期刊文献+

BT网络中基于声望值的信任管理模型

Model of reputation-based trust management in BT network
下载PDF
导出
摘要 针对BitTorrent网络中free-riding行为导致文件分享速率降低、上行带宽浪费的问题,提出一种基于声望值的信任管理模型。模型使用'上传信任值'与'评价可信值'两种评价标准迭代计算的方式对节点在网络中的表现予以评价,结合节点的下载行为和上传行为,避免节点针对单一评价标准做出相应欺骗行为,通过多个指标识别不诚实节点,降低free-riding节点获得资源的机会。PeerSim仿真实验结果表明:该模型可以有效屏蔽free-riding行为,提高BitTorrent网络的文件分享速率,对女巫攻击和勾结攻击具有较好的屏蔽效果。 To solve the problem of file-sharing rate reduction and waste of upstream bandwidth caused by free-riding behavior in BitTorrent(BT)network,a new model of reputation-based trust management is proposed.This model iterated " Upload Trust" and " Evaluation Trust" to estimate the performance of each code,which combined the behaviors of upload and download together.It avoids the nodes cheating in one estimate standard and uses more parameters to identify dishonest nodes.So the nodes with free-riding behavior have an only a poor chance to get the resource.Through experiments over PeerSim,the results show that this model can effectively prevent the free-riding behavior and improve the file-sharing rate in BT network.It also has positive effect on dealing with Sybil attack and Collusion attack.
出处 《吉林大学学报(工学版)》 EI CAS CSCD 北大核心 2015年第5期1581-1585,共5页 Journal of Jilin University:Engineering and Technology Edition
基金 国家自然科学基金面上项目(61373123) 吉林省科技发展计划项目(20150414004GH 20120301)
关键词 计算机应用 BITTORRENT 声望值 信任 computer application BitTorrent reputation trust
  • 相关文献

参考文献13

  • 1Fan X,Li M,Ma J,et al.Behavior-based reputation management in P2Pfile-sharing networks[J].Journal of Computer and System Sciences,2012,78(6):1737-1750.
  • 2Sarjaz B S,Abbaspour M.Securing BitTorrent using a new reputation-based trust management system[J].Peer-to-Peer Networking and Applications,2013,6(1):86-100.
  • 3Shin K,Reeves D S,Rhee I.Treat-before-trick:Free-riding prevention for BitTorrent-like peer-topeer networks[C]∥Parallel&Distributed Processing,IEEE,2009:1-12.
  • 4Gheorghe G,Cigno R L,Montresor A.Security and privacy issues in P2Pstreaming systems:a survey[J].Peer-to-Peer Networking and Applications,2011,4(2):75-91.
  • 5Douceur J R.The Sybil Attack[M].Berlin:Springer Berlin Heidelberg,2002:251-260.
  • 6Locher T,Moor P,Schmid S,et al.Free riding in BitTorrent is cheap[C]∥Proc Workshop on Hot Topics in Networks(HotNets),California,USA,2006:85-90.
  • 7Piatek M,Isdal T,Anderson T,et al.Do incentives build robustness in BitTorrent[C]∥Proc of NSDI,Cambridge,2007:1-14.
  • 8Levin D,LaCurts K,Spring N,et al.Bittorrent is an auction:analyzing and improving bittorrent's incentives[C]∥ACM SIGCOMM Computer Communication Review,ACM,2008,38(4):243-254.
  • 9Shah P,PrisJF.Incorporating trust in the BitTorrent protocol[C]∥International Symposium on Performance Evaluation of Computer and Telecommunication Systems,San Diego,USA,2007:586-593.
  • 10Ge T,Manoharan S.Mitigating free-riding on bittorrent networks[C]∥Digital Telecommunications(ICDT),2010 Fifth International Conference on,IEEE,2010:52-56.

二级参考文献2

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部