DocumentCode :
2732196
Title :
A reputation management model using ID based cryptosystem in overlay networks
Author :
Kilinc, H. Hakan
Author_Institution :
Dept. of Electron. Eng., Gebze Inst. of Technol., Gebze, Turkey
fYear :
2011
fDate :
4-8 July 2011
Firstpage :
947
Lastpage :
952
Abstract :
Dealing with malicious nodes is an important issue for many types of overlay networks. In overlay networks, malicious nodes can drop, delay or in other ways subvert user traffic, modify packets and break protocols required for the successful operation of the system. We propose a reputation management model supported by an ID based cryptosystem to reveal a malicious node with the aid of altruistic legitimate nodes who wish to identify a malicious node. We propose a deterrent structure using simple mathematical methods to calculate reputation of nodes. Evaluations show that the cost of malicious behaviours for nodes can be extremely high.
Keywords :
cryptography; identification technology; protocols; telecommunication network management; telecommunication security; telecommunication traffic; ID based cryptosystem; altruistic legitimate node; malicious behaviour; malicious node; mathematical method; overlay network; protocol; reputation management model; traffic; Adaptation models; Cryptography; Fires; Quality of service; ID Based Cryptosystem; Overlay Network; Reputation Management;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Wireless Communications and Mobile Computing Conference (IWCMC), 2011 7th International
Conference_Location :
Istanbul
Print_ISBN :
978-1-4244-9539-9
Type :
conf
DOI :
10.1109/IWCMC.2011.5982529
Filename :
5982529
Link To Document :
بازگشت