Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (13)
  • Open Access

    ARTICLE

    A Neural Network-Based Trust Management System for Edge Devices in Peer-to-Peer Networks

    Alanoud Alhussain1, Heba Kurdi1,*, Lina Altoaimy2

    CMC-Computers, Materials & Continua, Vol.59, No.3, pp. 805-815, 2019, DOI:10.32604/cmc.2019.05848

    Abstract Edge devices in Internet of Things (IoT) applications can form peers to communicate in peer-to-peer (P2P) networks over P2P protocols. Using P2P networks ensures scalability and removes the need for centralized management. However, due to the open nature of P2P networks, they often suffer from the existence of malicious peers, especially malicious peers that unite in groups to raise each other's ratings. This compromises users' safety and makes them lose their confidence about the files or services they are receiving. To address these challenges, we propose a neural network-based algorithm, which uses the advantages of a machine learning algorithm to… More >

  • Open Access

    ARTICLE

    A Hierarchical Trust Model for Peer-to-Peer Networks

    Nehal Al-Otaiby1, Heba Kurdi1,*, Shiroq Al-Megren1

    CMC-Computers, Materials & Continua, Vol.59, No.2, pp. 397-404, 2019, DOI:10.32604/cmc.2019.06236

    Abstract Trust has become an increasingly important issue given society’s growing reliance on electronic transactions. Peer-to-peer (P2P) networks are among the main electronic transaction environments affected by trust issues due to the freedom and anonymity of peers (users) and the inherent openness of these networks. A malicious peer can easily join a P2P network and abuse its peers and resources, resulting in a large-scale failure that might shut down the entire network. Therefore, a plethora of researchers have proposed trust management systems to mitigate the impact of the problem. However, due to the problem’s scale and complexity, more research is necessary.… More >

  • Open Access

    ARTICLE

    A Credit-Based Approach for Overcoming Free-Riding Behaviour in Peer-to-Peer Networks

    Manal Hazazi1, Afnan Almousa1, Heba Kurdi1,2,*, Shiroq Al-Megren1, Shada Alsalamah1

    CMC-Computers, Materials & Continua, Vol.59, No.1, pp. 15-29, 2019, DOI:10.32604/cmc.2019.06221

    Abstract The underlying premise of peer-to-peer (P2P) systems is the trading of digital resources among individual peers to facilitate file sharing, distributed computing, storage, collaborative applications and multimedia streaming. So-called free-riders challenge the foundations of this system by consuming resources from other peers without offering any resources in return, hindering resource exchange among peers. Therefore, immense effort has been invested in discouraging free-riding and overcoming the ill effects of such unfair use of the system. However, previous efforts have all fallen short of effectively addressing free-riding behaviour in P2P networks. This paper proposes a novel approach based on utilising a credit… More >

Displaying 11-20 on page 2 of 13. Per Page