期刊文献+

一种基于混沌数字指纹技术的P2P网络环境信任机制方案

A trust mechanism solution for P2P network environment base on digital fingerprint and chaos technology
下载PDF
导出
摘要 由于P2P网络中存在大量欺诈行为、攻击和不可靠的服务,使服务质量无法得以较好的保证。文章介绍了p2p网络时间向量,然后利用混沌加密技术对时间向量构建数字序列,通过数字序列构成数字指纹来使通信双方建立信任;仿真实验表明:新模型较传统的模型能更有效的识别出具有复杂策略的节点,在抵御恶意节点的各种动态行为上有更好的性能。 A large number of frauds,attacks and unreliable services exist in P2P file-sharing network,which makes the service quality unable to reach better assurance.This paper introduces the p2p network time vector,and then use the vector of time chaotic encryption technology to build a sequence of numbers,And a sequence of digital fingerprint through digital communications at building confidence to make.Finally,Experiments show that this model call distinguish the malicious node with complex strategies effectively and performs better in dealing with various dynamic behaviors of peers.
机构地区 百色学院
出处 《大众科技》 2012年第2期47-49,共3页 Popular Science & Technology
基金 国家自然科学基金委项目:P2P-Geid环境中的智能中的智能入侵检测技术研究(编号:61063046基金申请人:梁碧珍)
关键词 混沌 数字指纹 对等网络 信任 模型 primal chaos digital fingerprint peer-to-peer(P2P) trust model
  • 相关文献

参考文献5

二级参考文献48

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 3.中国互联网发展状况统计[EB/OL].http://www.cnnic.net.cn,.
  • 4Wang Yao, Vassileva J. Trust and reputation model in peer-to-peer networks [A]. Proceedings of the Third International Conference on Peer-to-Peer Computing(P2P'03) [C]. Washington, DC: IEEE Computer Society,2003. 150- 157.
  • 5Kamvar S, Schlosser M, Garcia-Molina H. The EigenTrust Algorithm for Reputation Management in P2P Networks[EB/OL]. Http: ∥www. Stanford. Edu/ ~ sdkamvar/papers/eigentrust. Pdf, May 2003.
  • 6Lee S, Sherwood R, Bhattacharjee B. Cooperative Peer Groups in NICE [EB/OL]. Http: ∥www. Cs. Umd. Edu/projects/nice, April 2003.
  • 7Singh A, Liu L. TrustMe: Anonymous management of trust relationships in decentralized P2P systems [A]. Proceedings of the Third International Conference on Peer-to-Peer Computing (P2P'03) [C]. Washington, DC: IEEE Computer Society, 2003. 142- 149.
  • 8Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system [A]. Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM01) [C]. New York: ACM Press,2001. 310- 317.
  • 9Ratnasamy S, Francis P, Handley M, et al. A scalable content-addressable network [A]. Proceedings of ACM SIGCOMM 2001 [C]. San Diego, CA: ACM Press, 2001.Aug. 27 - 31.
  • 10Algridas A., Laprie J.C., Brian R., Carl L.. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 2004, 1(1): 11~33

共引文献643

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部