Elsevier

Information Sciences

Volume 470, January 2019, Pages 94-108
Information Sciences

Preventing Sybil attacks in P2P file sharing networks based on the evolutionary game model

https://doi.org/10.1016/j.ins.2018.08.054Get rights and content

Abstract

In cooperative Peer-to-Peer (P2P) networks, a number of users, called Free-riders, try to receive service from others without cooperating with them. Some others, called Sybil nodes, break the rules of the system by colluding and showing fake identities. P2P networks are highly vulnerable to these attacks. In previous research, no method has been suggested to counter these two attacks simultaneously. In the proposed method, a new centrality relationship has been used in the incentive mechanism to deal with both problems at the same time. In this regard, the more varied the nodes receiving service from a peer are, the better the peer reputation will be. The results show that the longer the network life goes on, the more free-riders are detected, and the number of services delivered to the collusive nodes will also be reduced.

Introduction

Peer-to-Peer (P2P) networks are considered as an effective way to organize distributed systems, which allow a group of users to communicate with each other and share their resources. They are mainly built on a network like the internet. Deploying networks such as CAN, (Content Addressable Network), Chord, Pastry and Tapestry on a large scale has enabled millions of nodes (users) to be able to share their data [32].

P2P architecture was a revolution in sharing large files on the internet. This architecture provided the opportunity for each peer to contribute to both uploading and downloading files. This contribution is autonomous, and each user decides on which level to contribute. The success of a P2P file sharing system depends on the contribution of users [18].

The open and dynamic nature of P2P networks can be both useful and dangerous. Problems such as free-riders and malicious users can cause a lot of problems in the proper functioning of the system [8].

In this infrastructure, nodes provide or use resources. The nodes can request the service from others or provide a service for others. Each node acquires benefit by receiving the service and pays a price by providing it for other nodes. In this cooperative model, each node usually tries to receive the most service possible. Defectors, also known as free-riders, are only looking to download their own resources among shared ones. They also avoid offering services to other nodes [7], [37].

The spread of such a phenomenon can be destructive. It might also reduce the value of file sharing in the network and further turn it into a sick network. According to a study conducted in 2005, 85% of Gnutella network users are free riders, and only 1% of the users share files and resources spontaneously [37].

Unfortunately, the P2P system does not have a central controller capable of monitoring user performance. Therefore, detection and prevention of malicious behaviors in this environment has become a major challenge. How to manage nodes and encourage them to cooperate is a fundamental issue in this open system. Trust and reputation techniques are the key ways to create collaborating behavior in P2P systems. Many solutions have so far been proposed based on these techniques, each with their own trust estimation, reputation dissemination and response to non-cooperative behavior methods [27].

In decentralized, distributed and uncontrolled systems, a user can pose a problem for the system by gaining and controlling a large number of IDs [28], [38]. This type of attack is called a Sybil attack and is known as a major threat to P2P systems. In this attack, a user with several fake identities exists on the network. Douceur [15] has proven that it is impossible to completely eliminate Sybil nodes, thus great efforts were made to minimize the malicious effects of the Sybil attack.

Much research has been done to identify free riders in P2P file sharing networks. Some of the most important papers in this area have been discussed in Section 2. In all these researches, a method has been proposed to detect the presence of a free rider in the network. After detecting the free riders, providing service for them can be stopped, or the quality of the service can be reduced. This will create an incentive for network users to cooperate. On the other hand, other papers focused on the identification of Sybil attacks. Some of these papers have been reviewed in Section 2. These researches focus on identifying users who are trying to violate the rules governing the network.

Accordingly, the main questions in this research that we are looking for include the following:

  • How can we design a mechanism that can detect free riders in as well as confront Sybil attacks?

  • How can a robust incentive mechanism be designed to help users cooperate with the network?

  • What parameters affect the network users’ incentive?

None of the previous methods simultaneously deal with free riders and Sybil nodes. In this paper, a reputation-based approach is proposed that can identify these two types of malicious behaviors simultaneously.

The rest of the paper is organized as follows: Section 2 contains previous relevant work. Section 3 contains the system model. Section 4 describes the structure of the proposed incentive mechanism and information on how to calculate the centrality. In Section 5, simulation results of this game are presented. Section 6 reports on the conclusion drawn from this research.

Section snippets

Related studies

This research focuses on detecting free riders and identifying Sybil attacks. Therefore, it is necessary to review previous methods in this area briefly. Given that all research worked either on the identification of a free rider or on confronting a Sybil attack, the two sets of methods are studied separately.

Peer to Peer (P2P) network

The P2P network is a decentralized structure in which resources and services are distributed among users. Information and services are transmitted directly between peers. The P2P network allows users to share their resources and simultaneously connect to multiple sources [35].

The management style of this network enables it to expand significantly and increase its resources. As each new user enters the network and exchanges data in it, the network strength increases accordingly. We will not have

The proposed game

In this section, a new incentive mechanism based on reputation is proposed. This method has been proposed to be implemented on the network model presented in Section 3. This network model is the basis of many collaborative systems that are used in practice. Therefore, the proposed method has the ability to be used in actual file sharing scenarios. Section 4.1 introduces a strategy for network users. The two bad strategies for the system are the defector (free-rider) and colluder, respectively.

Simulation and analysis

In this section, simulation results of the proposed method are presented. To better understand the simulation results, firstly, how to design and simulate the parameters are explained. In the following, the objectives and metrics of the problem are examined. In the following sections, simulation results for different modes are given. Finally, at the end of this section, the degree of adaptation of the obtained results is evaluated with the objectives of the research.

Conclusion

In this paper, it has been shown that by quantifying the weight for each service and initializing the dispersion of the services provided, Sybil attacks can be rendered ineffective. The proposed incentive mechanism has forced free riders to send chunks to other nodes and share their resources in order to get services. To better demonstrate how the proposed solution functions, Q=0.35 was used. However, the effect of this relationship can be examined by using different Q. In the proposed method,

References (43)

  • Z. Trifa et al.

    Sybil nodes as a mitigation strategy against sybil attack

    Procedia Comput. Sci.

    (2014)
  • Y. Wang et al.

    On the effectiveness of service differentiation based resource-provision incentive mechanisms in dynamic and autonomous P2P networks

    Comput. Netw.

    (2011)
  • T.Y. Wu et al.

    Incentive mechanism for P2P file sharing based on social network and game theory

    J. Netw. Comput. Appl.

    (2014)
  • W. AlTuhafi et al.

    Concepts and types of peer-to-peer network topology for live video streaming

  • D.R. Amancio

    A complex network approach to stylometry

    PLoS One

    (2015)
  • D.R. Amancio

    Probing the topological properties of complex networks modeling short written texts

    PLoS One

    (2015)
  • Y. Assenov et al.

    Computing topological parameters of biological networks

    Bioinformatics

    (2007)
  • J.R. Bertini et al.

    Partially labeled data stream classification with the semi-supervised K-associated graph

    J. Braz. Comput. Soc.

    (2012)
  • J. Chang et al.

    An incentive compatible reputation mechanism for P2P systems

    J. Supercomp.

    (2014)
  • G. Cui et al.

    Analysis and evaluation framework based on spatial evolutionary game theory for incentive mechanism in peer-to-peer network

  • J. Dinger et al.

    Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration

  • Cited by (22)

    • Dynamics and convergence of hyper-networked evolutionary games with time delay in strategies☆

      2021, Information Sciences
      Citation Excerpt :

      Evolutionary stable strategy and replicator dynamics equation constitute two core concepts of evolutionary game theory, which respectively represent the stable state and the dynamic convergence process towards the stable state. Evolutionary game theory can not only explain some phenomenons in the process of biological evolution, but also be successfully used to analyze and solve social and economic issues [3–5]. One of the characteristics of evolutionary game is that each player interacts with all other players.

    • Understanding the game behavior with sentiment and unequal status in cooperation network

      2021, Knowledge-Based Systems
      Citation Excerpt :

      The degrees of knowledge-sharing or knowledge spillover were measured by the networked evolutionary game [25], and represented by knowledge graphs [26]. There are also many other factors affecting the evolution of strategies or partners, such as the history behaviors of individuals [27] and the related memory length [28]. In the process of cooperation, some scholars show positive attitudes, and they pay much resource, costs and energies for cooperation research.

    • A Game-Based Approach for Mitigating the Sybil Attacks on Blockchain Applications

      2023, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    • Supply Chain Management Using Blockchain Security Enhancement

      2023, Lecture Notes in Networks and Systems
    • Peer to peer sybil and eclipse attack detection via fuzzy kademlia

      2023, Journal of Intelligent and Fuzzy Systems
    View all citing articles on Scopus
    View full text