• HOME
  • IEEE Projects
    • IEEE Projects 2017 Dot Net Projects
    • IEEE Projects 2017 Java Projects
    • IEEE Projects 2016 Dot Net Projects
    • IEEE Projects 2016 Java Projects
    • IEEE Projects 2015
    • IEEE Projects 2014
      • IEEE 2014 Java Projects
        • IEEE Projects 2014 For Cse in Data Mining Java
        • IEEE Projects 2014 For Cse in cloud computing Java
        • IEEE Projects 2014 For Cse in Image Processing Java
        • IEEE Projects 2014 For Cse in Mobile Computing Java
        • IEEE Projects 2014 For Cse in Networking Java
        • IEEE Projects 2014 For Cse in Network Security Java
        • IEEE Projects 2014 For Cse in Software Engineering Java
      • IEEE 2014 Dotnet Projects
        • IEEE Projects 2014 For Cse in Data Mining Dotnet
        • IEEE Projects 2014 For Cse in Cloud Computing Dotnet
        • IEEE Projects 2014 For Cse in Netwoking Dotnet
        • IEEE Projects 2014 For Cse in Netwok Security Dotnet
    • IEEE Projects 2013
      • IEEE 2013 JAVA Projects
      • IEEE 2013 Dotnet Projects
    • IEEE Projects 2012
      • IEEE 2012 JAVA Projects
      • IEEE 2012 Dotnet Projects
    • IEEE Projects 2011
      • IEEE 2011 JAVA Projects
      • IEEE 2011 Dotnet Projects
    • IEEE Projects 2010
  • Power Electronics Projects
    • IEEE Projects 2015 For Power Electronics
    • IEEE Projects 2014 For Power Electronics
    • IEEE 2013 Power Electronics Projects
  • EMBEDDED Projects
    • IEEE Projects 2015 For Embedded Systems
    • IEEE 2013 Embedded Projects
  • Matlab Projects
    • IEEE 2013 Image Processing Projects
    • IEEE 2013 Power Electronics Projects
    • IEEE 2013 Communication Projects
  • NS2 Projects

Phd Projects | IEEE Project | IEEE Projects 2020-19 in Trichy & Chennai

IEEE Projects Trichy, Best IEEE Project Centre Chennai, Final Year Projects in Trichy - We Provide IEEE projects 2018 - 2019 , IEEE 2018 Java Projects for M.E/M.Tech, IEEE 2018 Dot net Projects for B.E/B.Tech, IEEE 2018 Power electronics Projects Engineering & Diploma Students, Matlab, Embedded, NS2 Projects
  • HOME
  • IEEE 2017 DOT NET PROJECT TITLES
  • IEEE 2017 JAVA PROJECT TITLES
  • CONTACT US
You are here: Home / IEEE Projects 2013-14 / Trust information is dependent to the Structure of p2p network

Trust information is dependent to the Structure of p2p network

March 14, 2014 by IeeeAdmin

A trust model for P2P networks is presented, in which a peer can develop a trust network in its proximity. A peer can isolate malicious peers around itself as it develops trust relationships with good peers. Two context of trust, service and recommendation contexts, are defined to measure capabilities of peers in providing services and giving recommendations. Interactions and recommendations are considered with satisfaction, weight, and fading effect parameters. A recommendation contains the recommender’s own experience, information from its acquaintances, and level of confidence in the recommendation. These parameters provided us a better assessment of trustworthiness. Individual, collaborative, and pseudonym changing attackers are studied in the experiments. Damage of collaboration and pseudospoofing is dependent to attack behavior. Although recommendations are important in hypocritical and oscillatory attackers, pseudospoofers, and collaborators, they are less useful in naive and discriminatory attackers. SORT mitigated both service and recommendation-based attacks in most experiments. The following assumptions. Peers are equal in computational power and responsibility. There are no privileged, centralized, or trusted peers to manage trust relationships. Peers occasionally leave and join the network. A peer provides services and uses services of others. For simplicity of discussion, one type of interaction is considered in the service context, i.e., file download. PEER-TO-PEER (P2P) systems rely on collaboration of peers to accomplish tasks. Ease of performing malicious activity is a threat for security of P2P systems. Creating long-term trust relationships among peers can provide a more secure environment by reducing risk and uncertainty in future P2P interactions. Establishing trust in an unknown entity is difficult in such a malicious environment. Trust is a social concept and hard to measure with numerical values. Metrics are needed to represent trust in computational models. Classifying peers as either trustworthy or untrustworthy is not sufficient in most cases. Metrics should have precision so peers can be ranked according to trustworthiness. Interactions and feedbacks of peers provide information to measure trust among peers. Interactions with a peer provide certain information about the peer but feedbacks might contain deceptive information. This makes assessment of trustworthiness a challenge. In the presence of an authority, a central server is a preferred way to store and manage trust information, e.g., eBay. The central server securely stores trust information and defines trust metrics. Since there is no central server in most P2P systems, peers organize themselves to store and manage trust information about each other. Management of trust information is dependent to the structure of P2P network.

Filed Under: IEEE Projects 2013-14 Tagged With: IEEE Projects 2015 for Mca, ieee projects 2015 for me cse, IEEE Projects 2015 For Mphil Cse, IEEE Projects 2015 For Mphil IT, ieee projects 2015 for mtech cse, ieee projects 2015 in network securiy

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in