try to receive service from others without cooperating with them. Some others, called Sybil
nodes, break the rules of the system by colluding and showing fake identities. P2P networks
are highly vulnerable to these attacks. In previous research, no method has been suggested
to counter these two attacks simultaneously. In the proposed method, a new centrality
relationship has been used in the incentive mechanism to deal with both problems at the …