[1]王健,曹晓梅. 移动P2P环境下基于社会信任补充的信任模型[J].计算机技术与发展,2015,25(09):134-138.
 WANG Jian,CAO Xiao-mei. A Trust Model Based on Social Trust Supplement for MP2 P Networks[J].,2015,25(09):134-138.
点击复制

 移动P2P环境下基于社会信任补充的信任模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
25
期数:
2015年09期
页码:
134-138
栏目:
安全与防范
出版日期:
2015-09-10

文章信息/Info

Title:
 A Trust Model Based on Social Trust Supplement for MP2 P Networks
文章编号:
1673-629X(2015)09-0134-05
作者:
 王健曹晓梅
 1.南京邮电大学 计算机与软件学院;2. 江苏无线传感网高技术研究重点实验室;3.宽带无线通信与传感网技术教育部重点实验室
Author(s):
 WANG JianCAO Xiao-mei
关键词:
 移动P2 P社会信任高度动态性余弦相似度共谋攻击
Keywords:
 Mobile P2Psocial trusthigh dynamiccosine similaritycollusion attack
分类号:
TP309
文献标志码:
A
摘要:
 随着移动终端的普及,移动P2 P网络中所面临的虚假文件传播,恶意节点共谋攻击等安全问题日益严重,因此,需要有效的信任机制来保证移动P2 P网络的安全性。文中提出了一种基于社会信任补充的信任模型。该模型针对移动P2 P网络中节点的高度动态性,参考人类社交网络,在节点历史交易信息不能获取时采用节点的社会信任作为补充,以此来评估节点的可信程度;同时引入交易速率作为交易失败的风险因子;并且利用向量描述节点之间的熟悉程度,通过计算向量余弦相似度,筛选出可靠的推荐节点,随后综合所有可信推荐节点的交易次数和交易满意次数,从而保证评价的稳定性。通过仿真的实验结果表明,该模型能够有效提高文件下载成功率并能够抵抗恶意节点的共谋攻击。
Abstract:
 With the popularity of the mobile devices,the security problems about the spread of the false documents and the attack of mali-cious nodes in the Mobile P2P networks become more and more serious,then need an effective trust mechanism to protect the MP2P net-work. A trust model based on social trust as supplement is proposed. This model aims at the high dynamic characteristic of nodes in MP2P network and consuls social networks. While the trading history information of the nodes cannot be acquired,the model will use the social trust of the nodes as supplement to evaluate the node’ s reliability. The model also introduces the rate of transaction as the risk factor of the transaction failure. Use vector to describe the degree of the familiarity between the nodes and compute the cosine similarity to screen out reliable nodes,and then compute the trade times of the reliable nodes to ensure that the evaluation is stable. The simulation result proves that the model can promote the success rate of file downloads and defend the collusion attack of malicious nodes effectively.

相似文献/References:

[1]张志宏,吴庆波,邵立松,等.基于飞腾平台TOE协议栈的设计与实现[J].计算机技术与发展,2014,24(07):1.
 ZHANG Zhi-hong,WU Qing-bo,SHAO Li-song,et al. Design and Implementation of TCP/IP Offload Engine Protocol Stack Based on FT Platform[J].,2014,24(09):1.
[2]梁文快,李毅. 改进的基因表达算法对航班优化排序问题研究[J].计算机技术与发展,2014,24(07):5.
 LIANG Wen-kuai,LI Yi. Research on Optimization of Flight Scheduling Problem Based on Improved Gene Expression Algorithm[J].,2014,24(09):5.
[3]黄静,王枫,谢志新,等. EAST文档管理系统的设计与实现[J].计算机技术与发展,2014,24(07):13.
 HUANG Jing,WANG Feng,XIE Zhi-xin,et al. Design and Implementation of EAST Document Management System[J].,2014,24(09):13.
[4]侯善江[],张代远[][][]. 基于样条权函数神经网络P2P流量识别方法[J].计算机技术与发展,2014,24(07):21.
 HOU Shan-jiang[],ZHANG Dai-yuan[][][]. P2P Traffic Identification Based on Spline Weight Function Neural Network[J].,2014,24(09):21.
[5]李璨,耿国华,李康,等. 一种基于三维模型的文物碎片线图生成方法[J].计算机技术与发展,2014,24(07):25.
 LI Can,GENG Guo-hua,LI Kang,et al. A Method of Obtaining Cultural Debris’ s Line Chart Based on Three-dimensional Model[J].,2014,24(09):25.
[6]翁鹤,皮德常. 混沌RBF神经网络异常检测算法[J].计算机技术与发展,2014,24(07):29.
 WENG He,PI De-chang. Chaotic RBF Neural Network Anomaly Detection Algorithm[J].,2014,24(09):29.
[7]刘茜[],荆晓远[],李文倩[],等. 基于流形学习的正交稀疏保留投影[J].计算机技术与发展,2014,24(07):34.
 LIU Qian[],JING Xiao-yuan[,LI Wen-qian[],et al. Orthogonal Sparsity Preserving Projections Based on Manifold Learning[J].,2014,24(09):34.
[8]尚福华,李想,巩淼. 基于模糊框架-产生式知识表示及推理研究[J].计算机技术与发展,2014,24(07):38.
 SHANG Fu-hua,LI Xiang,GONG Miao. Research on Knowledge Representation and Inference Based on Fuzzy Framework-production[J].,2014,24(09):38.
[9]叶偲,李良福,肖樟树. 一种去除运动目标重影的图像镶嵌方法研究[J].计算机技术与发展,2014,24(07):43.
 YE Si,LI Liang-fu,XIAO Zhang-shu. Research of an Image Mosaic Method for Removing Ghost of Moving Targets[J].,2014,24(09):43.
[10]余松平[][],蔡志平[],吴建进[],等. GSM-R信令监测选择录音系统设计与实现[J].计算机技术与发展,2014,24(07):47.
 YU Song-ping[][],CAI Zhi-ping[] WU Jian-jin[],GU Feng-zhi[]. Design and Implementation of an Optional Voice Recording System Based on GSM-R Signaling Monitoring[J].,2014,24(09):47.

更新日期/Last Update: 2015-10-16