高级检索
    贾兆庆, 薛广涛, 唐新怀, 张鹏翥, 尤晋元. 非结构化P2P中的一种信任机制[J]. 计算机研究与发展, 2010, 47(4): 645-652.
    引用本文: 贾兆庆, 薛广涛, 唐新怀, 张鹏翥, 尤晋元. 非结构化P2P中的一种信任机制[J]. 计算机研究与发展, 2010, 47(4): 645-652.
    Jia Zhaoqing, Xue Guangtao, Tang Xinhuai, Zhang Pengzhu, You Jinyuan. A Trust Management Mechanism in Unstructured P2P[J]. Journal of Computer Research and Development, 2010, 47(4): 645-652.
    Citation: Jia Zhaoqing, Xue Guangtao, Tang Xinhuai, Zhang Pengzhu, You Jinyuan. A Trust Management Mechanism in Unstructured P2P[J]. Journal of Computer Research and Development, 2010, 47(4): 645-652.

    非结构化P2P中的一种信任机制

    A Trust Management Mechanism in Unstructured P2P

    • 摘要: 为了消除非结构化对等网络中恶意节点的恶意行为对网络系统造成的危害,提出了一个基于社会规则的声望模型,给出了该声望模型的参数及其计算方法,在基于社会规则的声望模型的基础上,提出一个用于非结构化对等网络的信任管理方案;给出了评价信息的分布式存储方案以及信任管理中声望和满意率的计算方法,提出了一个声望搜索算法;给出一个基于信任的拓扑进化算法,该算法改善了网络拓扑结构,增加了网络性能的稳定性.实验仿真表明该信任机制能够有效抵制非结构化对等网络应用中恶意节点的恶意攻击.

       

      Abstract: Unstructured P2P is a kind of very popular network application, such as Gnutella, KaZaa, etc. But its open nature makes it easy to attack by malicious peers, such as uploading inauthentic files, spreading computer viruses, etc. Hence, to mitigate the adverse behavior of unreliable or malicious peers in unstructured P2P, a reputation model based on social rules is proposed in this paper. At the same time, the parameters of the reputation model and their computing methods are presented. Based on the reputation model, a trust mechanism for unstructured P2P is designed, and the computing method of reputation and satisfaction ratio in this trust mechanism is presented. A distributed storage mechanism of evaluation records of peers is designed, and a corresponding search mechanism of reputation information is presented. An algorithm of topology evolution based on trust is presented, and its simulation shows that through topology evolution the high reputation peers form the backbone of unstructured P2P, and that can effectively improve the system stability. Under static and dynamic network settings, the resistance experiments of the proposed trust mechanism are carried out, and the experiment results show that the proposed trust mechanism can effectively resist the attack of malicious peers.

       

    /

    返回文章
    返回