Skip to main content
Log in

An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Peers in Mobile P2P (MP2P) networks exploit both the structured and unstructured styles to enable communication in a peer-to-peer fashion. Such networks involve the participation of two types of peers: benign peers and malicious peers. Complexities are witnessed in the determination of the identity of the peers because of the user mobility and the unrestricted switching (ON/OFF) of the mobile devices. MP2P networks require a scalable, distributed and light-weighted secure communication scheme. Nevertheless, existing communication approaches lack the capability to satisfy the requirements above. In this paper, we propose an Adaptive Trusted Request and Authorization model (ATRA) over MP2P networks, by exploiting the limited historical interaction information among the peers and a Bayesian game to ensure secure communication. The simulation results reveal that regardless of the peer’s ability to obtain the other such peer’s trust and risk data, the request peers always spontaneously connect the trusted resource peers and the resource peers always preferentially authorize the trusted request peers. Performance comparison of ATRA with state-of-the-art secure communication schemes over MP2P networks shows that ATRA can: (a) improve the success rate of node typing identification, (b) reduce time required for secure connections found, (c) provide efficient resource sharing, and (d) maintain the lower average cost.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Waluyo AB, Taniar D, Rahayu W, Aikebaier A (2013) Mobile peer-to-peer data dissemination in wireless ad-hoc networks. Inf Sci 230:3–20

    Article  MathSciNet  MATH  Google Scholar 

  2. Mavromoustakis CX (2013) Mitigating file-sharing misbehavior with movement synchronization to increase end- to-end availability for delay sensitive streams in vehicular P2P devices. Int J Commun Syst 26(12):1599–1616

    Article  Google Scholar 

  3. Chen K, Hwang K, Chen G (2009) Heuristic discovery of role-based trust chains in peer-to-peer networks. IEEE Trans Parallel Distrib Syst 20(1):83–95

    Article  MathSciNet  Google Scholar 

  4. Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensic Secur 8(12):1947–1960

    Article  Google Scholar 

  5. Huang Z, Ruj S, Cavenaghi MA, Stojmenovic M, Nayak A (2014) A social network approach to trust management in VANETs. Peer-To-Peer Netw Appl 7(3):229–242

    Article  Google Scholar 

  6. Tian CQ, Yang BJ (2014) A D-S evidence theory based fuzzy trust model in file-sharing P2P networks. Peer-to-Peer Netw Appl 7(4):332–345

    Article  Google Scholar 

  7. Hao F, Min GY, Lin M, Luo C, Yang LT (2014) MobiFuzzyTrust: an efficient fuzzy trust inference mechanism in mobile social networks. IEEE Trans Parallel Distrib Syst 25(11):2944–2955

    Article  Google Scholar 

  8. Qureshi B, Min GY, Kouvatsos D (2012) A distributed reputation and trust management scheme for mobile peer-to-peer networks. Comput Commun 35(5):608–618

    Article  Google Scholar 

  9. Jia AL, Rahman R, Vinko T, Pouwelse JA (2013) Systemic risk and user-level performance in private P2P communities. IEEE Trans Parallel Distrib Syst 24(12):2503–2512

    Article  Google Scholar 

  10. Mansilla A, Esteva J (2013) Question waves: a multicast query routing algorithm for social search. Inf Sci 253:1–25

    Article  Google Scholar 

  11. Lagesse B, Kumar M, Wright M (2008) AREX: an adaptive system for secure resource access in mobile P2P systems. In: Proceedings of the Eighth International Conference on Peer-to-Peer Computing(P2P’08). pp 43–52

  12. Militano L, Iera A, Scarcello F (2013) A fair cooperative content-sharing service. Comput Netw 57(9):1955–1973

    Article  Google Scholar 

  13. Simplicio MA Jr, Santos MAS, Leal RR, Gomes MAL, Goya WA (2014) SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games. Secur Commun Netw 7(12):2412–2431

    Article  Google Scholar 

  14. Das A, Islam MM (2012) SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Depend Secure Comput 9(2):261–274

    Article  Google Scholar 

  15. Shen HY, Liu GX, Gemmill J, Ward L (2014) A P2P-based infrastructure for adaptive trustworthy and efficient communication in wide-area distributed systems. IEEE Trans Parallel Distrib Syst 25(9):2222–2233

    Article  Google Scholar 

  16. Mahmoud MMEA, Taha S, Misic J, Shen XM (2014) Lightweight privacy-preserving and secure communication protocol for hybrid ad hoc wireless networks. IEEE Trans Parallel Distrib Syst 25(8):2077–2090

    Article  Google Scholar 

  17. Sun Z, Shen J (2013) A high performance peer to cloud and peer model augmented with hierarchical secure communications. J Syst Softw 86(7):1790–1796

    Article  Google Scholar 

  18. Gummadi A, Yoon JP (2004) Modeling group trust for peer-to-peer access control. In: Proceedings of the 15th International Workshop on Database and Expert Systems Applications, Zaragoza, Spain. pp 971–978

  19. Liu GX, Shen HY, Ward L (2015) An efficient and trustworthy P2P and social network integrated file sharing system. IEEE Trans Comput 64(1):54–70

    Article  MathSciNet  Google Scholar 

  20. Selvaraj C, Sheila A (2012) Peer profile based trust model for P2P systems using genetic algorithm. Peer-to-Peer Netw Appl 5(1):92–103

    Article  Google Scholar 

  21. Shen H, Li Z (2015) A hierarchical account-aided reputation management system for MANETs. IEEE/ACM Trans Networking 23(1):70–84

    Article  Google Scholar 

  22. Che S, Feng R, Liang X, Wang X (2015) A lightweight trust management based on Bayesian and entropy for wireless sensor networks. Secur Commun Netw 8(2):168–175

    Article  Google Scholar 

  23. Xia YJ, Song GH, Zhu MZ (2010) Trusted small world P2P model based on zero knowledge interactive proof and bayesian trust network. J Zhejiang Univ (Eng Sci) 44(1):56–60

    Google Scholar 

  24. Zuo F, Zhang W (2014) A group strategy-proof incentive approach for eliminating selfish behaviors in peer-to-peer file allocation. Int J Commun Syst 27(12):3545–3564

    Article  Google Scholar 

  25. Liang X, Xiao Y (2013) Game theory for network security. IEEE Communications Surv Tutor 15(1):472–486

    Article  Google Scholar 

  26. Milani S, Calvagno G (2015) Distributed multiple description video transmission via noncooperative games with opportunistic players. IEEE Trans Circ Syst Video Technol 25(1):125–138

    Article  Google Scholar 

  27. Harsanyi JC (1967) Games with incomplete information played by Bayesian players, parts I, II and III. Manag Sci 14: 159–182,320–334,486–502

  28. Wang XY, Xiao XM (2008) Game theory and its application. Science Press, Peking, China, p 63

    Google Scholar 

Download references

Acknowledgments

This work was partially supported by the National Natural Science Foundation of China under Grant No.61202474, the Project Funded by China Postdoctoral Science Foundation No. 2015M570469, the Natural Science Foundation of Jiangsu Province under Grant No.BK20130528 and the Senior Professional Scientific Research Foundation of Jiangsu University under Grant No.12JDG049.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi-Yuan Li.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, ZY., Liu, L., Chen, RL. et al. An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games. Peer-to-Peer Netw. Appl. 9, 1005–1019 (2016). https://doi.org/10.1007/s12083-015-0376-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-015-0376-5

Keywords

Navigation