期刊文献+

高white washing防御力的P2P全局信任模型

Global trust model with high white washing resistance
下载PDF
导出
摘要 在分析P2P网络的特点及其所面临的各种安全问题的基础上,提出了一个全局信任模型,对恶意行为及free riding都有较高的抵御力.特别是当恶意节点或信誉值很低的自私节点企图重新注册时(white washing),模型采用双重机制,可以很快将之屏蔽在外.仿真结果证明,模型有较强的恶意节点免疫力,尤其对于white washing有高的防御能力. Based on an analysis of the characteristics of P2P network and related security issues, this paper proposed a global trust model which has a high resistance to malicious acts and free riders. Specifically, if the malicious nodes or free riders try to re-register into the system to white wash their low credibility and trust, the model can quickly trace and isolate them, showing high white washing resistance. The results of simulation showed that this model can easily isolate malicious behaviors, especially has high resistance to white washing.
出处 《华东师范大学学报(自然科学版)》 CAS CSCD 北大核心 2010年第1期111-117,共7页 Journal of East China Normal University(Natural Science)
关键词 叠加网 信任模型 协同作弊 自私节点 洗白 overlay trust model cooperative cheating free rider white washing
  • 相关文献

参考文献6

  • 1周洲,黄永峰,李星.P2P网络的节点安全认证[J].东南大学学报(自然科学版),2007,37(A01):100-104. 被引量:6
  • 2李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 3XIONG L, LIU L. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic eommunities[J]. IEEE Trans on Knowledge and Data Engineering, 2004, 16: 843-857,.
  • 4HAHM S, JUNG Y, YI S, et al. A self-organized authentication architecture in mobile Ad-hoc networks [C]//International Conference on Information Networking. Berlin: Springer, 2005, 3391: 689-696.
  • 5MICHAL F,CHRISTOS P, JOHN C, et al. Free-riding and whitewashing in peer to-peer systems[J].IEEE Journal on Selected Areas In Communications, 2006(5) : 1010-1019.
  • 6LIANG J, KUMAR R, XI Y, et al. Pollution in P2P file sharing systems[C]//MAKKI K, KNIGHTLY E. Proc of the IEEE InfoCOM, 2005. Miami: IEEE Press, 2005: 1174-1185.

二级参考文献16

  • 1Hahm Seongil,Jung Yongjae,Yi Seunghee,et al.A self-organized authentication architecture in mobile ad-hoc networks[C]//International Conference on Information Networking.Jeju Island,South Korea,2005,3391:689-696.
  • 2Luo H Y,Lu S W.Ubiquitous and robust authentication services for ad hoc wireless networks,UCLA-CSDTR-200030[R].Los Angeles:University of California,2000.
  • 3Narasimha M,Tsudik G,Yi J H.On the utility of distributed cryptography in P2P and mantes:the case of membership control[C]//The 11th IEEE International Conference on Network Protocols.Atlanta,Georgia,USA,2003:336-345.
  • 4Gokhale S,Dasgupta P.Distributed authentication for peer-to-peer networks[C]//Applications and the Internet Workshops.Orlando,FL,USA,2003:347-353.
  • 5Camenisch J,Lysyanskaya A.Dynamic accumulators and application to efficient revocation of anonymous credentials[C]//Advance in Cryptology-CRYPTO 2002.Santa Barbara,California,USA,2002,2442:61-76.
  • 6Benaloh J,de Mare Michael.One way accumulators:a decentralized alternative to digital signatures[C]//Advances in Cryptology-Proceedings of Eurocrypt93.Springer-Verlag,1993:274-285.
  • 7Baric N,Pfitzmann B.Collision-free accumulators and failstop signature schemes without trees[C]//Advances in Cryptology,LNCS 1233.Springer Verlag,1997:480-494.
  • 8Perlman R.An overview of PKI trust models[J].IEEE Network,1999,13(6):38-43.
  • 9Linn J,Branchaud M.An examination of asserted PKI issues and proposed alternatives[C]//Proceedings of the 3rd Annual PKI R & D Workshop.Gaithersburg,2004.
  • 10Zhou L,Haas Z J.Securing ad hoc networks[J].IEEE Network,1999,13(6):24-30.

共引文献119

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部