期刊文献+

构建自组网络中基于兴趣群组的激励机制 被引量:2

Building an Interest Group Based Incentive Mechanism for Ad Hoc Networks
在线阅读 下载PDF
导出
摘要 提出一种基于兴趣群组的有效抗攻击性自组网络信任激励模型IGTrust,通过采用经济学中收益与损失概念,屏蔽了不同评价主体对同一行为评价的差异性.IGTrust将信任关系划分为三种类型,以节点获得的相对收益作为信任评估依据,结合交易信息量、折扣因子、时间维度等参数给予了各自的解决方案.仿真实验结果表明,IGTrust在抗恶意节点攻击与资源查询性能等方面均有良好性能. An interest group based trust model(IGTrust) for ad hoc networks is presented in this paper.Using the income and costs,IGTrust masks the difference of a transaction's trust from different evaluating peers.Trust relationship in IGTrust which employ the relative income of a peer(or system) as its trust information is divided into three kinds and each solution is also put forward in view of transactions,discount factor and time.Subsequent experimental results show that IGTrust is robust on trust security and also low costs and failure rate when resource search happens.
出处 《电子学报》 EI CAS CSCD 北大核心 2015年第12期2466-2469,共4页 Acta Electronica Sinica
关键词 对等网 信任 兴趣群组 信誉 P2P trust interest group reputation
  • 相关文献

参考文献10

  • 1R F Zlaou, K Hwang. PowerTrust: A robust and scalable reputa- tion system for a-usted peer-to-peer computing[ J]. IF.F,E Trans- actions on Parallel and Distributed Systems,2007,18(4) :460- 473.
  • 2Y C Zhang, Y G Fang. A fine-grained reputation system for re- liable service selection in peer-to-peer networks [ J]. IF].F. Transactions on Parallel and Distributed systems, 2007,18(8) : 1134- 1145.
  • 3王健,刘衍珩,张婧,刘雪莲.移动自组网的主观信任建模与仿真[J].电子学报,2011,39(12):2813-2819. 被引量:7
  • 4田春岐,邹仕洪,王文东,程时端.一种基于推荐证据的有效抗攻击P2P网络信任模型[J].计算机学报,2008,31(2):270-281. 被引量:42
  • 5李致远,王汝传.一种移动P2P网络环境下的动态安全信任模型[J].电子学报,2012,40(1):1-7. 被引量:13
  • 6S S Song, K Hwang, R R F Zhou. Trusted P2P transactions with fuzzy reputation aggregation [ J ]. 1UEE lntemet Comput-ing, 2005,9(6) :18 - 28.
  • 7S Lee,R Sherwood, B Bhattacharjee. Cooperative peer groups in NICE[ A]. Proceedings of IEEE Infocom[ C ]. San Francis- co, USA: IEEE, 2003.216 - 228.
  • 8E Damiani,D C di Vimercati, S Paraboschi, et al.A reputation- based approach for choosing reliable resources in peer-to-peer networks[ A ]. Prcr.ee.dings of the 9th ACM Conference on Computer and Communications Security[ C]. New York, USA: ACM,2002.207 - 216.
  • 9K Sripanidknalchai, B Maggs, H Zhang. Efficient content loca- tion using interest based locality in peer-to-peer systems[A]. Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies [ C ]. San Francisco, CA: IEEE,2011.2166 - 2176.
  • 10Chunqi Tian, Baijian Yang, Jidong 21aong, Xiaojian Liu. Trust- based incentive mechanism to motivate cooperation in hybrid P2P networks [ J ]. Computer Networks (Elsevier), 2014, 73 (11) .244 - 255.

二级参考文献53

  • 1朱峻茂,杨寿保,樊建平,陈明宇.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803. 被引量:44
  • 2李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 3胡波,王汝传,王海艳.基于集对分析的P2P网络安全中的信誉度改进算法[J].电子学报,2007,35(2):244-247. 被引量:13
  • 4Ramana K S, Chari A A, et al. Trust based security routing in mobile adhoc networks[ J ]. International Journal on Computer Science and Engineering,2010,2(2):259- 263.
  • 5RAYA M, HUBAUX J-P. Securing vehicular ad hoc networks [ J ]. Journal of Computer Security, 2007,15 (1) : 39 - 68.
  • 6ADIBI S, AGNEW G B. Multilayer flavoured dynamic source muting in mobile ad-hoc networks[J]. IET Communications, 2008,2(5) :690- 707.
  • 7JOHNSON D, MALTZ D. Mobile Computing[ M]. Germany: Kluwer Academic Publishers, 1996.153- 181.
  • 8IETF RFC 3561, Ad-hoc On-demand Distance Vector (AODV) Routing[ S ]. July 2003.
  • 9Anantvalee T, Wu J. Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks[ A ]. 1EEE International Conference on the Communications [ C ]. New York: IEEE, Press,2007.3383 - 3388.
  • 10Peng S C,Jia W J,et al. Voting-based clustering algorithm with subjective mast and stability in mobile ad-hoc networks [ A ]. IEEE/IFIP International Conference on Embedded and Ubiqui- tous Computing[ C]. Washington, DC: IEEF. Computer Society, 2008.3 - 9.

共引文献57

同被引文献16

  • 1RAVINI)RA J M,DADASO T M.TRAODV:Trusted and robust adhoc on demand distance vector routing in MANET [J]. International Journal of Computer Science and Information Technologies, 2015,6 (3):2342-234.
  • 2KANG X, WU Y.A trust-based pollution attack prevention scheme in peer-to-peer streaming networks[J].Computer Networks, 2014,72(7) : 62-73.
  • 3ALHAMAD M,DILLON T,CHANG E.SLA-based trust model for cloud computing[C].NBIS:Proceedings of 13th International Conference on Network-Based Information Systems, IEEE, 2010 : 321-324.
  • 4QU C, BUYYA R.A cloud trust evaluation system using hierarchical fuzzy inference system for service selection[C]. Proceedings of IEEE 28th International Conference on Advanced Information Networking and Applications, IEEE, 2014 : 850-857.
  • 5TALAL H N, QUAN Z S, NGU A H, et al.CloudArmor: supporting reputation-based trust management for cloud services[J].IEEE Transactions on Parallel and Distributed, 2016,27(2) : 367-380.
  • 6TALAL H N, QUAN Z,ZEADALLY S,et al.Trust manage- ment of services in cloud environments:obstacles and solu- tions[J].ACM Computing Surveys, 2013,46(1) : 28-36.
  • 7全国信息安全标准化技术委员会.GB/T31168-2014信息安全技术云计算服务安全指南[S].北京:中国标准出版社,2014.
  • 8全国信息安全标准化技术委员会.GB/T31167-2014信息安全技术云计算服务安全能力要求[S].北京:中国标准出版社,2014.
  • 9SEPANDAR D K,MARIO T S, HECTOR G M.The Eigen- Trust algorithm for reputation management in P2P net- works[C].Proceedings of the 12th Int'l Conf.on World Wide Web.Budapest : ACM Press, 2003 : 640-651.
  • 10李征.基于ESS均衡的电子商务信任模型[J].计算机应用,2008,28(8):2173-2176. 被引量:5

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部