首页 | 本学科首页   官方微博 | 高级检索  
     

对抗共谋及节点行为动态性的P2P信任模型
引用本文:陈作汉,任旭鹏,卢鹏丽.对抗共谋及节点行为动态性的P2P信任模型[J].计算机应用,2011,31(2):308-312.
作者姓名:陈作汉  任旭鹏  卢鹏丽
作者单位:1. 兰州理工大学计算机与通信学院2.
基金项目:甘肃省自然科学基金资助项目
摘    要:针对现有P2P信任模型存在的网络开销大、不能很好地处理节点行为的动态性改变及共谋攻击等问题,提出了一种新的信任模型。通过直接交互节点的局部评价加权其评价可信度计算节点的全局信誉值;采用基于局部评价标准差、局部评价集中度的方法识别和抑制共谋攻击;根据节点行为的改变动态更新其信誉值和评价可信度。仿真实验表明,提出的模型较现有模型在网络开销、抑制共谋攻击和节点行为的动态性等方面有较大改进。

关 键 词:对等网络    信任    信誉    动态性    共谋攻击
收稿时间:2010-08-16
修稿时间:2010-10-13

P2P trust model for resisting collusion and dynamic behavior of node
CHEN Zuo-han,REN Xu-peng,LU Peng-li.P2P trust model for resisting collusion and dynamic behavior of node[J].journal of Computer Applications,2011,31(2):308-312.
Authors:CHEN Zuo-han  REN Xu-peng  LU Peng-li
Affiliation:(College of Computer and Communication,Lanzhou University of Technology,Lanzhou Gansu 730050,China)
Abstract:To solve the problems of great network costs, the deficiency in dealing with dynamic characteristic and collusion attack in current P2P trust model, a new trust model was proposed. It computed global reputation value through that the direct interaction peers local evaluation weighted its evaluation credibility to avoid iterative computing process. The standard deviation and concentration ratio of local evaluation was used to identify and control collusion attack. Moreover, according to the node changes, its reputation value and evaluation credibility were updated dynamically. The simulation and experimental results indicate that the new model has advantages in reducing network costs, controlling dynamic characteristic of node and collusion attack over the existing trust models.
Keywords:Peer-to-Peer (P2P) network                                                                                                                        trust                                                                                                                        reputation                                                                                                                        dynamic characteristic                                                                                                                        collusion attack
本文献已被 CNKI 万方数据 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号