吉林大学学报(工学版) ›› 2013, Vol. 43 ›› Issue (06): 1666-1674.doi: 10.7964/jdxbgxb201306037

• 论文 • 上一篇    下一篇

改进的基于推荐证据的对等网络信任模型

陈绵书, 王世朋, 陈贺新, 盛凯萍, 李培鹏   

  1. 吉林大学 通信工程学院, 长春 130022
  • 收稿日期:2012-08-30 出版日期:2013-11-01 发布日期:2013-11-01
  • 通讯作者: 陈贺新(1949-),男,教授,博士生导师.研究方向:多维数字信号处理,视频编码.E-mail:chx@jlu.edu.cn E-mail:chx@jlu.edu.cn
  • 作者简介:陈绵书(1973-),男,副教授,博士.研究方向:普适计算,人工智能.E-mail:chenms@jlu.edu.cn
  • 基金资助:

    国家自然科学基金项目(61171078);吉林省自然科学基金项目(20101515,20130101045JC);吉林省国际科技合作项目(20130413053GH).

Improved trust model based on recommendation evidence for P2P networks

CHEN Mian-shu, WANG Shi-peng, CHEN He-xin, SHENG Kai-ping, LI Pei-peng   

  1. College of Communication Engineering, Jilin University, Changchun 130022, China
  • Received:2012-08-30 Online:2013-11-01 Published:2013-11-01

摘要:

针对传统P2P对等网络信任模型中推荐节点诚实性难以判别的问题,提出了改进的基于推荐证据的P2P网络信任模型。模型根据交易结果,同时更新交易节点和推荐节点的信任记录。采用符合人际交往特性的衰减函数描述信任证据的衰减过程。将D-S证据理论应用于信任模型的信任计算中,将直接证据和推荐证据合成做为信任证据。模型采用基于概率Gossip算法实现信任证据的搜索。试验结果表明:本文算法有效地提高了P2P网络的成功交易率,改善了网络环境。

关键词: 通信技术, 对等网络, 推荐证据, 信任模型

Abstract:

An improved trust model based on recommendation evidence for P2P network is proposed. The aim of the model is to resolve the problem of identifying dishonesty recommendation peers in traditional trust model for unstructured P2P network. The new model updates the trust records of the transaction node and recommendation nodes simultaneously according to the transaction results. It adopts the decay function, which meets interpersonal characteristics, to describe the decay process of the trust records. The D-S evidence theory is introduced to the computation of the trust model, which integrates direct evidence and recommendation evidence into trust evidence. The model searches trust evidence through probability based Gossip algorithm. The experiment results show that the proposed model can increase the successful transaction rate and improve the network environment.

Key words: communication, P2P network, recommendation evidence, trust model

中图分类号: 

  • TN915

[1] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management[C]//1996 IEEE Symposium on Security and Privacy, Oakland,CA, 1996:164-173.

[2] Yu B, Singh M P. An evidential model of distributed reputation management[C]//Proceedings of First International Joint Conference on Autonomous Agents and Multi-Agent Systems, New York, USA, 2002: 294-301.

[3] Altman J. PKI security for JXTA overlay networks[R]. Palo Alto: Sun Microsystem, 2003.

[4] Kamvar S D, Schlosser M T, Garcia-Molina H. The eigentrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International Conference on World Wide Web, New York, USA, 2003:640-651.

[5] Xiong L, Liu L. Peertrust: supporting reputation-based trust for peer-to-peer electronic communities[J]. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 843-857.

[6] Liu Yu-mei, Yang Shou-bao, Guo Lei-tao, et al. A distributed trust-based reputation model in P2P system[C]//Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, Qingdao, China, 2007:294-299.

[7] Damiani E, De Capitani Di Vimercati S, Paraboschi S,et al. Managing and sharing servents' reputations in P2P systems[J]. IEEE Transactions on Knowledge and Data Engineering, 2003, 15(4): 840-854.

[8] Wang Y, Vassileva J. Bayesian network-based trust model[C]//Proceedings IEEE/WIC International Conference, New York, 2003: 372-378.

[9] 田春岐, 邹仕洪, 王文东,等. 一种基于推荐证据的有效抗攻击P2P网络信任模型[J]. 计算机学报, 2008,31(2):270-281. Tian Chun-qi, Zou Shi-hong, Wang Wen-dong, et al. A new trust model based on recommendation evidence for P2P networks[J]. Journal of Computers, 2008, 31(2): 270-281.

[10] 王平,邱劲,邱玉辉. 对等网络中一种基于概率的信任机制研究[J].计算机科学,2010,37(2):212-215. Wang Ping, Qiu Jin, Qiu Yu-hui. Trust computing based on probability theory in unstructured P2P network[J]. Computer Science,2010,37(2):212-215.

[11] The Stanford P2P Sociology Project[DB/OL].[2011-09-12].http:[C]//P2P stanford.edu/www/demos.htm.

[1] 周彦果,张海林,陈瑞瑞,周韬. 协作网络中采用双层博弈的资源分配方案[J]. 吉林大学学报(工学版), 2018, 48(6): 1879-1886.
[2] 孙晓颖, 扈泽正, 杨锦鹏. 基于分层贝叶斯网络的车辆发动机系统电磁脉冲敏感度评估[J]. 吉林大学学报(工学版), 2018, 48(4): 1254-1264.
[3] 董颖, 崔梦瑶, 吴昊, 王雨后. 基于能量预测的分簇可充电无线传感器网络充电调度[J]. 吉林大学学报(工学版), 2018, 48(4): 1265-1273.
[4] 牟宗磊, 宋萍, 翟亚宇, 陈晓笑. 分布式测试系统同步触发脉冲传输时延的高精度测量方法[J]. 吉林大学学报(工学版), 2018, 48(4): 1274-1281.
[5] 丁宁, 常玉春, 赵健博, 王超, 杨小天. 基于USB 3.0的高速CMOS图像传感器数据采集系统[J]. 吉林大学学报(工学版), 2018, 48(4): 1298-1304.
[6] 陈瑞瑞, 张海林. 三维毫米波通信系统的性能分析[J]. 吉林大学学报(工学版), 2018, 48(2): 605-609.
[7] 张超逸, 李金海, 阎跃鹏. 双门限唐检测改进算法[J]. 吉林大学学报(工学版), 2018, 48(2): 610-617.
[8] 关济实, 石要武, 邱建文, 单泽彪, 史红伟. α稳定分布特征指数估计算法[J]. 吉林大学学报(工学版), 2018, 48(2): 618-624.
[9] 李炜, 李亚洁. 基于离散事件触发通信机制的非均匀传输网络化控制系统故障调节与通信满意协同设计[J]. 吉林大学学报(工学版), 2018, 48(1): 245-258.
[10] 孙晓颖, 王震, 杨锦鹏, 扈泽正, 陈建. 基于贝叶斯网络的电子节气门电磁敏感度评估[J]. 吉林大学学报(工学版), 2018, 48(1): 281-289.
[11] 武伟, 王世刚, 赵岩, 韦健, 钟诚. 蜂窝式立体元图像阵列的生成[J]. 吉林大学学报(工学版), 2018, 48(1): 290-294.
[12] 袁建国, 张锡若, 邱飘玉, 王永, 庞宇, 林金朝. OFDM系统中利用循环前缀的非迭代相位噪声抑制算法[J]. 吉林大学学报(工学版), 2018, 48(1): 295-300.
[13] 王金鹏, 曹帆, 贺晓阳, 邹念育. 基于多址干扰和蜂窝间互扰分布的多载波系统联合接收方法[J]. 吉林大学学报(工学版), 2018, 48(1): 301-305.
[14] 石文孝, 孙浩然, 王少博. 无线Mesh网络信道分配与路由度量联合优化算法[J]. 吉林大学学报(工学版), 2017, 47(6): 1918-1925.
[15] 姜来为, 沙学军, 吴宣利, 张乃通. LTE-A异构网络中新的用户选择接入和资源分配联合方法[J]. 吉林大学学报(工学版), 2017, 47(6): 1926-1932.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!