• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Hu Jianli, Zhou Bin, Wu Quanyuan, Li Xiaohua. A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development, 2011, 48(12): 2235-2241.
Citation: Hu Jianli, Zhou Bin, Wu Quanyuan, Li Xiaohua. A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development, 2011, 48(12): 2235-2241.

A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks

More Information
  • Published Date: December 14, 2011
  • An important challenge regarding peer's trust valuation in peer-to-peer (P2P) networks is how to cope with such issues as dishonest feedbacks from malicious peers, collusions and complex strategic frauds. However, these issues cannot be effectively addressed by the existing solutions. Thus, a reputation-based distributed trust management model for P2P networks, named RATrust, is proposed to quantify and evaluate the trustworthiness of each peer, and to combat these attacks from the malicious peers in P2P networks. In RATrust, metric of time zone is used to describe the time property of the transaction experience and the recommendation. Three other metrics, such as peer trust value, short trust value and long trust value based on the metric of time zone, are applied to express accurately the final trust level of peers. Moreover, trust deviation value and trust abuse value are introduced to depict the above several trust metrics. Additionally, a reputation information storage mechanism is provided and discussed in this paper. Theoretical analysis and simulation experiments demonstrate that RATrust has advantages in combating various dynamic malicious behaviors such as collusive malicious behaviors, dishonest feedbacks and strategic malicious attacks, over the current trust model, and shows more effectiveness and stronger dynamic adaptability.
  • Related Articles

    [1]Lu Yuxuan, Kong Lanju, Zhang Baochen, Min Xinping. MC-RHotStuff: Multi-Chain Oriented HotStuff Consensus Mechanism Based on Reputation[J]. Journal of Computer Research and Development, 2024, 61(6): 1559-1572. DOI: 10.7544/issn1000-1239.202330195
    [2]Deng Li, Wu Weinan, Zhu Zhengyi, Chen Ming. DiffSec: A Differentiated Intelligent Network Security Service Model[J]. Journal of Computer Research and Development, 2019, 56(5): 955-966. DOI: 10.7544/issn1000-1239.2019.20190019
    [3]Bu Ning, Liu Yuling, Lian Yifeng, Huang Liang. UML-Based Modeling Method of Network Security Infrastructure[J]. Journal of Computer Research and Development, 2014, 51(7): 1578-1593.
    [4]Lin Hui, Ma Jianfeng, Xu Li. A Secure Routing Protocol for MWNs Based on Cross-Layer Dynamic Reputation Mechanism[J]. Journal of Computer Research and Development, 2014, 51(7): 1486-1496.
    [5]Ma Shouming, Wang Ruchuan, Ye Ning. Secure Data Aggregation Algorithm Based on Reputations Set Pair Analysis in Wireless Sensor Networks[J]. Journal of Computer Research and Development, 2011, 48(9): 1652-1658.
    [6]Chen Feng, Liu Dehui, Zhang Yi, Su Jishu. A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. Journal of Computer Research and Development, 2011, 48(6): 945-954.
    [7]Xie Zhen, Bi Jingping, Li Ye. A Consecutive-Behaviors-Observing-Based Neighbor Evaluation Model in P2P Network[J]. Journal of Computer Research and Development, 2010, 47(6): 1098-1106.
    [8]Luo Junhai and Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2008, 45(10): 1704-1710.
    [9]Jin Yu, Gu Zhimin, and Ban Zhijie. A New Reputation Management Mechanism Based on Bi-Ratings in Peer-to-Peer Systems[J]. Journal of Computer Research and Development, 2008, 45(6).
    [10]Zhang Haixia, Su Purui, and Feng Dengguo. A Network Security Analysis Model Based on the Increase in Attack Ability[J]. Journal of Computer Research and Development, 2007, 44(12): 2012-2019.

Catalog

    Article views (721) PDF downloads (878) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return