检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
机构地区:[1]中州大学实验管理中心,郑州450044 [2]解放军信息工程大学理学院,郑州450000
出 处:《科学技术与工程》2015年第23期37-42,49,共7页Science Technology and Engineering
基 金:国家863计划项目(2009AA012200);河南省科技经费项目(SP09JH11158)资助
摘 要:当前P2P网络中存在着大量的恶意节点攻击和共谋团体欺骗等问题,已存在的信任模型在一定程度上完善了P2P网络环境;但模型的侧重点不同,无法全面解决大规模的恶意攻击和欺骗。为此,提出了基于平衡理论的P2P信任模型。该模型由信任结构的构建、恶意节点检测和信任推测等三部分完成。模型首先根据平衡理论构建信任网络;针对恶意节点的攻击,利用平衡理论定义节点的平衡因子,通过计算恶意行为对网络平衡性的影响来检测恶意节点;最后利用信任推测算法来推测信任节点,防止网络加入不信任的节点,降低网络的安全性。实验结果表明该模型可靠完善,算法有效和健壮。There are a large number of malicious attack nodes and collusion groups in P2P network, trust model already exists to some extent improves the P2P network environment, but the emphasis of the model are different, unable to fully solve large-scale malicious attacks and deception. For this, a P2P trust model based on equilibrium theory is presented. The model is completed by constructing the trust structure, the malicious node detection and trust speculated three parts. The model constructs trust network according to the equilibrium theory firstly; For ma- licious nodes attack the equilibrium theory defined nodes balance factor is used, by calculating the impact of mali- cious behavior on the network to detect balance malicious nodes. Finally using trust inference algorithm to estimate trust nodes, prevents network nodes into distrust and reduces network security. Experimental results show that the model is perfect and reliable, the algorithm is efficient and robust.
分 类 号:TP393.02[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.222.30.59