[1]张少娴 俞琼.GBTM:一种P2P系统中基于群组的信任模型[J].计算机技术与发展,2012,(03):249-252.
 ZHANG Shao-xian,YU Qiong.GBTM:A Group-Based Trust Model for P2P Systems[J].,2012,(03):249-252.
点击复制

GBTM:一种P2P系统中基于群组的信任模型()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
期数:
2012年03期
页码:
249-252
栏目:
安全与防范
出版日期:
1900-01-01

文章信息/Info

Title:
GBTM:A Group-Based Trust Model for P2P Systems
文章编号:
1673-629X(2012)03-0249-04
作者:
张少娴 俞琼
南京邮电大学计算机学院
Author(s):
ZHANG Shao-xianYU Qiong
School of Computer,Nanjing University of Posts and Telecommunication
关键词:
对等网络信誉信任模型安全
Keywords:
peer-to-peer reputation trust model security
分类号:
TP393.07
文献标志码:
A
摘要:
目前在P2P网络中,缺乏有效的机制来提高系统的安全性,存在许多恶意行为,信任模型已经成为P2P应用研究的一个重要课题。文中对基于信任机制的P2P网络进行研究,根据节点的兴趣、爱好建立不同群组,节点总体信任度由节点之间直接信任度、组与节点之间信任度、组间信任度以及多重参数合成,并通过针对诋毁恶意节点攻击、协同作弊攻击两种不同的攻击模式下的仿真实验表明,该模型具有较高的下载成功,并且能使节点负载处于可控范围内
Abstract:
Due to lack of effective mechanisms to improve the security performance of the system,there are a lot of malicious behaviors in P2P network.So,the trust model is an important research topic for the P2P application.It conducts the research on P2P network based on the trust model and divides different groups by the interest between peers.In this model,the global trust value can be computed by combining the trust value in direct peer,in interest group,between interest groups and multiple control factors.Through the simulation experiment,this model is verified to have high ratio of successful download,and the peer load can be controlled in a admissible range

相似文献/References:

[1]张祖昶,王诚.P2P网络的信任评估安全模型研究[J].计算机技术与发展,2014,24(01):163.
 ZHANG Zu-chang,WANG Cheng.Research of a Safe Model of Trust Evaluation for P2 P Network[J].,2014,24(03):163.
[2]孙名松 邸明星 王湛昱.多决策树算法在P2P网络流量检测中的应用[J].计算机技术与发展,2010,(06):126.
 SUN Ming-song,DI Ming-xing,WANG Zhan-yu.Application of Decision Tree Algorithm in Traffic Detection of P2P Network[J].,2010,(03):126.
[3]李莹峰 邓晓衡.DHT网络中基于测量的QoS监控系统[J].计算机技术与发展,2009,(05):188.
 LI Ying-feng,DENG Xiao-heng.Measurement- Based QoS Monitor System in DHT Network[J].,2009,(03):188.
[4]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
 HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(03):181.
[5]吴敏 王汝传 王治平.基于支持向量机的P2P网络DoS攻击检测[J].计算机技术与发展,2009,(11):151.
 WU Min,WANG Ru-chuan,WANG Zhi-ping.Detection Mechanism of DoS Attacks in Peer- to- Peer Networks Based on Support Vector Machine[J].,2009,(03):151.
[6]许加兴 汪厚新 周艳 金炜东.P2P网中基于IP组播的发现机制研究[J].计算机技术与发展,2006,(06):32.
 XU Jia-xing,WANG Hou-xin,Zhou yah,et al.Discovery Implementation by IP Multicast in Peer to Peer Network[J].,2006,(03):32.
[7]杨文俊.P2P网络系统中节点自组织管理机制[J].计算机技术与发展,2006,(07):57.
 YANG Wen-jun.A Novel Self-Organization Mechanism for Nodes Management in P2P Networks[J].,2006,(03):57.
[8]阳天保 张修如 贾丽会.基于P2P的视频点播系统模型及算法研究[J].计算机技术与发展,2006,(10):45.
 YANG Tian-bao,ZHANG Xiu-ru,JIA Li-hui.Research on Video- on- Demand System Model and Algorithm Based on P2P[J].,2006,(03):45.
[9]徐小龙 程春玲 陈丹伟 熊婧夷.一种应用于对等网络的可信片上Agent模型[J].计算机技术与发展,2010,(09):140.
 XU Xiao-long,CHENG Chun-ling,CHEN Dan-wei,et al.Research on Model of Trusted Agent-on-Chip for P2P Networks[J].,2010,(03):140.
[10]吴敏 王汝传.一种基于双重流传输特性的P2P流量检测方案[J].计算机技术与发展,2010,(10):66.
 WU Min,WANG Ru-chuan.A Mechanism for P2P-Traffic Detection Based on Two-Fold Traffic Transmission Features[J].,2010,(03):66.
[11]郭晶 吴国新 李想.P2P网络环境下信任模型的研究与实现[J].计算机技术与发展,2009,(03):102.
 GUO Jing,WU Guo-xin,LI Xiang.Research and Design for Trust Model in P2P Network[J].,2009,(03):102.

备注/Memo

备注/Memo:
江苏省高校自然科学基础研究项目(08KJB620002)张少娴(1972-),女,讲师,硕士,研究方向为数据库、信息安全
更新日期/Last Update: 1900-01-01