• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology

Article

Indian Journal of Science and Technology

Year: 2016, Volume: 9, Issue: 21, Pages: 1-9

Original Article

Reliable and Authenticated Rumor Riding Protocol for Unstructured Peer-to-Peer Network

Abstract

Objectives: Due to the distributed network topology of peer-to-peer network, there are high possibilities for the malicious node, thereby making security a very important criterion in managing the network performance. Methods: Security in the network is ensured by validation using Rumor Recovery (RR) protocol. Trust table verification method guarentees the validity of initiator node and sower node validity. In this method, the initiator node sends its query message to the responder node according to the rumor generation and recovery phase and query issuance phase of the RR protocol. Responder node validation process is used for saving responding nodes from attacks. Findings: In this paper, we mainly concentrate on the detection and elimination of initiator node attack, replay attack, and sower attack. The performance metrics considered for evalution are delay, delivery ratio and throughput. Simulation results show that the proposed Trusted Rumor Riding (TRR) protocol. 1. Out performs RR protocol by 34% in terms of delay, 1% in terms of delivery ratio and 17% in terms of throughput while detecting and eliminating the initiator attack; 2. Out performs RR by 98% in terms of delay, 41% in terms of delivery ratio and 19% in terms of throughput while detecting and eliminating the replay attack; and 3. Out performs RR by 95% in terms of delay, 9% in terms of delivery ratio and 36% in terms of throughput while detecting and eliminating the sower attack. Most of the existing works did not consider these three attacks; only few works considered it, but those were failed to meet the quality of service requirements. The detected attacks are avoided in a effective manner to provide the secure communication. Applications/Improvement: From the results, it is concluded that the proposed TRR protocol can detect several attack while satisfying the quality of service needs.
Keywords: Malicious Node, Peer-To-Peer Network, Rumor Riding, Security, Trust Node, Validation

DON'T MISS OUT!

Subscribe now for latest articles and news.