SlideShare a Scribd company logo
Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013
pp. 165–173, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3417
HAMALT : GENETICS BASED PEER-TO-
PEER NETWORK ARCHITECTURE TO
ENCOURAGE THE COOPERATION OF
SELFISH NODES
T. C. Jermin Jeaunita1
,T. C. Jermin Jersha2
1
Department of Computer Science and Engineering,
PESIT Bangalore South Campus, Bangalore, India
jerminjeaunitatc@pes.edu
2
Department of Computer Science and Engineering,
P.S.V. Padmavathy Engineering College, Chennai, India
jerminjershatc@gmail.com
ABSTRACT
Since its inception, Internet has grown tremendously not only in the size of its customers but
also with the technology used behind to run it. For the well ex-istence and proper development
of Peer-to-Peer Networks, all nodes in the overlay must be cooperative and donate their
resources for any other peer. The paper dis-cusses the reason of peers being selfish, causes of
selfish peers and the methods used so far to resolve selfish peers problem. A Genetic Algorithm
based solution has been proposed in this paper that solves the selfish nodes problem in Peer-to-
Peer Networks and that also encourages the cooperation among all nodes in the overlay. An
architecture HAMALT is proposed in this paper for disseminating altruism among the peers.
KEYWORDS
Altruism, Genetics, Kin Selection, Overlay, Peer-to-Peer Networks, Selfish Nodes.
1. INTRODUCTION
In peer to peer networks, a peer takes up the task of a master as well as slave; a client and a
server; a requester and a provider. These peers are overlaid on the Internet for information
sharing, hardware or software resource sharing, instant communication, on demand audio or
video sharing and so on. For successful survival of a network that is made for such purpose, the
well cooperation of all the peers in the network is required. But there will be some coward and
selfish peers among the good peers that may stop the other peers in achieving the sole purpose of
the network and threaten the proper subsistence of the network. Such peers are called as selfish
nodes or free riders as they utilize the network for their benefit and sit inoperative otherwise and
this practice of such nodes is termed as leeching.
166 Computer Science & Information Technology (CS & IT)
Peers may be selfish for various purposes. In Peer-to-Peer networks which are used for various
applications including social networking, a malicious peer may try to acquire the personal
information of other peers to threaten them or for cost. When such misbehaving node is detected
through the shared history mechanism[1] or trust mechanism[2], and when the node has learnt
about this detection of its behavior, it can leave the network and join the same network with
different identity. Such type of nodes is called as white-washers [3]. Some peer-to-peer networks
punish such deviant nodes and when a new node joins the network and misinterpreted as a
deviant node, the node might be discouraged [4]. Some Peer-to-Peer networks are built with tit-
for-tat strategy, where in a peer is allowed to access a resource based on its interaction with the
corresponding node before the case. This leads to the discouragement of strange or new nodes
after joining the network that obviously would not have had any interaction before with the peer it
requested. This may inculcate selfishness in the new node which it can reflect later, when it
receives a request. A node may also act selfish to increase its own utility and to reduce overheads
[5]. They may go selfish about their limited battery power, bandwidth availability and
transmission speed.
The free loaders can be treated in various ways. They can be deprived from accessing the
network. Authors of reference [6] proposed an approach to punish the free riders by forbidding
them to download files from the network if their utility value is lower than the size of the
requested file. The requests submitted by the selfish nodes can be ignored or the TTL(Time to
Live) of these request messages can be reduced[7]. A selfish peer if identified needs to pay a fine
in the form of packet sending cost, which means the deviant node has to send some n number of
penalty packets to continue in the network. A selfish node receives low QoS while a cooperative
node receives high QoS.
The growth of selfish nodes worsens the continued existence of the network in various ways. It
may also give wrong reputation to improve its incentive[8]. Some nodes are socially selfish such
that they share resources to other peers which are only socially tied with them. Some peers may
share with peers of stronger social tie than with weaker social tie. A selfish node may give wrong
routing information or may devoid from forwarding routing packets, which may lead to longest
path, more cost and wastage of resources. Peers may also deviate from forwarding data packets to
any other peer proving individual selfishness. A selfish peer may utilize the services provided by
other nodes in spite of concern of the resources of other peers. A selfish node may change its
identity or neighbor to utilize the resources, so that it will not be identified as deviant node.
This paper proposes a new and interesting solution to resolve the free loaders problem by
appropriately choosing the neighbor peers and keep the peers encouraging incessantly.
Developing a framework to dole out altruism in the network will be a touchstone if the total
evolutionary change of a network is also considered. The trait of a node to behave selfish is
considered as evolved right from the self organization of the network. Hence for effective as well
as efficient self organization of the network the problem is considered as a natural selection
process of Genetics. Instead of considering socially tied peers as a drawback in the network, since
they share information only with their socially tied peers, this paper considers the psychology of
peers for forming a network of altruistic peers. Hence the architecture proposed is named as
‘HAMALT’- a Hamilton Rule based Altruism Dissemination.
The remaining sections of the paper are organized as follows. Section 2 discusses the concepts of
Genetics used for the proposed architecture. Section 3 describes the proposed HAMALT
Computer Science & Information Technology (CS & IT) 167
architecture. Mathematical proofs of the proposed lemmas that make the architecture are
elaborated in section 4. Section 5 concludes the usefulness of the proposed framework.
2. GENETICS
Genetics is a scientific discipline that deals with the genes that are responsible for heredity of a
living organism, and more specifically the physical or character trait of an organism. A gene can
take various forms and each form of a same gene is called an allele. So literally an allele becomes
responsible for the different observable or non observable traits present in any organism. Genes
emanates phenes, as if genes are the biochemical instructions in the form of alleles in organisms
while phenes are the observable characteristic of the organism itself. Hence the phenotype
directly relates to the process of natural selection in organisms. Natural selection can be explained
as the statistically consistent difference in reproductive success or fitness among phenotypes.
Even more specific is the kin selection strategy of genetics that favors the reproductive success
among relatives in-spite of an organism’s own cost or survival.
2.1 Kin Selection
Genetics define kin selection as a theory of organisms helping their relatives than to any others, in
spite of its own well being or survival. This leads to the transfer of a part or whole of the altruistic
allele to the later generation of the selected kin.
2.2 Inclusive Fiteness
Inclusive fitness theory plays a vital role in learning the evolution of social behavior[9-12]. It is
also said that inclusive fitness improves the phenotypic success of organisms by their altruistic
social trait. Hence the genetic endowment of altruistic trait is considered as a predictor in the
proposed mechanism. The goal of the proposal is to disseminate the fecundity of altruism among
the peers of the network, so as to improve the coordination of all peers in the network.
3. SYSTEM MODEL
3.1 Problem Description
The system is considered as an overlay network with the peers ready to share their resources and
the peers waiting to collect resources of their interest from other peers. If none other than few
peers are ready to share their resources, the network either fails or very soon become a
master/slave overlay network, and the goal of the Peer-to-Peer network may not be able to attain.
Hence this paper proposes a framework called ‘HAMALT’ – a Hamilton Rule based Altruism
Dissemination. The paper discusses solutions to keep all the peers active and encouraged for
altruism.
3.2 Parameters Used
The parameters used in the proposed framework are tabularized in Table 1.
168 Computer Science & Information Technology (CS & IT)
Table 1: Parameters Description
Parameters Description
Ai Inclusive fitness responsible for altruism
ai Individual fitness of any peer i
Vi Average contribution of any peer i’s cluster of all two
hop peers
Ci Contribution of peer i to any other peer in the network
Cvi Summation of contributions of all one hop peers of peer i
rij Degree of connectedness between peer i and peer j
L Loss to the donor
G Gain to the recipient
k Total number of chunks uploaded
δ Quantity of altruistic allele donated to the recipients
Pi Representation of a peer with its nature as i
3.3. HAMALT Architecture
The proposed architecture with only two peers- one as donor and the other as recipient is modeled
in Fig. (1). The working consists of two phases. In phase 1, every peer node calculates the
altruistic fitness of itself using the fitness of other peers. The fitness is calculated using the
contribution factor of the peer and its neighbors. Since the altruistic fitness depends on other
peer’s altruism, it is claimed that altruism of any peer encourages the other related and neighbor
peers. The goal of Phase 2, is to spread altruism to the next generation. To keep all the nodes
encouraged throughout the network’s lifetime, it is not enough only to encourage the nodes to be
altruistic. But at the same time, altruism itself must be transmitted from one generation to the
next.
Computer Science & Information Technology (CS & IT)
Fig.1. HAMALT Architecture with two peers
of altruism and altruistic allele dissemination.
The contribution calculator calculates the contribution factor using the contribution factor
exchange process. The allowances that can be provided for a donor node or if the node is selfish,
necessary action to be taken is decided using the benefits calculator. The quantity of altruistic
allele received by the recipients is also fed to the benefits calculator in case the node is a recipient
so that the node is stimulated to be altruistic.
4. SYSTEM DESIGN
The two phases of the proposed framework are explained with mathematical proofs in the
following subsections.
4. 1 Phase 1: Dependence of altruism
Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate
neighbors or can be called as kin peers. Every peer tries to improve its own fitness for the
survival in the network which will happen only if the peer possesses altruism. Inclusive fitness
denoted as Ai of a peer i is found as
Where ai is the individual fitness of a peer
of all two hop nodes. The personal fitness or individual fitness of a peer is given by
Ci is the contribution factor of peer
of contributions of all one hop peers of peer
Computer Science & Information Technology (CS & IT)
HAMALT Architecture with two peers- donor and recipient demonstrating the dependence
altruism and altruistic allele dissemination.
The contribution calculator calculates the contribution factor using the contribution factor
exchange process. The allowances that can be provided for a donor node or if the node is selfish,
o be taken is decided using the benefits calculator. The quantity of altruistic
allele received by the recipients is also fed to the benefits calculator in case the node is a recipient
so that the node is stimulated to be altruistic.
two phases of the proposed framework are explained with mathematical proofs in the
4. 1 Phase 1: Dependence of altruism
Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate
can be called as kin peers. Every peer tries to improve its own fitness for the
survival in the network which will happen only if the peer possesses altruism. Inclusive fitness
denoted as Ai of a peer i is found as
Ai = ai / Vi (1)
Where ai is the individual fitness of a peer i and Vi is the average contribution of a peer i’s cluster
of all two hop nodes. The personal fitness or individual fitness of a peer is given by
ai = Ci + Cvi (2)
Ci is the contribution factor of peer i to any other peer in the network and Cvi is the summation
of contributions of all one hop peers of peer i, as shown in equ. (3).
169
donor and recipient demonstrating the dependence
The contribution calculator calculates the contribution factor using the contribution factor
exchange process. The allowances that can be provided for a donor node or if the node is selfish,
o be taken is decided using the benefits calculator. The quantity of altruistic
allele received by the recipients is also fed to the benefits calculator in case the node is a recipient
two phases of the proposed framework are explained with mathematical proofs in the
Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate
can be called as kin peers. Every peer tries to improve its own fitness for the
survival in the network which will happen only if the peer possesses altruism. Inclusive fitness
is the average contribution of a peer i’s cluster
is the summation
170 Computer Science & Information Technology (CS & IT)
‫݅ݒܥ‬ = ∑ ‫.݆݅ݎ‬ ‫݆ܥ‬௝ (3)
Where rij is the degree of connectedness between the peer i and its one hop peers j = 1 to n, n is
maximum number of one hop neighbors of peer i. The kin selection criteria also propose the
selection of degree of relatedness. This degree of relatedness is shown in Fig. (2).
Lemma 1: Altruism of a peer depends on the altruism of the neighbor peers.
Proof: Equations (1) & (2) show the dependence of altruism that discusses about the altruistic
measure of every node which depends on the contribution of a neighbor peer to any other peer.
When one peer’s altruism depends on the altruism of another peer which is directly proportional
to each other, obviously the peer also improves the altruistic measure of the neighbor peer. The
degree of connectedness plays a major role to maintain the altruistic fitness and it is considered
that r ≤1.
Dependence of altruism on other peer is demonstrated using Fig. (3). The figure shows an overlay
of 7 peers. Fitness of peer P1 is calculated from the contribution factor of itself and contribution
of its 1-hop peers (P2, P3, P4, P5). The contribution of peers up to two-hop (P2, P3, P4, P5, P6,
P7), shown in the figure helps to calculate the average contribution of the peer’s population. The
inclusive fitness Ai can be found from these two parameters.
Lemma 2: Personal fitness of a peer is reduced if it is not ready for contribution in the network.
Proof: If a request is neglected by a peer or if the individual altruistic factor Ci is constant for a
specified duration, the individual contribution factor of a peer is reduced. A peer may utilize the
altruistic nature of its neighbor and try to survive in the network without its own contribution as
anyways the altruistic fitness of a neighbor increases its own too. But if allowed will invite more
free riders. In order to avoid such scenario in the network, if a node is not ready to contribute or if
the node goes to sleep mode, its contribution factor is reduced and it may lead to a chance of its
ID added in the Neglected Peers List(NPL). Once if a node is added in the NPL, it is not allowed
to access the benefits of the network.
Fig. 2. Coefficient of Connectedness: The directly connected peers are related by a factor of
r = 0.5 and 0.25 otherwise.
Donor
Peer
Recipient
Peer (j)
Connectedness
(rij)P1 P2 0.5
P2 P3 0.5
P2 P4 0.5
P2 P5 0.5
P1 P3 0.25
P1 P5 0.25
P1 P4 0.25
Computer Science & Information Technology (CS & IT) 171
Fig. 3. Dependence of altruism on other peers
Lemma 3: A closely related peer encourages the altruism of its neighbor peers.
Proof: By Lemma 2, If the inclusive fitness of altruism is reduced, the framework notifies the
intimates about the issue. The neighbor peers, find the relatedness with the selfish peer and sends
an alert to its neighbor for its contribution to the network. The alert sent to the peer varies based
on its relatedness with the other peer. If r = 0.5, the alert carries the recommendation of the selfish
peer to other peers, so that the so far selfish peer might get a request and improve its altruistic
factor. This encourages the peer to come out of selfishness and act altruistic, as well as its chance
of survival to benefit the network is improved.
4.2 Phase 2: Spreading Altruism
According to Hamilton’s rule, altruism spreads to the recipients if the gain to the recipients is
more than the loss to the donor, which is formulated as
L < rG (4)
Where L is the loss factor to the donor, r is the connectedness of the recipient to the donor and G
is the gain factor to the recipient. The formulation represented in equation (4), had also revealed
that the donor’s fitness is also improved by assisting their relative peers[13].
Lemma 4: The peer also donates its altruism to the recipient peer with the resources.
Proof: If the cost of each chunk i of resource is Li, the overall loss factor of a donor for one
upload is given by
‫ܮ‬ = ∑ ‫݅ܮ‬ − ߜ௞
௜ୀଵ (5)
Where k is the total number of chunks, δ is the altruistic allele donated to the recipients. If the
gain of each chunk i of resource is Gi, the overall gain factor of a donor for one download is
given by
‫ܩ‬ = ∑ ‫݅ܩ‬௞
௜ୀଵ (6)
and for simplicity, Gi is calculated from Li and it is given as
‫݅ܩ‬ = ‫݅ܮ‬ + ߜ (7)
δ in equation (7) is the altruistic allele transferred from the donor to the recipient.
172 Computer Science & Information Technology (CS & IT)
Lemma 5: A peer with more gain is more altruistic in the next generation.
Proof: During the content discovery process a peer node searches for a resource for itself or for its
relatives. When this peer identifies the resource and the same in x peers where x ≥ 2, then there
arises a tie for the proper peer as donor. Then a peer P is selected as a donor using the following
criteria.
‫ݔܽ݉ܣ‬ = maxሺ ‫݅݌ܣ‬ሻ ; ݅ = 1 ‫݋ݐ‬ ݊ (8)
Where n is the maximum number of peers with the searched resource and Amax is the maximum
fitness out of those n peers.
The donor peer is Pd,
such that Pd = Pj if Apj = Amax
Where Apj is the fitness of peer Pj. Now Pd will act as the donor peer of next generation which is
because of the altruistic allele δ in its gain factor G that has improved its chance of being a donor.
Lemma 6: A peer with more fitness is recommended for benefits in the network.
Proof: Peers also maintain their interest on resources. When the loss factor L of a peer reaches or
crosses a loss threshold, the peer is recommended for its resources of interest without any request
by its relative peer to other peers in the network. This encourages every peer to be altruistic.
5. CONCLUSION
As the interest and demand for P2P networks accessing is growing day by day, the cooperation
among nodes should attract more nodes to join the network. If the nodes are selfish to take up
other peer’s resources and not donate their resources, it may lead to the shutdown of the network
or the network will be static. Even though many incentive based peer-to-peer resource sharing
approaches exists, an approach based on kin selection is proposed in this paper. Since selfishness
is a character of humanness or many other living organisms, and the solution to solve this trait in
Genetics is proposed as a solution in selfishness problem in Peer-to-Peer networks. Hence this
framework will avoid a peer to behave selfish, and encourage and disseminate altruism in all peers.
REFERENCES
[1] Stefano Arteconi, David Hales, and Ozalp Babaoglu: Greedy Cheating Liars and the ools Who
Believe Them, ESOA 2006, LNAI 4335, pp. 161–175, Springer(2007).
[2] Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao: A routing protocol for socially selfish delay
tolerant networks, Ad Hoc Networks, Elsevier, 2012, Volume 10, Issue 8, Pages 1619–1632 (2012).
[3] Murat Karakaya, Ibrahim Korpeoglu, Ozgur Ulusoy: Counteracting free riding in Peer-to-Peer
networks, Computer Networks, Science Direct, 52: 675–694 (2008).
[4] Alex Friedman and Idit Keidar: Discouraging Selfishness in Lossy Peer-to-Peer Networks, Technion
(2009)
[5] Idit Keidar Roie Melamed Ariel Orda: EquiCast: Scalable Multicast with Selfish Users, ACM, PODC
(2006).
Computer Science & Information Technology (CS & IT) 173
[6] Landon P. Cox, Brian D. Noble: Samsara: Honor Among Thieves in Peer-to-Peer Storage, ACM,
SOSP (2003).
[7] Alberto Blanc, Yi-Kai Liu, Amin Vahdat: Designing Incentives for Peer-to-Peer Routing, IEEE,
INFOCOM (2005).
[8] Michael Sirivianos Xiaowei Yang Stanislaw Jarecski: Dandelion: Cooperative Content Dis-tribution
with Robust Incentives, Usenix (2007).
[9] James A.R. Marshall: Group selection and kin selection: Formally equivalent approaches, Trends in
Ecology and Evolution, Elsevier (2011).
[10] W. D. Hamilton: Innate Social Aptitude of Man: An approach from Evolutionary Genetics, Biosocial
Anthropology. pp. 133–155. Wiley, New York. Hardin, G. (1968).
[11] Steven A Frank: George Price’s Contributions to Evolutionary Genetics, Journal of Evolutio nary
Biology, Elsevier (1995).
[12] B. Brembs: Hamilton’s theory, Encyclopedia of Genetics, Academic Press (2001).
[13] (Online) www.wwnorton.com

More Related Content

PPTX
13 Community Detection
PPTX
00 Introduction to SN&H: Key Concepts and Overview
PDF
01 Network Data Collection
PDF
03 Ego Network Analysis
PPTX
05 Whole Network Descriptive Stats
PPTX
07 Whole Network Descriptive Statistics
PDF
Current trends of opinion mining and sentiment analysis in social networks
PPTX
02 Descriptive Statistics (2017)
13 Community Detection
00 Introduction to SN&H: Key Concepts and Overview
01 Network Data Collection
03 Ego Network Analysis
05 Whole Network Descriptive Stats
07 Whole Network Descriptive Statistics
Current trends of opinion mining and sentiment analysis in social networks
02 Descriptive Statistics (2017)

What's hot (17)

PPTX
04 Network Data Collection
PPTX
06 Community Detection
PPTX
01 Network Data Collection (2017)
PPTX
Cite track presentation
PPTX
04 Ego Network Analysis
PPTX
Master thesis presentation
PPT
01 Introduction to Networks Methods and Measures
PPTX
11 Network Experiments and Interventions
PDF
05 Communities in Network
PPTX
11 Keynote (2017)
PDF
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
PPTX
02 Network Data Collection
PPTX
06 Regression with Networks – EGO Networks and Randomization (2017)
PDF
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
PDF
IRJET- A Survey on Link Prediction Techniques
PPTX
Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...
PDF
thesis-final-version-for-viewing
04 Network Data Collection
06 Community Detection
01 Network Data Collection (2017)
Cite track presentation
04 Ego Network Analysis
Master thesis presentation
01 Introduction to Networks Methods and Measures
11 Network Experiments and Interventions
05 Communities in Network
11 Keynote (2017)
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
02 Network Data Collection
06 Regression with Networks – EGO Networks and Randomization (2017)
ICPSR - Complex Systems Models in the Social Sciences - Lecture 3 - Professor...
IRJET- A Survey on Link Prediction Techniques
Comparison of Online Social Relations in terms of Volume vs. Interaction: A C...
thesis-final-version-for-viewing
Ad

Viewers also liked (20)

PDF
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
PDF
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKS
PDF
AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...
PDF
DESIGN OF A RULE BASED HINDI LEMMATIZER
PDF
SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...
PDF
SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...
PDF
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
PDF
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
PDF
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
PDF
Soc nanobased integrated
PDF
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
PDF
On the modeling of
PDF
Enhancing an atl transformation
PDF
Pdd crawler a focused web
PDF
Low altitude airships for seamless
DOC
Biografa paramore
PPT
Podio HD TV setembro
PDF
Stress diary guide 12. coping style
PPTX
Test
DOCX
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AUTO-MOBILE VEHICLE DIRECTION IN ROAD TRAFFIC USING ARTIFICIAL NEURAL NETWORKS
AN APPROACH FOR SOFTWARE EFFORT ESTIMATION USING FUZZY NUMBERS AND GENETIC AL...
DESIGN OF A RULE BASED HINDI LEMMATIZER
SEMANTIC WEB QUERY ON EGOVERNANCE DATA AND DESIGNING ONTOLOGY FOR AGRICULTURE...
SINGLE FAULT DETECTION AND DIAGNOSIS TECHNIQUE FOR DIGITAL MICRO-FLUIDIC BASE...
A CLOUD COMPUTING USING ROUGH SET THEORY FOR CLOUD SERVICE PARAMETERS THROUGH...
A GENERIC ALGORITHM TO DETERMINE CONNECTED DOMINATING SETS FOR MOBILE AD HOC ...
A THROUGHPUT ANALYSIS OF TCP IN ADHOC NETWORKS
Soc nanobased integrated
A SEMANTIC BASED APPROACH FOR KNOWLEDGE DISCOVERY AND ACQUISITION FROM MULTIP...
On the modeling of
Enhancing an atl transformation
Pdd crawler a focused web
Low altitude airships for seamless
Biografa paramore
Podio HD TV setembro
Stress diary guide 12. coping style
Test
Ad

Similar to HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COOPERATION OF SELFISH NODES (20)

PPTX
Modeling sustainability in social networks
PDF
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
PDF
Areejit Samal Randomizing metabolic networks
PDF
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
PPTX
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
PDF
PDF
Humanistic approach in mobile adhoc network hamanet
PDF
HUMANISTIC APPROACH IN MOBILE ADHOC NETWORK: HAMANET
PDF
Selfish Node Detection in Replica Allocation over MANETs
PDF
Ce24539543
PDF
Participation costs dismiss the advantage of heterogeneous networks in evolut...
PDF
Content Sharing over Smartphone-Based Delay-Tolerant Networks
PDF
PDF
PDF
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
PDF
F1074547
PDF
International Journal of Engineering Research and Development
PDF
Delay Tolerant Networking routing as a Game Theory problem – An Overview
DOC
Network Theory
PDF
Survey: Biological Inspired Computing in the Network Security
Modeling sustainability in social networks
Modeling the Behavior of Selfish Forwarding Nodes to Stimulate Cooperation in...
Areejit Samal Randomizing metabolic networks
STUDY AND PERFORMANCE EVALUATION OF ANTHOCNET AND BEEHOCNET NATURE INSPIRED M...
A adaptive neighbor analysis approach to detect cooperative selfish node in m...
Humanistic approach in mobile adhoc network hamanet
HUMANISTIC APPROACH IN MOBILE ADHOC NETWORK: HAMANET
Selfish Node Detection in Replica Allocation over MANETs
Ce24539543
Participation costs dismiss the advantage of heterogeneous networks in evolut...
Content Sharing over Smartphone-Based Delay-Tolerant Networks
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
F1074547
International Journal of Engineering Research and Development
Delay Tolerant Networking routing as a Game Theory problem – An Overview
Network Theory
Survey: Biological Inspired Computing in the Network Security

Recently uploaded (20)

PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
project resource management chapter-09.pdf
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
1. Introduction to Computer Programming.pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Hindi spoken digit analysis for native and non-native speakers
DP Operators-handbook-extract for the Mautical Institute
OMC Textile Division Presentation 2021.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
NewMind AI Weekly Chronicles - August'25-Week II
project resource management chapter-09.pdf
Accuracy of neural networks in brain wave diagnosis of schizophrenia
TLE Review Electricity (Electricity).pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Programs and apps: productivity, graphics, security and other tools
A novel scalable deep ensemble learning framework for big data classification...
Heart disease approach using modified random forest and particle swarm optimi...
1. Introduction to Computer Programming.pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Digital-Transformation-Roadmap-for-Companies.pptx

HAMALT : GENETICS BASED PEER-TOPEER NETWORK ARCHITECTURE TO ENCOURAGE THE COOPERATION OF SELFISH NODES

  • 1. Sundarapandian et al. (Eds) : ACITY, AIAA, CNSA, DPPR, NeCoM, WeST, DMS, P2PTM, VLSI - 2013 pp. 165–173, 2013. © CS & IT-CSCP 2013 DOI : 10.5121/csit.2013.3417 HAMALT : GENETICS BASED PEER-TO- PEER NETWORK ARCHITECTURE TO ENCOURAGE THE COOPERATION OF SELFISH NODES T. C. Jermin Jeaunita1 ,T. C. Jermin Jersha2 1 Department of Computer Science and Engineering, PESIT Bangalore South Campus, Bangalore, India jerminjeaunitatc@pes.edu 2 Department of Computer Science and Engineering, P.S.V. Padmavathy Engineering College, Chennai, India jerminjershatc@gmail.com ABSTRACT Since its inception, Internet has grown tremendously not only in the size of its customers but also with the technology used behind to run it. For the well ex-istence and proper development of Peer-to-Peer Networks, all nodes in the overlay must be cooperative and donate their resources for any other peer. The paper dis-cusses the reason of peers being selfish, causes of selfish peers and the methods used so far to resolve selfish peers problem. A Genetic Algorithm based solution has been proposed in this paper that solves the selfish nodes problem in Peer-to- Peer Networks and that also encourages the cooperation among all nodes in the overlay. An architecture HAMALT is proposed in this paper for disseminating altruism among the peers. KEYWORDS Altruism, Genetics, Kin Selection, Overlay, Peer-to-Peer Networks, Selfish Nodes. 1. INTRODUCTION In peer to peer networks, a peer takes up the task of a master as well as slave; a client and a server; a requester and a provider. These peers are overlaid on the Internet for information sharing, hardware or software resource sharing, instant communication, on demand audio or video sharing and so on. For successful survival of a network that is made for such purpose, the well cooperation of all the peers in the network is required. But there will be some coward and selfish peers among the good peers that may stop the other peers in achieving the sole purpose of the network and threaten the proper subsistence of the network. Such peers are called as selfish nodes or free riders as they utilize the network for their benefit and sit inoperative otherwise and this practice of such nodes is termed as leeching.
  • 2. 166 Computer Science & Information Technology (CS & IT) Peers may be selfish for various purposes. In Peer-to-Peer networks which are used for various applications including social networking, a malicious peer may try to acquire the personal information of other peers to threaten them or for cost. When such misbehaving node is detected through the shared history mechanism[1] or trust mechanism[2], and when the node has learnt about this detection of its behavior, it can leave the network and join the same network with different identity. Such type of nodes is called as white-washers [3]. Some peer-to-peer networks punish such deviant nodes and when a new node joins the network and misinterpreted as a deviant node, the node might be discouraged [4]. Some Peer-to-Peer networks are built with tit- for-tat strategy, where in a peer is allowed to access a resource based on its interaction with the corresponding node before the case. This leads to the discouragement of strange or new nodes after joining the network that obviously would not have had any interaction before with the peer it requested. This may inculcate selfishness in the new node which it can reflect later, when it receives a request. A node may also act selfish to increase its own utility and to reduce overheads [5]. They may go selfish about their limited battery power, bandwidth availability and transmission speed. The free loaders can be treated in various ways. They can be deprived from accessing the network. Authors of reference [6] proposed an approach to punish the free riders by forbidding them to download files from the network if their utility value is lower than the size of the requested file. The requests submitted by the selfish nodes can be ignored or the TTL(Time to Live) of these request messages can be reduced[7]. A selfish peer if identified needs to pay a fine in the form of packet sending cost, which means the deviant node has to send some n number of penalty packets to continue in the network. A selfish node receives low QoS while a cooperative node receives high QoS. The growth of selfish nodes worsens the continued existence of the network in various ways. It may also give wrong reputation to improve its incentive[8]. Some nodes are socially selfish such that they share resources to other peers which are only socially tied with them. Some peers may share with peers of stronger social tie than with weaker social tie. A selfish node may give wrong routing information or may devoid from forwarding routing packets, which may lead to longest path, more cost and wastage of resources. Peers may also deviate from forwarding data packets to any other peer proving individual selfishness. A selfish peer may utilize the services provided by other nodes in spite of concern of the resources of other peers. A selfish node may change its identity or neighbor to utilize the resources, so that it will not be identified as deviant node. This paper proposes a new and interesting solution to resolve the free loaders problem by appropriately choosing the neighbor peers and keep the peers encouraging incessantly. Developing a framework to dole out altruism in the network will be a touchstone if the total evolutionary change of a network is also considered. The trait of a node to behave selfish is considered as evolved right from the self organization of the network. Hence for effective as well as efficient self organization of the network the problem is considered as a natural selection process of Genetics. Instead of considering socially tied peers as a drawback in the network, since they share information only with their socially tied peers, this paper considers the psychology of peers for forming a network of altruistic peers. Hence the architecture proposed is named as ‘HAMALT’- a Hamilton Rule based Altruism Dissemination. The remaining sections of the paper are organized as follows. Section 2 discusses the concepts of Genetics used for the proposed architecture. Section 3 describes the proposed HAMALT
  • 3. Computer Science & Information Technology (CS & IT) 167 architecture. Mathematical proofs of the proposed lemmas that make the architecture are elaborated in section 4. Section 5 concludes the usefulness of the proposed framework. 2. GENETICS Genetics is a scientific discipline that deals with the genes that are responsible for heredity of a living organism, and more specifically the physical or character trait of an organism. A gene can take various forms and each form of a same gene is called an allele. So literally an allele becomes responsible for the different observable or non observable traits present in any organism. Genes emanates phenes, as if genes are the biochemical instructions in the form of alleles in organisms while phenes are the observable characteristic of the organism itself. Hence the phenotype directly relates to the process of natural selection in organisms. Natural selection can be explained as the statistically consistent difference in reproductive success or fitness among phenotypes. Even more specific is the kin selection strategy of genetics that favors the reproductive success among relatives in-spite of an organism’s own cost or survival. 2.1 Kin Selection Genetics define kin selection as a theory of organisms helping their relatives than to any others, in spite of its own well being or survival. This leads to the transfer of a part or whole of the altruistic allele to the later generation of the selected kin. 2.2 Inclusive Fiteness Inclusive fitness theory plays a vital role in learning the evolution of social behavior[9-12]. It is also said that inclusive fitness improves the phenotypic success of organisms by their altruistic social trait. Hence the genetic endowment of altruistic trait is considered as a predictor in the proposed mechanism. The goal of the proposal is to disseminate the fecundity of altruism among the peers of the network, so as to improve the coordination of all peers in the network. 3. SYSTEM MODEL 3.1 Problem Description The system is considered as an overlay network with the peers ready to share their resources and the peers waiting to collect resources of their interest from other peers. If none other than few peers are ready to share their resources, the network either fails or very soon become a master/slave overlay network, and the goal of the Peer-to-Peer network may not be able to attain. Hence this paper proposes a framework called ‘HAMALT’ – a Hamilton Rule based Altruism Dissemination. The paper discusses solutions to keep all the peers active and encouraged for altruism. 3.2 Parameters Used The parameters used in the proposed framework are tabularized in Table 1.
  • 4. 168 Computer Science & Information Technology (CS & IT) Table 1: Parameters Description Parameters Description Ai Inclusive fitness responsible for altruism ai Individual fitness of any peer i Vi Average contribution of any peer i’s cluster of all two hop peers Ci Contribution of peer i to any other peer in the network Cvi Summation of contributions of all one hop peers of peer i rij Degree of connectedness between peer i and peer j L Loss to the donor G Gain to the recipient k Total number of chunks uploaded δ Quantity of altruistic allele donated to the recipients Pi Representation of a peer with its nature as i 3.3. HAMALT Architecture The proposed architecture with only two peers- one as donor and the other as recipient is modeled in Fig. (1). The working consists of two phases. In phase 1, every peer node calculates the altruistic fitness of itself using the fitness of other peers. The fitness is calculated using the contribution factor of the peer and its neighbors. Since the altruistic fitness depends on other peer’s altruism, it is claimed that altruism of any peer encourages the other related and neighbor peers. The goal of Phase 2, is to spread altruism to the next generation. To keep all the nodes encouraged throughout the network’s lifetime, it is not enough only to encourage the nodes to be altruistic. But at the same time, altruism itself must be transmitted from one generation to the next.
  • 5. Computer Science & Information Technology (CS & IT) Fig.1. HAMALT Architecture with two peers of altruism and altruistic allele dissemination. The contribution calculator calculates the contribution factor using the contribution factor exchange process. The allowances that can be provided for a donor node or if the node is selfish, necessary action to be taken is decided using the benefits calculator. The quantity of altruistic allele received by the recipients is also fed to the benefits calculator in case the node is a recipient so that the node is stimulated to be altruistic. 4. SYSTEM DESIGN The two phases of the proposed framework are explained with mathematical proofs in the following subsections. 4. 1 Phase 1: Dependence of altruism Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate neighbors or can be called as kin peers. Every peer tries to improve its own fitness for the survival in the network which will happen only if the peer possesses altruism. Inclusive fitness denoted as Ai of a peer i is found as Where ai is the individual fitness of a peer of all two hop nodes. The personal fitness or individual fitness of a peer is given by Ci is the contribution factor of peer of contributions of all one hop peers of peer Computer Science & Information Technology (CS & IT) HAMALT Architecture with two peers- donor and recipient demonstrating the dependence altruism and altruistic allele dissemination. The contribution calculator calculates the contribution factor using the contribution factor exchange process. The allowances that can be provided for a donor node or if the node is selfish, o be taken is decided using the benefits calculator. The quantity of altruistic allele received by the recipients is also fed to the benefits calculator in case the node is a recipient so that the node is stimulated to be altruistic. two phases of the proposed framework are explained with mathematical proofs in the 4. 1 Phase 1: Dependence of altruism Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate can be called as kin peers. Every peer tries to improve its own fitness for the survival in the network which will happen only if the peer possesses altruism. Inclusive fitness denoted as Ai of a peer i is found as Ai = ai / Vi (1) Where ai is the individual fitness of a peer i and Vi is the average contribution of a peer i’s cluster of all two hop nodes. The personal fitness or individual fitness of a peer is given by ai = Ci + Cvi (2) Ci is the contribution factor of peer i to any other peer in the network and Cvi is the summation of contributions of all one hop peers of peer i, as shown in equ. (3). 169 donor and recipient demonstrating the dependence The contribution calculator calculates the contribution factor using the contribution factor exchange process. The allowances that can be provided for a donor node or if the node is selfish, o be taken is decided using the benefits calculator. The quantity of altruistic allele received by the recipients is also fed to the benefits calculator in case the node is a recipient two phases of the proposed framework are explained with mathematical proofs in the Inclusive fitness depends on the peer’s individual fitness which is a measure on its immediate can be called as kin peers. Every peer tries to improve its own fitness for the survival in the network which will happen only if the peer possesses altruism. Inclusive fitness is the average contribution of a peer i’s cluster is the summation
  • 6. 170 Computer Science & Information Technology (CS & IT) ‫݅ݒܥ‬ = ∑ ‫.݆݅ݎ‬ ‫݆ܥ‬௝ (3) Where rij is the degree of connectedness between the peer i and its one hop peers j = 1 to n, n is maximum number of one hop neighbors of peer i. The kin selection criteria also propose the selection of degree of relatedness. This degree of relatedness is shown in Fig. (2). Lemma 1: Altruism of a peer depends on the altruism of the neighbor peers. Proof: Equations (1) & (2) show the dependence of altruism that discusses about the altruistic measure of every node which depends on the contribution of a neighbor peer to any other peer. When one peer’s altruism depends on the altruism of another peer which is directly proportional to each other, obviously the peer also improves the altruistic measure of the neighbor peer. The degree of connectedness plays a major role to maintain the altruistic fitness and it is considered that r ≤1. Dependence of altruism on other peer is demonstrated using Fig. (3). The figure shows an overlay of 7 peers. Fitness of peer P1 is calculated from the contribution factor of itself and contribution of its 1-hop peers (P2, P3, P4, P5). The contribution of peers up to two-hop (P2, P3, P4, P5, P6, P7), shown in the figure helps to calculate the average contribution of the peer’s population. The inclusive fitness Ai can be found from these two parameters. Lemma 2: Personal fitness of a peer is reduced if it is not ready for contribution in the network. Proof: If a request is neglected by a peer or if the individual altruistic factor Ci is constant for a specified duration, the individual contribution factor of a peer is reduced. A peer may utilize the altruistic nature of its neighbor and try to survive in the network without its own contribution as anyways the altruistic fitness of a neighbor increases its own too. But if allowed will invite more free riders. In order to avoid such scenario in the network, if a node is not ready to contribute or if the node goes to sleep mode, its contribution factor is reduced and it may lead to a chance of its ID added in the Neglected Peers List(NPL). Once if a node is added in the NPL, it is not allowed to access the benefits of the network. Fig. 2. Coefficient of Connectedness: The directly connected peers are related by a factor of r = 0.5 and 0.25 otherwise. Donor Peer Recipient Peer (j) Connectedness (rij)P1 P2 0.5 P2 P3 0.5 P2 P4 0.5 P2 P5 0.5 P1 P3 0.25 P1 P5 0.25 P1 P4 0.25
  • 7. Computer Science & Information Technology (CS & IT) 171 Fig. 3. Dependence of altruism on other peers Lemma 3: A closely related peer encourages the altruism of its neighbor peers. Proof: By Lemma 2, If the inclusive fitness of altruism is reduced, the framework notifies the intimates about the issue. The neighbor peers, find the relatedness with the selfish peer and sends an alert to its neighbor for its contribution to the network. The alert sent to the peer varies based on its relatedness with the other peer. If r = 0.5, the alert carries the recommendation of the selfish peer to other peers, so that the so far selfish peer might get a request and improve its altruistic factor. This encourages the peer to come out of selfishness and act altruistic, as well as its chance of survival to benefit the network is improved. 4.2 Phase 2: Spreading Altruism According to Hamilton’s rule, altruism spreads to the recipients if the gain to the recipients is more than the loss to the donor, which is formulated as L < rG (4) Where L is the loss factor to the donor, r is the connectedness of the recipient to the donor and G is the gain factor to the recipient. The formulation represented in equation (4), had also revealed that the donor’s fitness is also improved by assisting their relative peers[13]. Lemma 4: The peer also donates its altruism to the recipient peer with the resources. Proof: If the cost of each chunk i of resource is Li, the overall loss factor of a donor for one upload is given by ‫ܮ‬ = ∑ ‫݅ܮ‬ − ߜ௞ ௜ୀଵ (5) Where k is the total number of chunks, δ is the altruistic allele donated to the recipients. If the gain of each chunk i of resource is Gi, the overall gain factor of a donor for one download is given by ‫ܩ‬ = ∑ ‫݅ܩ‬௞ ௜ୀଵ (6) and for simplicity, Gi is calculated from Li and it is given as ‫݅ܩ‬ = ‫݅ܮ‬ + ߜ (7) δ in equation (7) is the altruistic allele transferred from the donor to the recipient.
  • 8. 172 Computer Science & Information Technology (CS & IT) Lemma 5: A peer with more gain is more altruistic in the next generation. Proof: During the content discovery process a peer node searches for a resource for itself or for its relatives. When this peer identifies the resource and the same in x peers where x ≥ 2, then there arises a tie for the proper peer as donor. Then a peer P is selected as a donor using the following criteria. ‫ݔܽ݉ܣ‬ = maxሺ ‫݅݌ܣ‬ሻ ; ݅ = 1 ‫݋ݐ‬ ݊ (8) Where n is the maximum number of peers with the searched resource and Amax is the maximum fitness out of those n peers. The donor peer is Pd, such that Pd = Pj if Apj = Amax Where Apj is the fitness of peer Pj. Now Pd will act as the donor peer of next generation which is because of the altruistic allele δ in its gain factor G that has improved its chance of being a donor. Lemma 6: A peer with more fitness is recommended for benefits in the network. Proof: Peers also maintain their interest on resources. When the loss factor L of a peer reaches or crosses a loss threshold, the peer is recommended for its resources of interest without any request by its relative peer to other peers in the network. This encourages every peer to be altruistic. 5. CONCLUSION As the interest and demand for P2P networks accessing is growing day by day, the cooperation among nodes should attract more nodes to join the network. If the nodes are selfish to take up other peer’s resources and not donate their resources, it may lead to the shutdown of the network or the network will be static. Even though many incentive based peer-to-peer resource sharing approaches exists, an approach based on kin selection is proposed in this paper. Since selfishness is a character of humanness or many other living organisms, and the solution to solve this trait in Genetics is proposed as a solution in selfishness problem in Peer-to-Peer networks. Hence this framework will avoid a peer to behave selfish, and encourage and disseminate altruism in all peers. REFERENCES [1] Stefano Arteconi, David Hales, and Ozalp Babaoglu: Greedy Cheating Liars and the ools Who Believe Them, ESOA 2006, LNAI 4335, pp. 161–175, Springer(2007). [2] Qinghua Li, Wei Gao, Sencun Zhu, Guohong Cao: A routing protocol for socially selfish delay tolerant networks, Ad Hoc Networks, Elsevier, 2012, Volume 10, Issue 8, Pages 1619–1632 (2012). [3] Murat Karakaya, Ibrahim Korpeoglu, Ozgur Ulusoy: Counteracting free riding in Peer-to-Peer networks, Computer Networks, Science Direct, 52: 675–694 (2008). [4] Alex Friedman and Idit Keidar: Discouraging Selfishness in Lossy Peer-to-Peer Networks, Technion (2009) [5] Idit Keidar Roie Melamed Ariel Orda: EquiCast: Scalable Multicast with Selfish Users, ACM, PODC (2006).
  • 9. Computer Science & Information Technology (CS & IT) 173 [6] Landon P. Cox, Brian D. Noble: Samsara: Honor Among Thieves in Peer-to-Peer Storage, ACM, SOSP (2003). [7] Alberto Blanc, Yi-Kai Liu, Amin Vahdat: Designing Incentives for Peer-to-Peer Routing, IEEE, INFOCOM (2005). [8] Michael Sirivianos Xiaowei Yang Stanislaw Jarecski: Dandelion: Cooperative Content Dis-tribution with Robust Incentives, Usenix (2007). [9] James A.R. Marshall: Group selection and kin selection: Formally equivalent approaches, Trends in Ecology and Evolution, Elsevier (2011). [10] W. D. Hamilton: Innate Social Aptitude of Man: An approach from Evolutionary Genetics, Biosocial Anthropology. pp. 133–155. Wiley, New York. Hardin, G. (1968). [11] Steven A Frank: George Price’s Contributions to Evolutionary Genetics, Journal of Evolutio nary Biology, Elsevier (1995). [12] B. Brembs: Hamilton’s theory, Encyclopedia of Genetics, Academic Press (2001). [13] (Online) www.wwnorton.com