Show simple item record

dc.contributor.authorLi, Zhiyuan
dc.contributor.authorLiu, Lu
dc.contributor.authorChen, Rulong
dc.contributor.authorBi, Jun-Lei
dc.date.accessioned2016-11-16T17:29:07Z
dc.date.available2016-11-16T17:29:07Z
dc.date.issued2015-06-12
dc.identifier.citationLi, Z-Y., (2016) 'An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games', Peer-to-Peer Networking and Applications, 9(6), pp.1005-1019en
dc.identifier.issn1936-6442
dc.identifier.doi10.1007/s12083-015-0376-5
dc.identifier.urihttp://hdl.handle.net/10545/620870
dc.description.abstractPeers in Mobile P2P (MP2P) networks exploit both the structured and unstructured styles to enable communication in a peer-to-peer fashion. Such networks involve the participation of two types of peers: benign peers and malicious peers. Complexities are witnessed in the determination of the identity of the peers because of the user mobility and the unrestricted switching (ON/OFF) of the mobile devices. MP2P networks require a scalable, distributed and light-weighted secure communication scheme. Nevertheless, existing communication approaches lack the capability to satisfy the requirements above. In this paper, we propose an Adaptive Trusted Request and Authorization model (ATRA) over MP2P networks, by exploiting the limited historical interaction information among the peers and a Bayesian game to ensure secure communication. The simulation results reveal that regardless of the peer’s ability to obtain the other such peer’s trust and risk data, the request peers always spontaneously connect the trusted resource peers and the resource peers always preferentially authorize the trusted request peers. Performance comparison of ATRA with state-of-the-art secure communication schemes over MP2P networks shows that ATRA can: (a) improve the success rate of node typing identification, (b) reduce time required for secure connections found, (c) provide efficient resource sharing, and (d) maintain the lower average cost.
dc.language.isoenen
dc.publisherSpringeren
dc.relation.urlhttp://link.springer.com/10.1007/s12083-015-0376-5en
dc.rightsArchived with thanks to Peer-to-Peer Networking and Applicationsen
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/en
dc.subjectMobile peer-to-peer networksen
dc.subjectSecure communicationen
dc.subjectTrusted request and authorizationen
dc.subjectBayesian gameen
dc.titleAn adaptive secure communication framework for mobile peer-to-peer environments using Bayesian gamesen
dc.typeArticleen
dc.identifier.eissn1936-6450
dc.contributor.departmentUniversity of Derbyen
dc.identifier.journalPeer-to-Peer Networking and Applicationsen
html.description.abstractPeers in Mobile P2P (MP2P) networks exploit both the structured and unstructured styles to enable communication in a peer-to-peer fashion. Such networks involve the participation of two types of peers: benign peers and malicious peers. Complexities are witnessed in the determination of the identity of the peers because of the user mobility and the unrestricted switching (ON/OFF) of the mobile devices. MP2P networks require a scalable, distributed and light-weighted secure communication scheme. Nevertheless, existing communication approaches lack the capability to satisfy the requirements above. In this paper, we propose an Adaptive Trusted Request and Authorization model (ATRA) over MP2P networks, by exploiting the limited historical interaction information among the peers and a Bayesian game to ensure secure communication. The simulation results reveal that regardless of the peer’s ability to obtain the other such peer’s trust and risk data, the request peers always spontaneously connect the trusted resource peers and the resource peers always preferentially authorize the trusted request peers. Performance comparison of ATRA with state-of-the-art secure communication schemes over MP2P networks shows that ATRA can: (a) improve the success rate of node typing identification, (b) reduce time required for secure connections found, (c) provide efficient resource sharing, and (d) maintain the lower average cost.


This item appears in the following Collection(s)

Show simple item record

Archived with thanks to Peer-to-Peer Networking and Applications
Except where otherwise noted, this item's license is described as Archived with thanks to Peer-to-Peer Networking and Applications