期刊文献+

移动P2P网络中的多粒度信任模型 被引量:8

Multiple granularity trust model in mobile P2P network
下载PDF
导出
摘要 移动P2P网络的应用越来越广泛,随之而来的是大量欺诈等恶意行为,使系统的有效性和可用性难以保证。现有模型大多针对固定网络,忽略了终端类型对节点信任值的影响,而且不能很好地解决节点在不同领域、不同方面的可信度计算问题。针对上述问题,利用聚类思想和时间因子的概念,提出一种多粒度信任模型MGT(Multiple Granularity Trust Model),并给出基于该模型的资源选择协议的工作流程。分析结果表明,模型能够有效地抵御恶意节点的破坏,增强P2P网络的安全性。 A great deal of malicious behaviors makes it hard to support validity and availability in the mobile P2P networks.Most of current peer-to-peer trust models are applicable to fixed network,neglect the effect of different terminals,and could not promise the trust computation of different domains.This paper presents a trust mechanism,Multiple Granularity Trust Model (MGT),which imports the clustering and time factor,then gives the implementation of the MGT source selection protocol.Emulating experiment shows that MGT is more effective on protecting the network from many malicious behaviors and more robust on trust security problems.
出处 《计算机工程与应用》 CSCD 北大核心 2009年第6期137-140,共4页 Computer Engineering and Applications
基金 国家自然科学基金 陕西师范大学校级重点科研项目~~
关键词 移动P2P 信任模型 信誉 多粒度信任模型 mobile P2P trust model reputation Granularity Trust Model(MGT)
  • 相关文献

参考文献8

  • 1Altman J E.PKI Security for JXTA Overlay Networks[DB/OL]. ( 2003-02-28 ).http://www.j xta.org/docs/pki2security2for2j xta.pdf.
  • 2Sig2dat Specification[EB/OL].[2006-12-26].http://www.geocities.com/ vlaibb/.
  • 3Cornelli F.Choosing reputable servents in a P2P network[C]//Lassher D.Proc of the llth Int'l World Wide Web Conf.Hawaii:ACM Press, 2002 : 441-449.
  • 4Kamvar S D,Schlosser M T.EigenRep:Reputation management in P2P networks[C]//Lawrence S.Proc of the 12th Int'l World Wide Web Conf.Budapest: ACM Press, 2003 : 123-134.
  • 5Iguchi M,Terada M,Fujimura K.Managing resource and servent reputation in P2P networks[C]//Proceedings of the 37th Hawaii International Conferenee on System Sciences,2004.
  • 6Wang Y,Vassileva J.Bayesian network trust model in peer-to-peer networks[C]//Moro G.Proc of the 2nd Int'l Workshop on Agents and Peer-to-Peer Computing.Berlin: Springer-Verlag, 2004: 23-34.
  • 7李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521. 被引量:138
  • 8王小英,赵海,林涛,张文波,尹震宇.基于信任的普适计算服务选择模型[J].通信学报,2005,26(5):1-8. 被引量:17

二级参考文献18

  • 1李德毅,孟海军,史雪梅.隶属云和隶属云发生器[J].计算机研究与发展,1995,32(6):15-20. 被引量:1240
  • 2KINDBERG T, FOX A. System software for ubiquitous computing[J].IEEE Pervasive Computing, 2002, 1(1): 70-81.
  • 3VOIDA S, MYNATT E D, MACINTYRE B. Integrating virtual and physical context to support knowledge workers[J]. IEEE Pervasive Computing, 2002,1(3): 73-79.
  • 4JOHANSON B, FOX A, WIINOGRAD T. The interactive workspaces project: experiences with ubiquitous computing rooms[J]. IEEE Pervasive Computing, 2002, 1(2): 67-74.
  • 5GELLERSEN H W, SCHMIDT A, BEIGL M. Adding some smartness to devices and everyday things [A]. Third IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'00) Monterey,California: IEEE Computer Society[C]. 2000. 3-10.
  • 6MICHAEL J, JACK W. UPnP Design by Example[M]. Santa Clara USA:Intel Press.
  • 7WEISER M. The computer of the 21st century[J]. Scientific American,1991, 265(3):66-75.
  • 8GARLAN D, SIEWIOREK D P, SMAILAGIC A. Project aura: toward distraction-free pervasive computing[J]. IEEE Pervasive Computing,2002, 1(4):22-31.
  • 9王化文,叶郁,李劲.Jini分布嵌入式网络体系研究[J].计算机应用研究,1999,16(8):5-7. 被引量:4
  • 10宫秀军,刘少辉,史忠植.一种增量贝叶斯分类模型[J].计算机学报,2002,25(6):645-650. 被引量:55

共引文献151

同被引文献85

引证文献8

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部