期刊文献+

对抗共谋及节点行为动态性的P2P信任模型 被引量:6

P2P trust model for resisting collusion and dynamic behavior of node
下载PDF
导出
摘要 针对现有P2P信任模型存在的网络开销大、不能很好地处理节点行为的动态性改变及共谋攻击等问题,提出了一种新的信任模型。通过直接交互节点的局部评价加权其评价可信度计算节点的全局信誉值;采用基于局部评价标准差、局部评价集中度的方法识别和抑制共谋攻击;根据节点行为的改变动态更新其信誉值和评价可信度。仿真实验表明,提出的模型较现有模型在网络开销、抑制共谋攻击和节点行为的动态性等方面有较大改进。 To solve the problems of great network costs,the deficiency in dealing with dynamic characteristic and collusion attack in current P2P trust model,a new trust model was proposed.It computed global reputation value through that the direct interaction peers' local evaluation weighted its evaluation credibility to avoid iterative computing process.The standard deviation and concentration ratio of local evaluation was used to identify and control collusion attack.Moreover,according to the node changes,its reputation value and evaluation credibility were updated dynamically.The simulation and experimental results indicate that the new model has advantages in reducing network costs,controlling dynamic characteristic of node and collusion attack over the existing trust models.
出处 《计算机应用》 CSCD 北大核心 2011年第2期308-312,共5页 journal of Computer Applications
基金 甘肃省自然科学基金资助项目(0809RJZA017)
关键词 对等网络 信任 信誉 动态性 共谋攻击 Peer-to-Peer(P2P) network trust reputation dynamic characteristic collusion attack
  • 相关文献

参考文献11

  • 1VBS. Gnutella. Worm[ EB/OL]. [ 2010 - 06 - 01 ]. http://securi- tyresponse, symantec. com/aveenter/vene/data/vbs. gnutella. html.
  • 2HUGHES D, COULSON G, WALKERDINE J. Free riding on Gnutella revisited: the bell tolls?[J]. IEEE Distributed Systems Online, 2005, 6(6):1 -13.
  • 3ABERER K, DESPOTOVIC Z. Managing trust in a peer-to-peer in- formation system[ C]// Proceedings of 10th International Conference on Information and Knowledge Management. New York: ACM, 2001: 310- 317.
  • 4CORNELLI F, DAMIANI E, di VIMERCATI S D C, et al. Choosing reputable servents in a P2P network[ C]// Proceedings of 11th International World Wide Web Conference. New York: ACM, 2002:376-378.
  • 5KAMVAR S D, SCHOSSERMT, GARCIA- MOLINA H . The Eigen Trust algorithm for reputation management in P2P networks [C]// Proceedings of the 12th International World Wide Web Conference. New York: ACM, 2003: 640-651.
  • 6LI XIONG, LIU LING. Peer trust: Supporting reputation-based trust for peer-to-peer electronic communities[ J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843 -857.
  • 7YU BIN, SINGH M P, SYCARA K. Developing trust in large-scale peer-to-peer systems[ C] //Proceedings of the First IEEE Symposium on Multi-Agent Security and Survivability. Washington, DC: IEEE Computer Society, 2004:1 - 10.
  • 8HOFFMAN K, ZAGE D, NITA-ROTARU C. A survey of attack and defense techniques for reputation systems[ J]. ACM Computing Surveys, 2007, 5(9): 1-34.
  • 9BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[ C]// IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 1996:164-173.
  • 10LIAN QIAO, ZHANG ZHENG. An empirical study of collusion behavior in the maze P2P file-sharing system[ C]//27th International Conference on Distributed Computing Systems. Washington, DC: IEEE, 2007:56-66.

同被引文献50

引证文献6

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部