Security and Peer Management of Query Routing Technique for P2P Networks

(*) Corresponding author

Authors' affiliations

DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)


In peer to peer networks (P2P), the existing literature work does not provide information about availability of node and peer failure prior to searching process. Also the routing process need to be secured so that it can be guaranteed that requested peer is trusted to allow resource extraction. Hence in this paper, we propose trust based query routing technique for P2P Networks .Among all the peers, the node with maximum trust value is elected  as cluster head. Cluster heads are mentioned as trust managers. Peer maintains a trust table from the   feedback of the cluster head by the resource requested peer and its updates. If the update signifies   that the node is accessible and trusted, the routing is performed. Else its echo time is verified again to decide the re-routing process. During peer node join or leave action, bootstrap technique is employed. By simulation results, we show that the proposed work offers secured and reliable routing.
Copyright © 2013 Praise Worthy Prize - All rights reserved.


Peer to Peer Networks (P2P); Query Routing Technique; Cluster Head (CH)

Full Text:



Huaiqing Lin, Zhengbing Hu and Yonghong Zhou, “An Efficient Secure Multicast Communication for P2P Network”, Journal of Networks, vol. 6, no. 3, march 2011.

CAI Biao and LI Zhishu, “Computing and Routing for Trust in Structured P2P Network”, Journal of Networks, vol. 4, no. 7, September 2009.

Quang Hieu Vu, “SPP: A Secure Protocol for Peer-to-Peer Systems”, The Second International Conference on Advances in P2P Systems, 2010.

Mei Chen, Kenji Kita, and Xin Luo, “Cluster-Based Reputation Model in Peer-to-Peer Network”, International Journal of Machine Learning and Computing, Vol. 1, No. 4, October 2011.

Joonhyun Bae, Seunghun Lee, and Sangwook Kim, “VegaNet: A Peer-to-Peer Overlay Network for Mobile Social Applications”, The 13th IEEE International Symposium on Consumer Electronics, 2009.

Gabriela Gheorghe, Renato Lo Cigno and Alberto Montresor, “Security and Privacy Issues in P2P Streaming Systems: A Survey”, 2009.

T.Lakshmi, L.Raghavendra Raju, D.Jamuna, “An Approach On Cluster-Based Routing Protocol For Delay-Tolerant Mobile Networks (Dtmns)”, Asian Journal of Computer Science And Information Technology, pp 262– 265, 2012.

José Santiago, Augusto Casaca and Paulo Rogério Pereira, “ Multicast in Delay Tolerant Networks using Probabilities and Mobility Information”, Journal on Ad hoc and wireless sensor networks, 2009.

Network Simulator: http:///

Kolja Eger,Tobias Hoßfeld, Andreas Binzenhofer,"Efficient Simulation of Large-Scale P2P Networks:Packet-level vs. Flow-level Simulations", in proceedings of 2nd Workshop on the Use of P2P, GRID and Agents for the Development of Content Networks, pp: 9-16, June 2007.

U. V. Arivazhagu and S. Srinivasan, “Cluster Based Intelligent Semantic Query Routing Technique in Peer to Peer Networks”, European Journal of Scientific Research, ISSN 1450-216X Vol.83 No.1 (2012), pp.15-24.

Y. Djaghloul and Z. Boufaida, Toward Peer to Peer Platform Integration based on OWL Ontology and Roaming Service, (2006) International Review on Computers and Software (IRECOS), 1 (1), pp. 31-42.

Hu, D., Luo, J., Feng, Y., Copyright protection in P2P networks using digital fingerprinting, (2011) International Review on Computers and Software (IRECOS), 6 (3), pp. 366-370.

U.V.Arivazhagu and Dr.S.Srinivasan (2013),” Replacement Mechanism Of Caching Technique For Query Routing in P2P Networks”, Journal of Computer Science, Science Publication,doi:10.3844/jcssp.2013.1224.1231 Published Online 9 (9) 2013,ISSN: 1549-3636,pp 1224-1231.


  • There are currently no refbacks.

Please send any question about this web site to
Copyright © 2005-2022 Praise Worthy Prize