Abstract

In this paper, information exchange that is devoid of control in the peer-to-peer communication, exposes peer to malicious activities, insecure communication, loss of significant data or failure of the system. The complexity and perceived compromise in peers communicating at different levels necessitates modeling a secured agent-based model for a peer-to-peer system. This work was designed to accommodate peer registration phase that will allow peers on satisfying defined requirement , request for connection to the super peer, subsequently guaranteeing and promoting healthy system. The agent module in the network ascertains successfully connected peers on the network, certifying feedback agent goal and ready for peer communication. The result shows that peculiar security attacks from malicious and un-registered peers are systematically controlled in the peer-to-peer system. Key words : Peer-to-peer, Agent-based, Secured and Communication. DOI: 10.7176/CEIS/12-2-03 Publication date: May30 th 2021

Highlights

  • The advent of peer-to-peer (P2P) systems, in the preceding years of persistent effort, have transformed the approach in disseminating information and technique in extracting information from collaborating or distributed systems

  • The methology adopted in this study is Object –Oriented Analysis and Design methology as it explains the agent communication, flexibility as it guarantees ease of implementation and object interactionThe super peers incorporate with the agent for effectual coordination of the absolute peer-to-peer system

  • The agents attest that a peer conect just once to the network and simultaneously a communication identity code (CIC) is systematically generated, likewise the providing peer and respective CIC further serve as a proof of authentication for peers that legitimately wish to communicate in the peer-to- peer system

Read more

Summary

Introduction

The advent of peer-to-peer (P2P) systems, in the preceding years of persistent effort, have transformed the approach in disseminating information and technique in extracting information from collaborating or distributed systems. The peer-to-peer systems fundamentally are known to be decentralized distributed systems having equitably diverse computing components called peers These peers in actual sense are joined to few or additional more peers found or already present in the network. In this system, the user or client direct request or queries to any arbitrarily preferred peer and wait for a substantial response from the data sources kept in the entire connected network. The user or client direct request or queries to any arbitrarily preferred peer and wait for a substantial response from the data sources kept in the entire connected network These peers have similar functions with diverse liabilities. The inception of well-known peer-topeer setups such as Napster and Gnutella resulted to an eruption of concern in this network arrangement together with individuals researching and practicing

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call