Abstract
Peers in Mobile P2P (MP2P) networks exploit both the structured and unstructured styles to enable communication in a peer-to-peer fashion. Such networks involve the participation of two types of peers: benign peers and malicious peers. Complexities are witnessed in the determination of the identity of the peers because of the user mobility and the unrestricted switching (ON/OFF) of the mobile devices. MP2P networks require a scalable, distributed and light-weighted secure communication scheme. Nevertheless, existing communication approaches lack the capability to satisfy the requirements above. In this paper, we propose an Adaptive Trusted Request and Authorization model (ATRA) over MP2P networks, by exploiting the limited historical interaction information among the peers and a Bayesian game to ensure secure communication. The simulation results reveal that regardless of the peer’s ability to obtain the other such peer’s trust and risk data, the request peers always spontaneously connect the trusted resource peers and the resource peers always preferentially authorize the trusted request peers. Performance comparison of ATRA with state-of-the-art secure communication schemes over MP2P networks shows that ATRA can: (a) improve the success rate of node typing identification, (b) reduce time required for secure connections found, (c) provide efficient resource sharing, and (d) maintain the lower average cost.
Similar content being viewed by others
References
Waluyo AB, Taniar D, Rahayu W, Aikebaier A (2013) Mobile peer-to-peer data dissemination in wireless ad-hoc networks. Inf Sci 230:3–20
Mavromoustakis CX (2013) Mitigating file-sharing misbehavior with movement synchronization to increase end- to-end availability for delay sensitive streams in vehicular P2P devices. Int J Commun Syst 26(12):1599–1616
Chen K, Hwang K, Chen G (2009) Heuristic discovery of role-based trust chains in peer-to-peer networks. IEEE Trans Parallel Distrib Syst 20(1):83–95
Zhou L, Varadharajan V, Hitchens M (2013) Achieving secure role-based access control on encrypted data in cloud storage. IEEE Trans Inf Forensic Secur 8(12):1947–1960
Huang Z, Ruj S, Cavenaghi MA, Stojmenovic M, Nayak A (2014) A social network approach to trust management in VANETs. Peer-To-Peer Netw Appl 7(3):229–242
Tian CQ, Yang BJ (2014) A D-S evidence theory based fuzzy trust model in file-sharing P2P networks. Peer-to-Peer Netw Appl 7(4):332–345
Hao F, Min GY, Lin M, Luo C, Yang LT (2014) MobiFuzzyTrust: an efficient fuzzy trust inference mechanism in mobile social networks. IEEE Trans Parallel Distrib Syst 25(11):2944–2955
Qureshi B, Min GY, Kouvatsos D (2012) A distributed reputation and trust management scheme for mobile peer-to-peer networks. Comput Commun 35(5):608–618
Jia AL, Rahman R, Vinko T, Pouwelse JA (2013) Systemic risk and user-level performance in private P2P communities. IEEE Trans Parallel Distrib Syst 24(12):2503–2512
Mansilla A, Esteva J (2013) Question waves: a multicast query routing algorithm for social search. Inf Sci 253:1–25
Lagesse B, Kumar M, Wright M (2008) AREX: an adaptive system for secure resource access in mobile P2P systems. In: Proceedings of the Eighth International Conference on Peer-to-Peer Computing(P2P’08). pp 43–52
Militano L, Iera A, Scarcello F (2013) A fair cooperative content-sharing service. Comput Netw 57(9):1955–1973
Simplicio MA Jr, Santos MAS, Leal RR, Gomes MAL, Goya WA (2014) SecureTCG: a lightweight cheating-detection protocol for P2P multiplayer online trading card games. Secur Commun Netw 7(12):2412–2431
Das A, Islam MM (2012) SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems. IEEE Trans Depend Secure Comput 9(2):261–274
Shen HY, Liu GX, Gemmill J, Ward L (2014) A P2P-based infrastructure for adaptive trustworthy and efficient communication in wide-area distributed systems. IEEE Trans Parallel Distrib Syst 25(9):2222–2233
Mahmoud MMEA, Taha S, Misic J, Shen XM (2014) Lightweight privacy-preserving and secure communication protocol for hybrid ad hoc wireless networks. IEEE Trans Parallel Distrib Syst 25(8):2077–2090
Sun Z, Shen J (2013) A high performance peer to cloud and peer model augmented with hierarchical secure communications. J Syst Softw 86(7):1790–1796
Gummadi A, Yoon JP (2004) Modeling group trust for peer-to-peer access control. In: Proceedings of the 15th International Workshop on Database and Expert Systems Applications, Zaragoza, Spain. pp 971–978
Liu GX, Shen HY, Ward L (2015) An efficient and trustworthy P2P and social network integrated file sharing system. IEEE Trans Comput 64(1):54–70
Selvaraj C, Sheila A (2012) Peer profile based trust model for P2P systems using genetic algorithm. Peer-to-Peer Netw Appl 5(1):92–103
Shen H, Li Z (2015) A hierarchical account-aided reputation management system for MANETs. IEEE/ACM Trans Networking 23(1):70–84
Che S, Feng R, Liang X, Wang X (2015) A lightweight trust management based on Bayesian and entropy for wireless sensor networks. Secur Commun Netw 8(2):168–175
Xia YJ, Song GH, Zhu MZ (2010) Trusted small world P2P model based on zero knowledge interactive proof and bayesian trust network. J Zhejiang Univ (Eng Sci) 44(1):56–60
Zuo F, Zhang W (2014) A group strategy-proof incentive approach for eliminating selfish behaviors in peer-to-peer file allocation. Int J Commun Syst 27(12):3545–3564
Liang X, Xiao Y (2013) Game theory for network security. IEEE Communications Surv Tutor 15(1):472–486
Milani S, Calvagno G (2015) Distributed multiple description video transmission via noncooperative games with opportunistic players. IEEE Trans Circ Syst Video Technol 25(1):125–138
Harsanyi JC (1967) Games with incomplete information played by Bayesian players, parts I, II and III. Manag Sci 14: 159–182,320–334,486–502
Wang XY, Xiao XM (2008) Game theory and its application. Science Press, Peking, China, p 63
Acknowledgments
This work was partially supported by the National Natural Science Foundation of China under Grant No.61202474, the Project Funded by China Postdoctoral Science Foundation No. 2015M570469, the Natural Science Foundation of Jiangsu Province under Grant No.BK20130528 and the Senior Professional Scientific Research Foundation of Jiangsu University under Grant No.12JDG049.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Li, ZY., Liu, L., Chen, RL. et al. An adaptive secure communication framework for mobile peer-to-peer environments using Bayesian games. Peer-to-Peer Netw. Appl. 9, 1005–1019 (2016). https://doi.org/10.1007/s12083-015-0376-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-015-0376-5