作者
Mary Subaja Christo, S Meenakshi
发表日期
2016/6
期刊
Indian Journal of Science and Technology
卷号
9
期号
21
页码范围
1-9
简介
Objectives
Due to the distributed network topology of peer-to-peer network, there are high possibilities for the malicious node, thereby making security a very important criterion in managing the network performance.
Methods
Security in the network is ensured by validation using Rumor Recovery (RR) protocol. Trust table verification method guarentees the validity of initiator node and sower node validity. In this method, the initiator node sends its query message to the responder node according to the rumor generation and recovery phase and query issuance phase of the RR protocol. Responder node validation process is used for saving responding nodes from attacks.
Findings
In this paper, we mainly concentrate on the detection and elimination of initiator node attack, replay attack, and sower attack. The performance metrics considered for evalution are delay, delivery ratio and throughput. Simulation results show that the proposed Trusted Rumor Riding (TRR) protocol. 1. Out performs RR protocol by 34% in terms of delay, 1% in terms of delivery ratio and 17% in terms of throughput while detecting and eliminating the initiator attack; 2. Out performs RR by 98% in terms of delay, 41% in terms of delivery ratio and 19% in terms of throughput while detecting and eliminating the replay attack; and 3. Out performs RR by 95% in terms of delay, 9% in terms of delivery ratio and 36% in terms of throughput while detecting and eliminating the sower attack. Most of the existing works did not consider these three attacks; only few works considered it, but those were failed to meet the quality of service requirements. The detected attacks are avoided in a …
引用总数
2016201720182019202020212022112
学术搜索中的文章