Special Issue on: "Security and Trust Issues in Peer-to-Peer Networks"
Al-Sakib Khan Pathan, International Islamic University Malaysia, Malaysia
Xianglin Wei, Nanjing Telecommunication Technology Research Institute, China
Homero Toral Cruz, University of Quintana Roo, Mexico
Luca Caviglione, CNR - ISSIA, Italy
P2P (peer-to-peer) networking is contributing to a vast amount of internet traffic because many internet users heavily use or depend on file sharing applications such as BitTorrent, PPStream, eDonkey, and so on. While these applications often make various types of soft resources (e.g. audio, video, games, music, e-books) easily available via the P2P model, the operational mechanism of the network also makes the system vulnerable to various kinds of security threats.
Malicious peers may often be present in such architectures because of the inherent dependence on peers who should cooperate with each other. Attacks against P2P systems can take manifold forms: distributed denial-of-service (DDoS) attacks, injection of useless data (commonly termed as “poisoning”) into the network or pollution attack, identity theft, collusion attack, Sybil attack, etc. Due to the constant efforts of high-profile hackers to breach data and find new methods of attack, unmonitored P2P file-sharing systems have been threatened today at unparalleled magnitude. Sensitive information could easily be exposed, harvested and distributed across multiple P2P networks, often with information from government or critical military facilities.
To detect malicious peers which are responsible for the vast majority of attacks, some schemes use reputation of nodes while others are based on mutual certificates. More recently, social networking-based certification systems have been proposed in which a simple strategy of “Friend of Friend” is applied, taking a chunk of nodes in the network. This chunk structure could be expanded to cover a portion of the network. The idea is that a friend could certify and support another friend (i.e. here node). However, this kind of solution leaves many issues unanswered such as privacy issues, scalability of the network, handling of non-participating nodes, resource scarcity among socially networked nodes, and so on.
Besides these efforts, intelligent and adaptive methods are being developed using artificial intelligence, fuzzy logic, game theory, and so on.
This special issue's objective is to provide a platform for researchers to share their thoughts and findings on various security issues in P2P networks and systems. Our goal is to compile the latest advancements addressing the topic of security in P2P networks and systems, with particular focus on malicious peer detection-based approaches.
The issue will carry revised and substantially extended versions of selected papers presented at the Secure Peer-to-Peer Intelligent Networks & Systems Workshop (SPINS 2014), in conjunction with ANT 2014, but we also strongly encourage researchers unable to participate in the conference to submit articles for this call.
Suitable topics include, but are not limited to, the following:
- Detecting malicious peers in P2P networks
- Thwarting pollution attacks or poisoning attacks in P2P networks
- Handling resource unavailability due to the presence of malicious peers
- Trust management in P2P systems
- Social networking-based security management in P2P networks
- P2P vs. social networking security
- Intelligent and adaptive secure P2P systems
- Game theory-based P2P system trust and security
- Defending against P2P data breaches
- Measuring evidence of cyber-criminal activity on P2P networks
Notes for Prospective Authors
Submitted papers should not have been previously published nor be currently under consideration for publication elsewhere. (N.B. Conference papers may only be submitted if the paper has been completely re-written and if appropriate written permissions have been obtained from any copyright holders of the original paper).
All papers are refereed through a peer review process.
All papers must be submitted online. To submit a paper, please read our Submitting articles page.
Manuscript due date: 15 July, 2014
First round review notification: 15 October, 2014
Revised papers due: 15 November, 2014
Notification of final acceptance/rejection: 25 November, 2014
Submission of final manuscripts: 10 December, 2014