期刊文献+

面向选择推荐节点的P2P网络信任模型 被引量:3

A P2P network trust model for selecting recommended nodes
在线阅读 下载PDF
导出
摘要 对等网(P2P)具有开放性、匿名性等特点,节点之间的交互类型复杂多样并且具有较小的重复交互性,导致其节点之间的信任关系难以确定。提出一种基于选择节点的P2P网络信任模型,通过直接信任和推荐信任得到节点综合信任值。选择推荐节点时,使用推荐节点与交互节点信任值相似度作为标准,以其信任差值最小的推荐节点作为被选择节点;同时,针对共谋团体的团伙欺骗,提出连带惩罚机制以及对提供可靠消息节点的奖励机制。仿真实验结果表明,该模型不但具有抗恶意节点攻击的能力,同时还具有较高的自适应能力。 Due to the openness and anonymity of Peer-to-Peer(P2 P),the types of interactions between nodes are complex and diverse,and they have small repetitive interactions,which makes it difficult to define the trust relationship between nodes.Based on selected nodes,we propose a P2 Pnetwork trust model,and obtain comprehensive trust value through direct trust and the recommended trust for each node.Recommendation nodes whose trust value is closest to the interactive nodes are selected,that is to say,nodes with the smallest trust difference are selected.We also propose a joint punishment mechanism and an incentive mechanism to prevent gang cheating of the conspiracy group.Simulation experiments show that the trust model is not only capable of resisting attacks of malicious nodes,but also has a high self-adaptability.
作者 马满福 何春玲 MA Man fu;HE Chun-ling(College of Computer Science & Engineering,Northwest Normal University,Lanzhou 730070;Gansu lOT Research Center,Lanzhou 730070,China)
出处 《计算机工程与科学》 CSCD 北大核心 2018年第6期977-983,共7页 Computer Engineering & Science
基金 国家自然科学基金(71263045) 甘肃省科技支撑计划(1204FKCA162)
关键词 对等网络 信任 挂起 激励机制 P2P trust pending incentive mechanism
  • 相关文献

参考文献6

二级参考文献57

  • 1常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301-1307. 被引量:101
  • 2李景涛,荆一楠,肖晓春,王雪平,张根度.基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,2007,18(1):157-167. 被引量:115
  • 3Carminati B, Ferrari E, Pereqo A. Enforcing Access Control in Web-based Social Networks[J]. ACM Transactions on Information and System Security, 2009, 13(1): 1-38.
  • 4Tran T. Protecting Buying Agents in E-marketplaces by DirectExperience Trust Modelling[J]. Knowledge and Information System, 2010, 22(1): 65-100.
  • 5Bohm K, Etalle S, Hartoq J D. A Flexible Architecture for Privacy-aware Trust Management[J]. Journal of Theoretical and Applied Electronic Commerce Research, 2010, 5(2): 77-96.
  • 6Hoffman K, Zaqe D, Nita-Rotaru C. A Survery of Attack and Defense Techniques for Reputation Systems[J]. ACM Computing Surveys, 2009. 42(1): 1-31.
  • 7Fouss F, Achbany F, Saerens M. A Probabilistic Reputation Model Based on Transaction Ratings[J]. Information Science, 2010, 180(11): 2095-2123.
  • 8Shafer G. A Betting Interpretation for Probabilities and Dempster- Shafer Degrees of Belief[J]. International Journal of Approximate Reasoning, 2009, 52(11): 127-136.
  • 9田慧蓉,邹仕洪,王文东,程时端.P2P网络层次化信任模型[J].电子与信息学报,2007,29(11):2560-2563. 被引量:10
  • 10Firdhous M,Ghazali O,Vijaykumar P,Hassan S.A trust computing mechanism for cloud computing//Proceedings of the ITU Fully Networked Human Innovations for Future Networks and Services.Cape Town,South Africa,2011:1-7.

共引文献403

同被引文献33

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部