TrustRRep: An Improved Reputation Management Scheme for Reliable Resource Sharing in Peer-to-Peer Networks

  • Junghwa Shin
  • Taehoon Kim
  • Sungwoo Tak
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5297)


Inauthentic resources can be easily spread by peers due to the openness and anonymity of P2P networks. A possible way to restrict the distribution of inauthentic resources and prevent malicious peers from joining P2P networks is to exploit a reputation which reflects peers’ past behaviors. There is a possibility that a peer intentionally plays along with other peers in order to increase/decrease its reputation through dishonest feedback exchanges. Therefore, we propose a new reputation management scheme, called TrustRRep (Trustworthy Resource sharing using Reputation), which improves the trustworthiness and efficiency of P2P networks. We implemented the TrustRRep scheme on the NS-2 simulator for evaluating its performance compared to the recent reputation management work available in literature. A case study on simulations shows that the TrustRRep scheme yields efficient performance in terms of the minimal download ratio of inauthentic resources, the computation error of trust value and the success ratio of download request.


P2P Reputation Dishonest feedback 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Wang, Y., Vassileva, J.: Bayesian Network Trust Model in Peer-to-Peer Networks. In: Moro, G., Sartori, C., Singh, M.P. (eds.) AP2PC 2003. LNCS (LNAI), vol. 2872, pp. 23–34. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Mekouar, L., Iraqi, Y., Boutaba, R.: Peer-to-Peer’s most wanted: Malicious peers. Computer Networks: The International Journal of Computer and Telecommunications Networking 50(4), 545–562 (2006)CrossRefzbMATHGoogle Scholar
  3. 3.
    Fall, K., Varadhan, K.: The ns-2 manual. Technical Report, The VINT Project, UC Berkeley, LBL, and Xerox RARC (2002)Google Scholar
  4. 4.
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The EigenTrust Algorithm for Reputation Management in P2P Networks. In: Proc. of 12th International Conference on World Wide Web (WWW 2003), Budapest, Hungary, pp. 640–651 (2003)Google Scholar
  5. 5.
    Xiong, L., Liu, L.: PeerTrust:Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)CrossRefGoogle Scholar
  6. 6.
    Kwon, O.H., Lee, S.Y., Kim, J.: FileTrust: Reputation Management for Reliable Resource Sharing in Structured Peer-to-Peer Networks. IEICE transactions on Communications 4, 826–835 (2007)CrossRefGoogle Scholar
  7. 7.
    Iguchi, M., Terada, M., Fujimura, K.: Managing Resource and Servent Reputation in P2P Networks. In: Proc. of 37th Hawaii International Conference on System Sciences (HICSS 2004), Track 7, Hawaii, vol. 7 (January 2004)Google Scholar
  8. 8.
    Jin, Y., Gu, Z., Gu, J., Zhao, H.: A New Reputation-Based Trust Management Mechanism Against False Feedbacks in Peer-to-Peer Systems. In: Benatallah, B., Casati, F., Georgakopoulos, D., Bartolini, C., Sadiq, W., Godart, C. (eds.) WISE 2007. LNCS, vol. 4831, pp. 62–73. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Junghwa Shin
    • 1
  • Taehoon Kim
    • 1
  • Sungwoo Tak
    • 1
  1. 1.School of Computer Science and EngineeringPusan National UniversityBusanRepublic of Korea

Personalised recommendations