首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
P2P网络中基于网络拓扑特性的信任管理   总被引:1,自引:0,他引:1       下载免费PDF全文
贺明科  郝智勇 《计算机工程》2010,36(24):134-135
基于社会规则和非结构化P2P网络的拓扑特性,提出一个用于非结构化P2P网络的信任管理方案,给出评价信息的分布式存储方案和信任度的计算、更新、搜索方法。该方法的计算复杂度和报文通信量较低。仿真实验结果表明,该信任机制能有效抵制非结构化网络中恶意节点的攻击。  相似文献   

2.
对于分层非结构化P2P网络,到目前为止,节点稳定性是影响搜索结果的一个主要原因,提出建立一种维护模型来有效提高这种分层非结构化P2P网络的稳定性.在此维护模型中,普通节点作为一个隐性的备份,在超级节点退出时,取代超级节点成为新的超级节点,使得整个网络具有较好的鲁棒性.并详细介绍了该算法的实验.同时,在一定程度上优化了分层非结构化P2P网络的搜索算法.该维护模型的核心是一个取代算法.  相似文献   

3.
在当前服务计算背景下,针对用户难以获得满足需求的可信服务问题,提出基于社会网络动态反馈的Web服务信任度模型.基于用户使用经验设计服务直接信任度算法,对服务交易情况进行动态跟踪和监测.当用户缺乏使用某服务的直接经验时,基于社会网络中服务使用者信任度,聚合其他服务使用者对服务的直接信任度,计算该服务的间接信任度.采用修正因子进行修正,以提高社会网络节点及关联服务可信性.算法分析表明,该方法是可行和有效的.  相似文献   

4.
提出了一种结合上下文对内容进行信任度的评估方法。信任度由内容信任度和节点信任度两方面计算得到。并构建了存放历史信任度的矩阵,进而提出了资源节点及用户节点双向搜索策略,本机制在P2P网络环境下,能很好的解决冒名及作弊等恶意行为,使主体与客体间的信息交互在信任度的控制下能有效进行。  相似文献   

5.
一种基于组群的P2P网络信任模型*   总被引:1,自引:0,他引:1  
孔杰  张新有 《计算机应用研究》2010,27(12):4646-4649
由于P2P网络的开放、匿名等特点,使得P2P网络对节点缺乏约束机制,节点间缺乏信任。提出了一种应用于非结构化P2P网络的信任模型——BGTrust。该模型对组群内信任采用局部推荐信任和组群间信任采取全局信任的方法进行处理,充分结合了全局信任和局部信任的优点。仿真表明,该信任模型在对交互的信任度评价可信度和抑制恶意节点方面较已有模型有一定改进。  相似文献   

6.
介绍了P2P网络的发展现状和结构化P2P网络的特性,根据P2P网络的优点分析了其中一种较新近的结构化P2P网络--Cycloid网络的Cayley图原型及其主节点的连接情况,并基于对主节点失败情况所出现的不理想等待状况的分析,提出了备份设计模型,并采用类的对象的方法来模拟网络中的节点,进行了编程模拟实验,证实了该模型设计具有现实可行性和节约时问的特性.  相似文献   

7.
P2P网络的匿名性和动态性带来了许多安全问题,传统的分布式访问控制模型以及信任管理模型并不能很好地适应对等网络环境.本文提出了一种信任管理加权限控制的双重验证方法来实现P2P网络环境中的节点协作和资源访问等安全互操作.节点用户通过本文中的轻量级身份证书,不仅可以验证其合法身份,同时也可以通过该证书中用户的相关角色信息来获取对资源的访问控制权限.而且通过证书中的信任度字段,系统可以吊销低信任度的节点的证书,能有效地遏制恶意节点的非法行为.本文重点介绍了用户信任度的计算,以及用户节点身份证书的获取以及权限验证.最后,通过相关的实验,验证了本方法在效率上要优于传统的信任管理模型.  相似文献   

8.
许晓东  程建国  朱士瑞 《计算机应用》2011,31(12):3343-3345
僵尸网络结构的不断改进对网络安全造成了极大的威胁,如何深入研究其结构本身的固有性质对抵御该种攻击方式显得尤为重要。从复杂网络的角度模拟非结构化P2P僵尸网络,通过定义度量标准并应用网络中心化指标分析非结构化P2P僵尸网络面对节点失效时的鲁棒性。实验结果表明,非结构化P2P僵尸网络在面对随机节点失效时其鲁棒性较强,而面对高中心化节点失效时其鲁棒性将会迅速降低。  相似文献   

9.
基于分簇的无线传感器网络中信任节点的研究   总被引:1,自引:1,他引:1  
对节点的信任值进行研究,来判断节点是否值得信赖。对节点的信任要素进行分析,重点介绍分簇的无线传感器网络(WSNs)中信任的计算模型。在该模型中,综合直接信任和信誉给出信任度的计算方法。直接信任度采用基于贝叶斯评估方法,在推荐信任度的基础上描述信誉。仿真结果表明:在识别恶意节点和簇头选举时显示出该模型的优越性。  相似文献   

10.
本文介绍了一个基于P2P网络建立的全文信息检索系统的路由机制,在实现系统路由时采用了分层机制,将P2P网络中的节点分成超级节点和普通节点,超级节点间采用非结构化的P2P网络搜索技术,普通节点采用结构化的P2P网络搜索技术,使得整个网络的路由趋于稳定的结构.  相似文献   

11.
结构化多点协作 P2 P系统研究 *   总被引:1,自引:0,他引:1  
Chord是一种典型的分布式结构化的 P2P系统 ,具有严格的结构 ,无须服务器就可以很方便地找到需要的节点和数据 ;但是该系统中 ,一个文件只有一个备份 ,容易造成文件丢失 ,而且文件传输速度很慢。为此 ,在 Chord算法的基础上进行了改进 ,设计了结构化多点协作 P2P系统。该系统兼备 BitTorrent和 Chord的优点 ,既可以无须服务器方便地找到需要的节点和数据 ,又可以进行多点协作下载 ,从而保证了下载速度。它很好地解决了以上问题 ,大大提高了系统的执行效率。  相似文献   

12.
Recently, mediation tools and peer-to-peer systems have allowed an important evolution for data sharing. Mediators are now mature techniques to share structured and heterogeneous data distributed through a reasonable number of nodes. Peer-to-peer architectures open new ways to build very large and dynamic networks allowing to share unstructured data as files indexed by some keywords. We propose here to exploit the complementarity of these approaches to efficiently share structured and heterogeneous data distributed through a large set of nodes. We propose an unstructured peer-to-peer architecture handling interactions between a large set of mediators and simplifying the process of schema exchanges. We focus on the dynamic building of mediation schemas which are personalized for user needs in order to query the network. To validate our approach, we have implemented a prototype, MenT2, which integrates several schemas via mediator interactions in a simulated network.  相似文献   

13.
移动环境中一种基于Hash的P2P覆盖网   总被引:1,自引:0,他引:1  
目前提出的大多数基于哈希(hash—based)的P2P网络都集中于固定的对等节点。当节点移动到网络中一个新的位置时,这种结构在消息传递等方面的效率就会下降。文章提出一种移动环境中的基于哈希的P2P覆盖网(Hash—based P2P Overlay in Mobile Environment,H—MP2P),允许节点在网络中自由移动。一个节点可通过P2P网络广播其位置信息,其他节点通过网络可以获知该节点的移动信息并进行定位。通过理论分析和实验可知H—MP2P在扩展性、可靠性和效率方面都可以取得较好的结果,可以很好的应用在移动环境中。  相似文献   

14.
张祖昶  王诚 《微机发展》2014,(1):163-166,171
5C中针对当前P2P网络安全的需要,提出了一种信任评估网络安全模型,给出了新的信任评估计算方法和仿真实验。文中提出的信任评估模型是属于对等信任模型,该模型适合P2P网络的分布式结构,也适应于P2P网络对节点保持对等、独立、自由和异构的要求。实验结果表明,在P2P网络中建立起对等的信任评估模型,其效果是明显的。P2P网络中的节点能通过模型算法来判断来访节点的情况,通过对来访者真实情况的甄别和判断,能拒绝恶意节点的入侵,有效地抑制了网络中恶意节点的攻击成功次数。  相似文献   

15.
There has been a big challenge in structured peer-to-peer overlay network research area. Generally, a structured overlay network involves nodes evenly or based on their resource availabilities, and gathers nodes?? resources to achieve some bigger tasks. The challenge here is to gather resources based on nodes?? interests, and only interested nodes are involved in a certain task. Toward this challenge, we propose a new scheme to a peer-to-peer publish/subscribe network. Publish/subscribe represents a new paradigm for distributed content delivery. It provides an alternative to address-based communication due to its ability to decouple communication between the source and the destination. We propose a Bloom filter based mapping scheme to map IDs to nodes?? interests in addition to new interest proximity metric to forward events and to build nodes?? routing tables. We also propose a new approach called ??shared interest approach?? for network discovery. To evaluate the algorithms proposed in this work, we conducted simulations in both static and dynamic settings, and found a low false positive rate. We also discuss about a well-known application called Twitter, and show how our scheme would work in a real environment.  相似文献   

16.
一种对等网中基于相互信任的两层信任模型   总被引:3,自引:1,他引:3  
金瑜  古志民x  顾进广  赵红武 《软件学报》2009,20(7):1909-1920
在P2P 系统中,声誉模型是建立节点间信任关系的重要方法之一,但现有的P2P 声誉模型几乎都是纯分散式的,具有信任收敛慢、信任管理复杂和网络开销大等缺点.在TLT(two-level trust)中,节点自发组织为信任簇,信任评价以簇为单位.每个簇由簇首和成员节点组成,簇首和成员节点之间是一种相互信任的关系:簇首为了提高自身的簇间服务信任,利用簇内服务信任观察成员节点的服务性能,过滤恶意的成员节点;成员节点为了提高服务声誉和接受更好的服务,利用代理信任考察簇首的管理能力.分析和仿真结果表明:在TLT 中,节点的信任值收敛快,恶意行为能够被快速识别;TLT 可扩展性好,如信任管理简单和网络开销小.  相似文献   

17.
Resource allocation in peer-to-peer networks — An excess-based economic model This paper describes economic aspects of GNUnet, a peer-to-peer framework for anonymous distributed file-sharing. GNUnet is decentralized; all nodes are equal peers. In particular, there are no trusted entities in the network. This paper describes an economic model to perform resource allocation and defend against malicious participants in this context. The approach presented does not use credentials or payments; rather, it is based on trust. The design is much like that of a cooperative game in which peers take the role of players. Nodes must cooperate to achieve individual goals. In such a scenario, it is important to be able to distinguish between nodes exhibiting friendly behavior and those exhibiting malicious behavior. GNUnet aims to provide anonymity for its users. Its design makes it hard to link a transaction to the node where it originated from. While anonymity requirements make a global view of the end-points of a transaction infeasible, the local link-to-link messages can be fully authenticated. Our economic model is based entirely on this local view of the network and takes only local decisions.  相似文献   

18.
提出了一种基于节点推荐可信度的信任模型,通过对推荐节点的服务质量和推荐质量进行区分,实现节点推荐行为的量化评估,最大程度地降低虚假反馈对提供服务节点的诋毁或吹捧,有效保证服务节点全局信任值的真实可靠性。仿真分析表明,该模型可以有效抑制信任模型中不诚实反馈行为的危害性。  相似文献   

19.
Free-rider problem greatly influences the performance of unstructured networks (like ad hoc or peer-to-peer networks). To solve such problem, we focus on trust management framework, which is intended to stimulate nodes to cooperate with each other and prevent free-riders. Currently, the existing trust management framework can be classified into trust establishment framework and reputation-based framework. None of them, however, was explicitly designed with the considerations on neutrality, which is indispensable issue when devising a network system. Therefore, we attempt to march towards the design of neutral trust management framework in this paper. We firstly investigate the relation between neutrality and trust definition, and identify the requirements for design of neutral trust management framework. Then, we focus on trust management of one kind of typical unstructured networks, mobile ad hoc network (MANET). We design a neutral trust management framework of MANET to meet the clarified design requirements. Further, we perform analysis on our proposed framework, which shows our proposal can achieve neutrality under the location-dependent attack of free-rider in MANET.  相似文献   

20.
Due to limited radio range and mobility of nodes in mobile ad hoc networks (MANETs), the network partitioning and merging could occur frequently. When structured peer-to-peer (P2P) overlays are running over MANETs, then network partition in the physical network can also cause network partition at the overlay layer. Existing approaches for structured P2P overlay over MANETs do not detect network partition at the overlay layer. This paper proposes a cross-layer approach to detect network partition at the overlay layer for structured P2P overlay over MANETs. Simulation results show that the proposed approach is highly effective and efficient in terms of routing overhead, success ratio and false-negative ratio.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号