期刊文献+

基于增强稳定组模型的移动P2P网络信任评估方法 被引量:20

Enhanced Stable Group Model-Based Trust Evaluation Scheme for Mobile P2P Networks
下载PDF
导出
摘要 目前,己经有许多文献给出了移动P2P网络环境下信任管理技术与具体应用的集成方案.现存的信任模型都存在一个共同的假设,即假设信任信息都来自于稳定的网络拓扑结构环境下,且这些信任信息能够被保证长期有效.然而移动P2P网络由于节点频繁的加入和退出造成网络拓扑结构不断变化,不可能保证建立的信任信息长期有效.因此,已有的信任管理系统在这种移动环境下已经不再适用,迫切需要提出新的解决方案.通过研究移动P2P节点的信任关系的变化与网络使用者的兴趣、爱好等变化的对应关系,该文提出了一个基于增强的稳定组模型(Enhanced Stable Group Model-based Trust Evaluation Method,SGTM)的信任评估方法,并给出了稳定组构造算法.该机制利用稳定组构造算法对移动P2P网络进行有效地分组,相同分组内的节点之间相对保持最大程度的拓扑结构的稳定,从而保证组内节点信任关系的稳定存在.文中在移动环境下对移动模式和信任管理之间的关系问题进行了详细的研究.模拟实验从动态适应力、全局信誉的收敛时间以及全局信任计算所涉及的通讯负载等方面对所提出的信任评估方法的性能进行了评估. Although many researchers have studied the establishment and maintenance of trust in mobile P2 Pnetworks,the existing approaches to trust establishment usually require a lengthy process and assume long term validation.In contrast,few of these characteristics are prevalent in mobile P2 Pnetworks with their unreliable transmission medium,frequent topology changes and variable network lifetimes.Since those solutions developed mainly for the fixed wired networks are not fit in such a scenario,new security solutions are eagerly in demand.In this paper,we propose an Enhanced Stable Group Model-based Trust Evaluation Method(SGTM).Stable group is introduced in collecting trust evidences phase to simplify the process of trust initialization.In the scheme,all group members that move in a similar pattern remain throughout the entire communication session.By doing this,the topology within a group is less dynamic.Since trust evidences of a sensor are main collected in the stable group,the average length of trust chains is much shorter and more robust than other models,and avoids trust dilution.The simulation results prove the effectiveness and the benefits of the proposed model.
作者 吴旭
出处 《计算机学报》 EI CSCD 北大核心 2014年第10期2118-2127,共10页 Chinese Journal of Computers
基金 国家自然科学基金(61373116) 陕西省自然科学基金(2011JQ8006) 陕西省教育厅科研计划项目(2013JK1132)资助
关键词 移动P2P网络 信任模型 移动性 稳定组 mobile P2Pnetworks trust model mobility stable group
  • 相关文献

参考文献18

  • 1Firdhous M,Ghazali O,Vijaykumar P,Hassan S.A trust computing mechanism for cloud computing//Proceedings of the ITU Fully Networked Human Innovations for Future Networks and Services.Cape Town,South Africa,2011:1-7.
  • 2Abawajy J.Establishing trust in hybrid cloud computing environments//Proceedings of the IEEE 10th International Conference on Trust,Security and Privacy in Computing and Communications.Changsha,China,2011:118-125.
  • 3方恩光,吴卿.基于证据理论的云计算信任模型研究[J].计算机应用与软件,2012,29(4):68-70. 被引量:10
  • 4谢晓兰,刘亮,赵鹏.面向云计算基于双层激励和欺骗检测的信任模型[J].电子与信息学报,2012,34(4):812-817. 被引量:20
  • 5杜瑞忠,田俊峰,张焕国.基于信任和个性偏好的云服务选择模型[J].浙江大学学报(工学版),2013,47(1):53-61. 被引量:18
  • 6Pawar P S,Rajarajan M,Nair S K,Zisman A.Trust model for optimized cloud services//Proceedings of the 6th IFTP International Conference on Trust Management.Surat,India,2012:97-112.
  • 7Kamvar S D,Schlosser M T,Garcia Molina H.The EigenTrust algorithm for reputation management in P2P networks //Proceedings of the 12th International World Wide Web Conference.Budapest,Hungary,2003:640-651.
  • 8田慧蓉,邹仕洪,王文东,程时端.P2P网络层次化信任模型[J].电子与信息学报,2007,29(11):2560-2563. 被引量:10
  • 9Chhabra S,Damiani E,De Capitani di Vimercati S,et al.A protocol for reputation management in super-peer networks//Proceedings of the 15th International Workshop on Database and Expert Systems Applications.Zaragoza,Spain,2004:973-983.
  • 10LiangZ,ShiW.PET:A personalized trust model with reputation and risk evaluation for P2P resource sharing//Proceedings of the Hawaii International Conference on System Sciences.Hawaii,USA,2005:201-201.

二级参考文献114

共引文献99

同被引文献170

  • 1沈昌祥,张焕国,王怀民,王戟,赵波,严飞,余发江,张立强,徐明迪.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166. 被引量:252
  • 2刘常昱,冯芒,戴晓军,李德毅.基于云X信息的逆向云新算法[J].系统仿真学报,2004,16(11):2417-2420. 被引量:188
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4张骞,张霞,文学志,刘积仁,Ting Shan.Peer-to-Peer环境下多粒度Trust模型构造[J].软件学报,2006,17(1):96-107. 被引量:71
  • 5柴云鹏,顾雷,李三立.移动网格中负载自平衡的集群式边缘流媒体服务器[J].计算机研究与发展,2007,44(12):2136-2142. 被引量:3
  • 6Xin-Xin Z,Zhen-Wan Z, Peng K, et al. A Survey of Resource Discovery in Mobile Peer-to-Peer Networks [ C ]//Communication Systems and Network Technologies ( CSNT), 2015 Fifth International Conference on. IEEE, 2015 : 122-125.
  • 7Waluyo A B,Taniar D, Rahayu W, et al. Mobile Peer-to-Peer data dissemination in wireless ad-hoc networks [ J ]. Info~naation Sciences, 2013,230:3-20.
  • 8Ns-2 network simulator [ EB/OL ]. [ 2013-05 - 16 ]. http ://www. Isi. edtt/nsnam/ns/.
  • 9Wang K H, Li B. Efficient and guaranteed service coverage in partitionable mobile ad-hoc networks [ C ]//INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE. IEEE,2002,2.1089-1098. ].
  • 10Beth T, Borcherding M, Klein B. Valuation of Trust in Open Networks [ M ]. Berlin : Springer Berlin Heidelberg, 1994.

引证文献20

二级引证文献79

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部