Loading

Authentication of the P2P Network using the Aggregated Fidelity Score Method
M.S.Saranya1, K.Thangadurai2

1M. S. Saranya*, Department of Computer Science, Government Arts College (Autonomous), Karur (Tamil Nadu), India.
2Dr. K. Thangadurai, Assistant Professor and Head, Department of Computer Science, Government Arts College (Autonomous), Karur, (Tamil Nadu), India. 

Manuscript received on November 16, 2019. | Revised Manuscript received on 20 November, 2019. | Manuscript published on December 10, 2019. | PP: 2169-2172 | Volume-9 Issue-2, December 2019. | Retrieval Number: A4808119119/2019©BEIESP | DOI: 10.35940/ijitee.A4808.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The most important issue in the P2P network is authenticating whether a network can be fully trusted before permitting full access and if the non-credible peers in a network gains access to the network it will actually cause lot of security related problems like man in the middle attack and denial of access attack. To overcome these attacks and to safe guard the peer network, a new fidelity based method is presented in this paper. The notion here is to calculate the loyalty score of the network based on the percentage of data delivered successfully and search time taken by the node and then if the score is higher than the permissible threshold value, the network is considered as a credible network and if the score is less, then the data on the network is blocked to ensure the curtail of the aforementioned attacks. The simulation results showcased that the proposed fidelity based approach is superior and performed with a high success rate and with less delay and drop rates.
Keywords: Peer to Peer Network, Aforementioned Attacks, Fidelity Based Method, Drop Rate.
Scope of the Article: Authentication, Authorization, Accounting