期刊文献+

移动P2P分布式信任模型设计 被引量:2

Distributed trust model for mobile P2P networks
下载PDF
导出
摘要 移动P2P网络的开放性和松耦合特性使得节点恶意攻击行为普遍存在,而现有基于声誉的信任模型大都基于"信誉值高的节点评价推荐越可信"的假设,无法识别恶意节点动态策略性攻击行为。针对这一问题,将社会网络相关理论引入信任系统,提出一种基于社会距离的信任模型(SD2Trust)。该模型区分了服务可信度和推荐评价可信度,用多维结构同型性描述向量刻画节点网络地位和行为特征,根据社会距离确定推荐节点集和推荐信誉计算权重,综合信任考虑了诋毁风险。理论分析和实验结果表明,该模型能有效对抗恶意节点动态策略攻击行为。 Most existing reputation-based trust models are based on the controversial assumption that "the higher serving credit one has, the more credible comments it provides". This paper proposes a Social-Distance based Distributed Trust model (SD2Trust) for mobile P2P networks, which differentiates the reliability of recommending and that of service providing, constructs trustworthy node set and computes reputation computing weights by making use of social similarity. The distributed reputation storing struc- ture and additional incentive approach together make it more suitable to mobile environment. Both theoretical analysis and simu- lation results show that SD2Trust can resist dynamic attacks with strategy and improve the success rate of transactions.
出处 《计算机工程与应用》 CSCD 2013年第23期75-80,共6页 Computer Engineering and Applications
基金 国家863主题项目(No.2011AA010604) 国家科技重大专项课题(No.2009ZX03004-002)
关键词 移动点对点(P2P)网络 信誉 信任 社会距离 诋毁 动态策略性攻击 mobile Peer-to-Peer(P2P) networks reputation trust social-distance slandering dynamic strategy attraction
  • 相关文献

参考文献15

二级参考文献262

共引文献377

同被引文献29

  • 1聂晓文,卢显良,周旭,李梁,徐海湄.DHT算法基本统计特性及其应用[J].四川大学学报(工程科学版),2009,41(5):170-175. 被引量:2
  • 2李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 3田春岐,邹仕洪,田慧蓉,王文东,程时端.一种基于信誉和风险评价的分布式P2P信任模型[J].电子与信息学报,2007,29(7):1628-1632. 被引量:47
  • 4HSIAO H C, LIAO H. Load balance with imperfect informa- tion instructured peer-to-peer systems [J]. IEEE Transactions on Parallel Disturb System, 2011, 22(4): 634-649.
  • 5CHEN S, ZHANG Y, YANG G. Parameter-estimation based trust model for unstructured peer-to-peer networks [J]. IET Communications, 2011, 5(7): 922-928.
  • 6ZHANG De-gan, HU Yu-xia, WANG Dong, et al. A new al- gorithm of service discovery based on DHT for mobile applica- tion [J]. Jouranal of Network, 2011, 6(10) : 1466-1474.
  • 7FAN Chao, HAO Qing, ZHAO Jing-ling. GA-Chord: an im- provement to Chord algorithm based on group autonomy in- structed P2P network [C]// IEEE 3rd International Conference on Broadband Network and Multimedia Technology. [S.1.]: IEEE, 2010: 1001-1004.
  • 8MESHKOVA Elena, RIlHIJVI Janne, PETROVA Marina. Asurvey on resource discovery mechanisms, peer-to-peer and service discovery frameworks [J]. Computer Networks, 2008, 52(11): 2097-2128.
  • 9ANDROUTSELLIS-THEOTOKIS S, SPINELLIS D, LOURI- DAS P, et al. A market-based of peer-to-peer transactions [J] (5): 675-688. approach to managing the risk Computer Networks, 2010, 54.
  • 10Rathnayake U, Sivaraman V, Boreli R. Environmental context aware trust in mobile P2P networks[ C]//Proc of IEEE 36th conference on local computer networks. [ s. 1. ] : IEEE, 2011 : 324-332.

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部