期刊文献+

基于区块链的P2P节点信任评价模型 被引量:6

P2P node trust evaluation model combined with Blockchain
下载PDF
导出
摘要 由于P2P网络去中心化特性,导致无法直接使用传统集中式网络的节点信用评价指标。为了得到可信的数据,融合hash链的帕特里夏树和电商行业区块链,通过对经典模型的剖析,给出了较为完善的信用指标体系,引入节点信用指标的时间敏感函数,构建节点信任评价模型,并进行了效能分析。通过分析表明,该模型能保证P2P网络数据安全性。 As a result of the decentration of P2P network,node credit evaluation indexes of traditional centralized network can not be directly used.In order to obtain credible data,the Patricia tree and SEC Blockchain are integrated with the hash chain.Through the analysis of the classical model,a more complete credit index system is proposed.The time-sensitive function of node credit is introduced to construct the node trust evaluation model,and the efficiency analysis is also carried out.The analysis shows that this model can guarantee the data security of P2P network.
作者 张方 王凤英 ZHANG Fang;WANG Fengying(School of Computer Science and Technology, Shandong University of Technology, Zibo 255049, China)
出处 《山东理工大学学报(自然科学版)》 CAS 2019年第3期13-18,共6页 Journal of Shandong University of Technology:Natural Science Edition
基金 国家自然科学基金项目(61473179) 山东省重点研发计划项目(2016GGX101027) 淄博市校城融合发展计划项目(2018ZBXC295)
关键词 P2P网络 HASH链 区块链 信用指标 信任评价模型 时间敏感函数 P2P network hash chain Blockchain credit index trust evaluation model time-sensitive function
  • 相关文献

参考文献3

二级参考文献23

  • 1Li XQ, Lyu MR, Liu JH. A trust model based routing protocol for secure ad hoc networks. In: Proc. of the Aerospace Conf. IEEE Computer Society Press, 2004. 1286-1295.
  • 2Theodorakpoulos G, Baras JS. On trust models and trust evaluation metrics for ad-hoc networks. IEEE Journal on Selected Areas in Communications, 2006,24(2):318-328.
  • 3Sun Y, Yu W, Han Z. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications, 2006,249(2):674-679.
  • 4S.Buchegger, Le Boudec JY. Self-Policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine, 2005, 43(7):101-107.
  • 5Sun YL, Han Z, Liu KJR, Defense trust management vulnerabilities in distributed networks. IEEE Communications Magazine, Feature Topic on Security in Mobile Ad Hoe and Sensor Networks, 2008,46(2): 112-119.
  • 6Sun YL, Han Z, Yu W, Liu KJR. Attacks on trust evaluation in distributed networks. In: Proc. of the Information Sciences and Systems. 2006. 1461-1466.
  • 7Azer MA, E1-Kassas SM, Hassan AWF, El-Soudani MS. A survey on trust and reputation schemes in ad hoc networks. In: Proc. of the 2008 3rd Int'l Conf. on Availability, Reliability and Security. IEEE Computer Society Press, 2008. 881-886.
  • 8Glenn R. Mahoney: A generalized trust model using network reliability [MS. Thesis]. University of Victoria, 2004.
  • 9Josang A. Ismail: A survey of trust and reputation system for online service provision. Preprint of article published in Decision Support Systems, 2007,43(2):618-644.
  • 10Josang A. Trust and reputation systems. In: Aldini A, Gorrieri R, eds. Proc. of the Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures. Springer-Verlag, 2007. 209-245.

共引文献600

同被引文献34

引证文献6

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部