A subjective approach to routing in P2P and ad hoc networks

被引:0
|
作者
Twigg, A [1 ]
机构
[1] Univ Cambridge, Comp Lab, Cambridge CB2 3QG, England
来源
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper presents a subjective approach to routing in peer-to-peer and ad hoc networks. The main difference between our approach and traditional routing models is the use of a trust model to mediate the risk inherent in routing decisions. Rather than blindly exchanging routing table entries, nodes 'discount' recommendations from other nodes using a distributed trust computation which allows them to avoid malicious, faulty and unreliable nodes and links in routing decisions. Adding the risk model allows energy-efficient routing decisions to be made in a wireless network, and we show how our model can be optimized for different network behaviours, including wireless networks. The model is described in the context of the DSR [1] routing algorithm, although it is equally-applicable to others, including peer-to-peer routing substrates.
引用
收藏
页码:225 / 238
页数:14
相关论文
共 50 条
  • [1] An anycast-based P2P routing protocol for mobile ad hoc networks*
    Cheng, Rong
    Jin, Hai
    Shi, Ke
    Cheng, Bin
    2005 1ST IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET (ICI), 2005, : 20 - 24
  • [2] P2P multicast for pervasive ad hoc networks
    Delmastro, Franca
    Passarella, Andrea
    Conti, Marco
    PERVASIVE AND MOBILE COMPUTING, 2008, 4 (01) : 62 - 91
  • [3] P2P over mobile ad-hoc networks
    Marques, Antonio
    da Silva, Femando Mira
    Rocha, Rui
    2009 6TH ANNUAL IEEE COMMUNICATION SOCIETY CONFERENCE ON SENSOR, MESH AND AD HOC COMMUNICATIONS AND NETWORKS WORKSHOPS, 2009, : 206 - 208
  • [4] Ad hoc and P2P security
    Shieh, SW
    Wallach, DS
    IEEE INTERNET COMPUTING, 2005, 9 (06) : 14 - 15
  • [5] KadOLSR: An Efficient P2P Overlay for Mobile Ad Hoc Networks
    Al Mojamed, Mohammad
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (10) : 90 - 96
  • [6] Towards scalable P2P computing for mobile ad hoc networks
    Conti, M
    Gregori, E
    Turi, G
    SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2004, : 109 - 113
  • [7] Revisiting P2P Content Sharing in Wireless Ad Hoc Networks
    Sbai, Mohamed Karim
    Barakat, Chadi
    SELF-ORGANIZING SYSTEMS, PROCEEDINGS, 2009, 5918 : 13 - 25
  • [8] Incentives for P2P File Sharing in Mobile Ad Hoc Networks
    Mawji, Afzal
    Hassanein, Hossam
    2009 6TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1 AND 2, 2009, : 336 - 340
  • [9] Risk management of digital certificates in ad hoc and P2P networks
    Zhou, Tong
    Harn, Lein
    2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 312 - 317
  • [10] Cryptography Enhanced Ad-Hoc Approach to P2P Overlays
    Zima, Michal
    Hladka, Eva
    2016 INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING & SIMULATION (HPCS 2016), 2016, : 517 - 522