Different-Strategy Management of Malicious Nodes in the Peer-to-Peer Network

2009 
The Peer-to-Peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave Peer-to-Peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to Peer-to-Peer networks such as spreading inauthentic data and viruses. But handling all the malicious nodes in the same way causes wastes of the network. In this paper, we first introduce the existing ways of handling malicious nodes in the Peer-to-Peer network and then present a better approach dealing with malicious nodes which has a better performance than before.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    7
    References
    3
    Citations
    NaN
    KQI
    []