[4]      Qi, Xiaoguang, et al. "A complex network model based on the Gnutella protocol." Physica A: Statistical Mechanics and its Applications 388.18 (2009): 3955-3960.

[5]      Fan, Xinxin, et al. "Behavior-based reputation management in P2P file-sharing networks." Journal of Computer and System Sciences 78.6 (2012): 1737-1750.

[6]      Zhou, Runfang, Kai Hwang, and Min Cai. "Gossiptrust for fast reputation aggregation in peer-to-peer networks." Knowledge and Data Engineering, IEEE Transactions on 20.9 (2008): 1282-1295.

[7]      Sattarivand, Mahdi, Reza Ebrahimi Atani, and Yashar Fekri Sustani. "Anew METHOD FOR SECURITY IN PEER TO PEER NETWORK USING MODIFIED PARTICLE SWARM ALGORITHM." Chemical and Process Engineering )2014(, 435-441.

[8]      Bazmara, Mohammad, Shahram Jafari, and Fatemeh Pasand. "A Fuzzy expert system for goalkeeper quality recognition." arXiv preprint arXiv:1309.6433 (2013).

[9]      Mohammad Bazmara,"A Novel Fuzzy Approach for Determining Best Position of Soccer Players", IJISA, vol.6, no.9, pp.62-67, 2014. DOI: 10.5815/ijisa.2014.09.08

[10]   Mohammadi, Fereshteh, and Mohammad Bazmara. "A New Approach of Fuzzy Theory with Uncertainties in Geographic Information Systems." International Journal of Mechatronics, Electrical and Computer Technology 3.6 (2013): 1001-1014.

[11]   M. Bazmara, S. Vahedian and S. Ramadhani, “KNN Algorithm for Consulting Behavioral Disorders in Children,” Journal of Basic and Applied Scientific Research, 3(12) 2013, pp. 981-986

[12]   Pal, Sankar K. "Computational theory perception (CTP), rough-fuzzy uncertainty analysis and mining in bioinformatics and web intelligence: a unified framework." Transactions on Rough Sets XI. Springer Berlin Heidelberg, 2010. 106-129.

[13]   Fereshteh Mohammadi, Mohammad bazmara, Hatef Pouryekta,"A New Hybrid Method for Risk Management in Expert Systems", IJISA, vol.6, no.7, pp.60-65, 2014. DOI: 10.5815/ijisa.2014.07.08

[14]   Koza, John R. "Survey of genetic algorithms and genetic programming." Wescon Conference Record. WESTERN PERIODICALS COMPANY, 1995.

[15]    Hall, Mark A. Correlation-based feature selection for machine learning. Diss. The University of Waikato, 1999.

[16]   Wang, Li. "SoFA: An expert-driven, self-organization peer-to-peer semantic communities for network resource management." Expert Systems with Applications 38.1 (2011): 94-105.

[17]   Cramer, Nichael Lynn. "A representation for the adaptive generation of simple sequential programs."Proceedings of the First International Conference on Genetic Algorithms. 1985.

[18]   Dellarocas, Chrysanthos. "Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior." Proceedings of the 2nd ACM conference on Electronic commerce. ACM, 2000.