TY - JOUR
T1 - Defense mechanism for malicious and selective forwarding attacks in large and mobile wireless networks
AU - Chuang, Yung-Ting
AU - Lee, Yi Fan
N1 - Publisher Copyright:
© The British Computer Society 2018.
PY - 2018/12/1
Y1 - 2018/12/1
N2 - People are constantly using mobile technologies to exchange perspectives across the world. The search services they use, however, belong to centralized systems that may be easily censored. The Peer-to-Peer retrieval system was created to impede censorship of online information, but the decentralized nature of P2P makes it difficult to infer information that cannot be measured directly, such as the proportion of subversion, selfish nodes, network size, or churn rate. Recent advances have pushed providers toward large-scale wireless networks where data retrieval is difficult. Thus, we propose a defense mechanism that can: (1) tackle censorship issues; (2) employ probability density function, exponential weighted moving average and modified Chi-squared tests to estimate the proportion of malicious and selfish nodes; (3) defend against malicious and selective-forwarding attacks by adjusting the number of forwarding levels and requests to ensure high-match probability; (4) maintain high-retrieval rates even in large and highly mobile networks; and (5) guarantee robustness compared to other search systems. A series of experiments demonstrated our algorithm's high-retrieval rate, reasonable costs, mobility resilience, and robustness, demonstrating that the algorithm can work well when the network size is large and/or has a large proportion of selfish nodes, malicious nodes and mobile nodes.
AB - People are constantly using mobile technologies to exchange perspectives across the world. The search services they use, however, belong to centralized systems that may be easily censored. The Peer-to-Peer retrieval system was created to impede censorship of online information, but the decentralized nature of P2P makes it difficult to infer information that cannot be measured directly, such as the proportion of subversion, selfish nodes, network size, or churn rate. Recent advances have pushed providers toward large-scale wireless networks where data retrieval is difficult. Thus, we propose a defense mechanism that can: (1) tackle censorship issues; (2) employ probability density function, exponential weighted moving average and modified Chi-squared tests to estimate the proportion of malicious and selfish nodes; (3) defend against malicious and selective-forwarding attacks by adjusting the number of forwarding levels and requests to ensure high-match probability; (4) maintain high-retrieval rates even in large and highly mobile networks; and (5) guarantee robustness compared to other search systems. A series of experiments demonstrated our algorithm's high-retrieval rate, reasonable costs, mobility resilience, and robustness, demonstrating that the algorithm can work well when the network size is large and/or has a large proportion of selfish nodes, malicious nodes and mobile nodes.
KW - Distributed systems
KW - Membership churn
KW - Message forwarding
KW - Peer-to-peer (P2P) search and retrieval
KW - Probabilistic analysis
KW - Probability density function (pdf)
UR - http://www.scopus.com/inward/record.url?scp=85058774912&partnerID=8YFLogxK
U2 - 10.1093/comjnl/bxy095
DO - 10.1093/comjnl/bxy095
M3 - Article
AN - SCOPUS:85058774912
SN - 0010-4620
VL - 61
SP - 1862
EP - 1879
JO - Computer Journal
JF - Computer Journal
IS - 12
ER -