Downloads: 118 | Views: 257
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.5 / 10
Group Formation with Neighbour Similarity Trust in P2P E-Commerce
M. Robin Rutherford, V. Dheepa
Abstract: This paper is based on networking in predicting the trust between Peer to peer (P2P) e-commerce applications with liabilities to passive and active attacks. These attacks have turned out the potential business firms and individuals whose aim is to get the best benefit in e-commerce with minimal losses. The attacks occur when contacts between the swapping peers as an execution occurs In this paper, Sybil attack is proposed as an active attack, in which peers can have asserts, and can be considered as numerous identities to fake their owns. In our approach, traced Sybil attack peers can be recognized as the adjacent peers and became more trusted to each other. Security and performance analysis shows that Sybil attack can be reduced by our proposed neighbour similarity trust. The peer identities are then occupied to drag the behaviour of the system. However, if a single flawed entity can present multiple identities, it can control a massive proportion. All the resources utilized in the P2P infrastructure are contributed by the peers itself unless a traditional approaches where a central authority control is used. A peer gives illegal tributes will have its trust level minimised. In case it reaches a certain threshold level, the peer can be expelled from the group. Each peer has an identity, which is either honest or Sybil.
Keywords: P2P, trust, Sybil attack, collusion attack, neighbor similarity
Edition: Volume 4 Issue 3, March 2015
Pages: 1374 - 1377
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 12 Issue 10, October 2023
Pages: 581 - 585Decentralized Data Access Control Mechanism for Healthcare Sector based on Blockchain Security
R. Vidhya, R. Sathya
Downloads: 102
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2371 - 2374Survey on Data Aggregation Technique for Wireless Sensor Networks based on IF algorithm
Anagha Jagtap, M. D. Ingle
Downloads: 109
Survey Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013
Pages: 354 - 356Secure Routing to Prevent Sybil Attack in Sensor Networks
Mohammed Abrar, P. Subhadra
Downloads: 109
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 2625 - 2629Energy Efficient Data Aggregation of Wireless Sensor Network and Attacks using Error Bound
Yogita Hukre, S. S. Dongre
Downloads: 115
Review Papers, Computer Science & Engineering, India, Volume 7 Issue 7, July 2018
Pages: 1297 - 1298Hybrid Approach of KNN and Euclidean Distance to Tackle Sybil Attack in the Network
Yasmeen, Parminder Kaur