Title :
A reputation management model using ID based cryptosystem in overlay networks
Author :
Kilinc, H. Hakan
Author_Institution :
Dept. of Electron. Eng., Gebze Inst. of Technol., Gebze, Turkey
Abstract :
Dealing with malicious nodes is an important issue for many types of overlay networks. In overlay networks, malicious nodes can drop, delay or in other ways subvert user traffic, modify packets and break protocols required for the successful operation of the system. We propose a reputation management model supported by an ID based cryptosystem to reveal a malicious node with the aid of altruistic legitimate nodes who wish to identify a malicious node. We propose a deterrent structure using simple mathematical methods to calculate reputation of nodes. Evaluations show that the cost of malicious behaviours for nodes can be extremely high.
Keywords :
cryptography; identification technology; protocols; telecommunication network management; telecommunication security; telecommunication traffic; ID based cryptosystem; altruistic legitimate node; malicious behaviour; malicious node; mathematical method; overlay network; protocol; reputation management model; traffic; Adaptation models; Cryptography; Fires; Quality of service; ID Based Cryptosystem; Overlay Network; Reputation Management;
Conference_Titel :
Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International
Conference_Location :
Istanbul
Print_ISBN :
978-1-4244-9539-9
DOI :
10.1109/IWCMC.2011.5982529