• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Xia Nu, Li Wei, Lu You, Jiang Jian, Shan Feng, Luo Junzhou. A Trust Model for the Inter-Domain Routing System[J]. Journal of Computer Research and Development, 2016, 53(4): 845-860. DOI: 10.7544/issn1000-1239.2016.20151121
Citation: Xia Nu, Li Wei, Lu You, Jiang Jian, Shan Feng, Luo Junzhou. A Trust Model for the Inter-Domain Routing System[J]. Journal of Computer Research and Development, 2016, 53(4): 845-860. DOI: 10.7544/issn1000-1239.2016.20151121

A Trust Model for the Inter-Domain Routing System

More Information
  • Published Date: March 31, 2016
  • In the inter-domain routing system, the running of the border gateway protocol (BGP) is on the assumption that ASes trust each other, and there is lack of effective verification on the validity of the routing information, so the false information publishers have the chance to seriously threaten the security of the inter-domain routing system. However, the existing works can not effectively limit the generation and transmission of the false routing information, so this paper presents a trust model for inter-domain routing system to achieve the trust evaluation on the routing behavior of the ASes. In this model, the evaluator’s direct evaluation of the evaluated AS’s routing behavior and the evaluated AS’s neighbors’ direct evaluation, weight value is assigned to different direct evaluation to compute the trust degree of the evaluated AS. A routing announcement behavior prediction method is used to make the direct evaluation result accurately reflect the evaluated AS’s future probability of sending true routing information. In addition, in order to promote ASes to join in the trust recommending positively, an incentive mechanism is used, in which every AS evaluates the other ASes’ recommendation behavior in history and computes the corresponding recommendation probability for them. The simulation results show that, compared with other trust models for inter-domain routing system, the trust evaluation result of our model is more accurate to reflect the evaluated AS’s future probability of sending true routing information.
  • Related Articles

    [1]Wang Ruiqin, Jiang Yunliang, Li Yixiao, Lou Jungang. A Collaborative Filtering Recommendation Algorithm Based on Multiple Social Trusts[J]. Journal of Computer Research and Development, 2016, 53(6): 1389-1399. DOI: 10.7544/issn1000-1239.2016.20150307
    [2]Guo Lei, Ma Jun, and Chen Zhumin. Trust Strength Aware Social Recommendation Method[J]. Journal of Computer Research and Development, 2013, 50(9): 1805-1813.
    [3]Wu Yue, Li Jianhua, Lin Chuang. Survey of Security and Trust in Opportunistic Networks[J]. Journal of Computer Research and Development, 2013, 50(2): 278-290.
    [4]Gui Jinsong and Wu Min. A Game Control Scheme Based on Prediction of Trust and Service for Wireless Access Service[J]. Journal of Computer Research and Development, 2012, 49(2): 231-242.
    [5]Tian Junfeng, Du Ruizhong, Liu Yuling. Trust Evaluation Model Based on Node Behavior Character[J]. Journal of Computer Research and Development, 2011, 48(6): 934-944.
    [6]Tong Xiangrong, Huang Houkuan, Zhang Wei. Prediction and Abnormal Behavior Detection of Agent Dynamic Interaction Trust[J]. Journal of Computer Research and Development, 2009, 46(8): 1364-1370.
    [7]Lin Chuang, Tian Liqin, Wang Yuanzhuo. Research on User Behavior Trust in Trustworthy Network[J]. Journal of Computer Research and Development, 2008, 45(12): 2033-2043.
    [8]Wu Peng, Wu Guoxin, and Fang Qun. A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems[J]. Journal of Computer Research and Development, 2008, 45(3): 408-416.
    [9]Wu Peng, Wu Guoxin, and Fang Qun. A Reputation-Based Trust Model Based on Probability and Statistics for P2P Systems[J]. Journal of Computer Research and Development, 2008, 45(3): 408-416.
    [10]Zhu Junmao, Yang Shoubao, Fan Jianping, Chen Mingyu. A Grid & P2P Trust Model Based on Recommendation Evidence Reasoning[J]. Journal of Computer Research and Development, 2005, 42(5): 797-803.

Catalog

    Article views (1195) PDF downloads (540) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return