东北大学学报(自然科学版) ›› 2013, Vol. 34 ›› Issue (4): 512-515.DOI: -

• 信息与控制 • 上一篇    下一篇

基于历史聚集簇的P2P网络信任模型

马毅1,谭振华1,常桂然2,王学毅1   

  1. (1.东北大学软件学院,辽宁沈阳110819;2.东北大学计算中心,辽宁沈阳110819)
  • 收稿日期:2014-08-19 修回日期:2014-08-19 出版日期:2013-04-15 发布日期:2013-06-19
  • 通讯作者: 马毅
  • 作者简介:马毅(1980-),男,辽宁沈阳人,东北大学讲师,博士研究生;常桂然(1946-),河北曲周人,东北大学教授,博士生导师.
  • 基金资助:
    高等学校博士学科点专项科研基金资助项目(新教师)(20110042120027);中国博士后自然科学基金资助项目(2012M510826);中央高校基本科研业务费专项资金资助项目(N110417006,N110204003).

Related Cluster Based Trust Model for P2P Networks

MA Yi1, TAN Zhenhua1, CHANG Guiran2, WANG Xueyi1   

  1. 1. School of Software, Northeastern University, Shenyang 110819, China; 2. Center of Computing, Northeastern University, Shenyang 110819, China.
  • Received:2014-08-19 Revised:2014-08-19 Online:2013-04-15 Published:2013-06-19
  • Contact: MA Yi
  • About author:-
  • Supported by:
    -

摘要: P2P网络具有开放、匿名、节点间松耦合等特性,这些特性导致许多恶意节点提供虚假资源、恶意评价、团伙作案等问题.为解决这一问题,提出了一种新的P2P网络信任模型RCTrust,该模型在将节点根据兴趣等历史信息以簇的形式聚集的基础上,根据节点通信的目标所在簇分为簇内信任和簇外信任两种类型,并根据节点的通信成功率、通信历史相关度、评价诚实度以及评价时效性等行为对节点的信誉进行评价和反馈.仿真分析表明,该信任模型具有抵抗恶意攻击的能力,并提供了较高的通信成功率.

关键词: P2P信任模型, 聚集簇, 通信历史相关性, 恶意节点, P2P安全

Abstract: The characteristics of P2P networks are open, anonymous, and loosely coupled internode, which lead to false resources, malicious evaluation, and syndicates, etc. To solve this problem, a related cluster based trust model for P2P networks named RCTrust was presented. Nodes were gathered in clusters according to their interest similarity and communication history. Trust relation was categorized into two kinds according to the cluster which communication target was belonging to and subsequently each solution for these kinds was also put forward. In RCTrust, measure of node communication success rate, communications history similarity, honesty and timeliness of evaluation were used as reference parameters to evaluate the credit of peers. Simulation results showed that robustness against malicious attacks was obtained and a high rate of successful communication was provided by the proposed model.

Key words: P2P trust model, related cluster, communication history similarity, malicious node, P2P security

中图分类号: