作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2013, Vol. 39 ›› Issue (5): 148-151,155. doi: 10.3969/j.issn.1000-3428.2013.05.032

• 安全技术 • 上一篇    下一篇

基于优先权的P2P网络信任模型

黎梨苗,陈志刚,桂劲松,邓晓衡   

  1. (中南大学信息科学与工程学院,长沙 410083)
  • 收稿日期:2012-08-20 出版日期:2013-05-15 发布日期:2013-05-14
  • 作者简介:黎梨苗(1979-),女,博士研究生、CCF学生会员,主研方向:可信计算,网络安全;陈志刚,教授、博士生导师;桂劲松,副教授、博士;邓晓衡,教授、博士
  • 基金资助:
    国家自然科学基金资助项目(60873082, 61272494, 60903058)

P2P Network Trust Model Based on Priority

LI Li-miao, CHEN Zhi-gang, GUI Jin-song, DENG Xiao-heng   

  1. (School of Information Science and Engineering, Central South University, Changsha 410083, China)
  • Received:2012-08-20 Online:2013-05-15 Published:2013-05-14

摘要: 为解决不同节点信任推荐优先权分配不合理的问题,提出一种基于优先权的对等网络信任模型。对信任度量方法与优先权算法进行设计,采用随时间衰减的优先权算法计算节点信任值,以反映节点的实际情况。实验结果表明,该模型能监测出异常节点的行为,从而有效避免异常节点的破坏活动,随着简单恶意节点、串谋诋毁节点及自私节点的增加,其请求成功率高于PeerTrust模型和EigenTrust模型。

关键词: 对等网络, 优先权, 信任, 信任模型, 推荐信任

Abstract: To solve the problem of different node trust recommendation priority allocated unreasonably, this paper proposes the Peer-to-Peer(P2P) network trust model based on priority. It designs the method of computing trust value and priority algorithm. The priority algorithm of attenuation with time adopts to compute the node’s trust value which reflects the actual situation of the node. Experimental results show that this model can detect abnormal behavior of nodes, thus effectively avoides abnormal nodes destruction activity. With the increasing of the proportion of simple malicious nodes, conspiracy to discredit nodes and selfish nodes in the network, the request success rate of this model is higher than PeerTrust model and EigenTrust model.

Key words: Peer-to-Peer(P2P) network, priority, trust, trust model, recommendation trust

中图分类号: