期刊文献+

P2P网络中一种基于信誉感知的资源发现算法 被引量:3

Resource Discovery Algorithm Based on Reputation-Aware in Peer-to-Peer Networks
在线阅读 下载PDF
导出
摘要 P2P网络的动态性和匿名性对P2P应用获取成功具有显著的贡献,但同时也造成一些恶意节点在网络中提供不可靠或者欺诈的服务.本文在非结构化P2P网络中引入健壮灵活的信誉机制,提出了基于信誉感知的启发式资源发现算法,确保资源请求节点得到可靠的资源和服务.仿真试验表明,该算法有效的抑制了P2P网络中恶意节点的欺诈行为,降低了系统的消息负载,保证了请求节点获得服务和资源的可靠性和安全性. The dynamic and anonymity of P2P network have distinct contributions to the successful application of P2P. At the same time, they also induce some malicious nodes to provide untrustworthy and fake service. This paper introduces a robust and flexile reputation mechanism in unstructured P2P and presents the heuristic resource discovery algorithm based on reputation-aware to ensure that resource requestor can obtain reliable resource and service. This new resource discovery algorithm can effectively restrain the imposture and pseudo service of P2P network,improve the reliability and security and decrease network load.
出处 《小型微型计算机系统》 CSCD 北大核心 2006年第10期1798-1802,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(60273041)资助 国家"八六三"计划项目(2002AA104560)资助.
关键词 P2P系统 资源发现 信誉感知 信誉值 Peer-to-Peer resource discovery reputation-aware reputation value
  • 相关文献

参考文献8

  • 1Beverly Yang Hector Garcia-Molina.Improving search in peer-to-peer networks[C].In:Proceedings of the 22nd International Conference on Distributed Computing Systems(ICDCS'02),2002
  • 2Ion Stoica,Robert Morris,David Karger,et al.Chord:a scalable peer-to-peer lookup service for Internet applications[C].Proceedings of ACM SIGCOMM`01,San Diego.
  • 3Khambatti M.S,* K.D.Ryu,* P.Dasgupta*.Efficient discovery of implicitly formed peer-to-peer communities[J].International Journal of Parallel and Distributed Systems and Networks,2002,5(4).
  • 4Diego Gambetta,Can We Trust.In,Trust:Making and breaking cooperative relations[M].Gambetta,D(ed.)Basil Blackwell.Oxford,1990,213-237.
  • 5Abdul-Rahman A,Hailes S.A distributed trust model[C].In Proceedings of the 1997 New security Paradigms Workshop,Cambrian,ACM Press,1998.
  • 6Srinivasan T.V,Vincelette C.J,Dasgupta D.Overlay network applications for network modernization and positioning for the future[C].4th IEEE Region 10th International Conference-TENCON '89 Nov pp.22-24.
  • 7Brite.a network topology generator[EB/OL].http://www.cs.bu.edu/brite/.
  • 8Faloutsos M,Faloutsos P,Faloutsos C.On power-law relationships of the Internet topology[A].In:Chapin L,Sterbenz JPG,Parulkar G,Turner JS,eds[C].Proc of the ACM SIGCOMM'99.New York:ACM Press,1999,251-262.

同被引文献22

  • 1詹春华,陈晓苏.对等网络搜索方法比较与分析[J].湖北工学院学报,2004,19(5):34-36. 被引量:1
  • 2黄全能,宋佳兴,刘卫东,张军.对等网络信誉机制研究综述[J].小型微型计算机系统,2006,27(7):1175-1181. 被引量:12
  • 3张国治,党小超,魏伟一.基于信任域的P2P访问控制模型研究[J].计算机技术与发展,2006,16(8):228-230. 被引量:9
  • 4李玲娟,姬同亮,王汝传.一种基于信任机制的混合式P2P模型[J].计算机应用,2006,26(12):2900-2902. 被引量:4
  • 5马新新,耿技.对等网络信任和信誉机制研究综述[J].计算机应用,2007,27(8):1935-1938. 被引量:12
  • 6LIU Yunjie. Development of network convergence and fu- ture internet[J]. Journal of Chongqing University of Posts and Telecommunications : Natural Science Edition, 2010, 22(6) : 693-697.
  • 7PAN Jianli, SUBHARTHI Paul, RAJ Jain. A Survey of the Research on Future Internet Architectures [ J]. Com- munications Magazine, IEEE 49 (7) : 26-36.
  • 8JIANG Xiaoning, YE Lingxiao. Attack-resistant Tech- niques in P2P Reputation Systems[ C]//IEEE. 2010 2nd International Conference on Networking and Digital Socie- ty. New Jersey, USA :IEEE Press, 2010:390-393.
  • 9LIU Yuhua, L! Yuling, XIONG Naixue, et al. The Re- source Locating Strategy Based on Sub-domain Hybrid P2P Network Model [ C ]// International. Symposium on Parallel & Distributed Processing, Workshops and Phd Forum . New Jersey, USA :IEEE Press, 2010 : 1-8.
  • 10WANG Yu, HUANG Xinli, LU Qindong. Small-World- like Semi-structured P2P Network. [ C ]//International Conference on Computer Research and Development. New Jersey, USA : IEEE Press, 2011:246 - 251.

引证文献3

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部