TY - GEN
T1 - Integrity-aware bandwidth guarding approach in P2P networks
AU - Chiang, Wen Hui
AU - Chen, Ling Jyh
AU - Chou, Cheng Fu
N1 - Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2007
Y1 - 2007
N2 - Most Internet-based collaborative computing systems face the major problem: freeriding. The abundance of freeriders, and load imbalance it creates, punishes those peers who do actively contribute to the network by forcing them to overuse their resources. Hence, the overall system performance becomes to degrade quickly. The goal of this paper is aimed to provide an efficient approach to distinguish the dishonest peers from the honest peers. The key idea of our approach is to make use of the relationship between the perceived throughput and the available bandwidth. First, we do a comprehensive study of available bandwidth estimation tools. Next, we propose integrity-aware bandwidth guarding algorithm, which is designed according to the perceived throughput and the available bandwidth estimation. Finally, the simulation results illustrate that our approach can correctly identify dishonest peers and be of great help in constructing a better overlay structure for many peer-to-peer and multicast applications.
AB - Most Internet-based collaborative computing systems face the major problem: freeriding. The abundance of freeriders, and load imbalance it creates, punishes those peers who do actively contribute to the network by forcing them to overuse their resources. Hence, the overall system performance becomes to degrade quickly. The goal of this paper is aimed to provide an efficient approach to distinguish the dishonest peers from the honest peers. The key idea of our approach is to make use of the relationship between the perceived throughput and the available bandwidth. First, we do a comprehensive study of available bandwidth estimation tools. Next, we propose integrity-aware bandwidth guarding algorithm, which is designed according to the perceived throughput and the available bandwidth estimation. Finally, the simulation results illustrate that our approach can correctly identify dishonest peers and be of great help in constructing a better overlay structure for many peer-to-peer and multicast applications.
KW - Available bandwidth
KW - Freeriding
KW - Peer-to-peer
UR - http://www.scopus.com/inward/record.url?scp=37249052285&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=37249052285&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-72606-7_91
DO - 10.1007/978-3-540-72606-7_91
M3 - Conference contribution
AN - SCOPUS:37249052285
SN - 9783540726050
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 1060
EP - 1071
BT - NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet - 6th International IFIP-TC6 Networking Conference, Proceedings
A2 - Akyildiz, Ian F.
A2 - Sivakumar, Raghupathy
A2 - Ekici, Eylem
A2 - de Oliveira, Jaudelice Cavalcante
A2 - McNair, Janise
PB - Springer Verlag
T2 - 6th International IFIP-TC6 Networking Conference - NETWORKING 2007 Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet
Y2 - 14 May 2007 through 18 May 2007
ER -