首页 | 本学科首页   官方微博 | 高级检索  
     检索      

平衡理论的P2P网络分布式信任模型
引用本文:王华东,廖利.平衡理论的P2P网络分布式信任模型[J].重庆大学学报(自然科学版),2014,37(6):104-111.
作者姓名:王华东  廖利
作者单位:周口师范学院 计算机科学与技术学院,河南 周口 466001;周口师范学院 计算机科学与技术学院,河南 周口 466001
基金项目:国家自然科学基金青年基金(11301044)
摘    要:当前P2P网络中存在着大量的恶意节点攻击和共谋团体欺骗等问题,已存在的信任模型一定程度上完善了P2P网络环境,但模型的侧重点不同,无法全面解决大规模的恶意攻击和欺骗。为此,提出了基于平衡理论的P2P信任模型。该模型由信任结构的构建、恶意节点检测和信任推测等3部分完成。模型根据平衡理论构建信任网络;针对恶意节点的攻击,利用平衡理论定义节点的平衡因子,通过计算恶意行为对网络平衡性的影响来检测恶意节点;利用信任推测算法来推测信任节点,防止网络加入不信任的节点,降低网络的安全性。实验结果表明该模型可靠完善,算法有效和健壮。

关 键 词:P2P网络  信任模型  平衡理论  网络攻击
收稿时间:5/5/2014 12:00:00 AM

Distribution of trust model in P2P network based on equilibrium theory
WANG Huadong and LIAO Li.Distribution of trust model in P2P network based on equilibrium theory[J].Journal of Chongqing University(Natural Science Edition),2014,37(6):104-111.
Authors:WANG Huadong and LIAO Li
Institution:School of Computer Science and Technology, Zhoukou Normal University, Zhoukou, Henan 466001, China;School of Computer Science and Technology, Zhoukou Normal University, Zhoukou, Henan 466001, China
Abstract:There are a large number of malicious attack nodes and collusion groups in P2P(peer to peer) network, and the existing trust models improve the P2P network environment to some extent, but the emphasis of the models are different, which are unable to fully solve large-scale malicious attacks and deception. Therefore, a P2P trust model based on equilibrium theory is presented. The model consists of the construction of the trust structure, the malicious node detection and trust speculation. It constructs trust network according to the equilibrium theory, uses the equilibrium theory to define nodes balance factor, detects balance malicious nodes by calculating the impact of malicious behavior on the network, and adopts trust inference algorithm to estimate trust nodes to prevent distrust network nodes being added. Experimental results show that the model is reliable, and the algorithm is efficient and robust.
Keywords:peer to peer network  trust model  equilibrium theory  network attacks
点击此处可从《重庆大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《重庆大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号