“…To defend against pollution attacks in P2P live streaming systems, a number of approaches have been proposed in the past few years, including cryptographic approach [12, 31–38], blacklisting approach [12, 39], and reputation system approach [39–44]. (1) The cryptographic approach adopted the hash verification mechanism to identify the polluted chunks and encryption techniques to improve the difficulty of forging chunks.…”