METrust: A Mutual Evaluation-based Trust Model for P2P Networks附视频

被引:0
|
作者
ChunLing Cheng XiaoLong Xu BingZhen Gao College of Computer Nanjing University of Posts and Telecommunications Nanjing PRC [210003 ]
机构
关键词
D O I
暂无
中图分类号
TP393.02 [];
学科分类号
摘要
It is necessary to construct an effective trust model to build trust relationship between peers in peer-to-peer (P2P) network and enhance the security and reliability of P2P systems. The current trust models only focus on the consumers evaluation to a transaction, which may be abused by malicious peers to exaggerate or slander the provider deliberately. In this paper, we propose a novel trust model based on mutual evaluation, called METrust, to suppress the peers malicious behavior, such as dishonest evaluation and strategic attack. METrust considers the factors including mutual evaluation, similarity risk, time window, incentive, and punishment mechanism. The trust value is composed of the direct trust value and the recommendation trust value. In order to inhibit dishonest evaluation, both participants should give evaluation information based on peers own experiences about the transaction while computing the direct trust value. In view of this, the mutual evaluation consistency factor and its time decay function are proposed. Besides, to reduce the risk of computing the recommendation trust based on the recommendations of friend peers, the similarity risk is introduced to measure the uncertainty of the similarity computing, while similarity is used to measure credibility. The experimental results show that METrust is effective, and it has advantages in the inhibition of the various malicious behaviors.
引用
收藏
页码:63 / 71
页数:9
相关论文
共 10 条
  • [1] Authentication and Access Control in RFID Based Logistics-customs Clearance Service Platform[J] Hui-Fang Deng1 Wen Deng2 Han Li3 ;4 Hong-Ji Yang4 1School of Computer Science and Engineering; South China University of Technology; Guangzhou 510006; PRC 2School of Software Engineering; South China University of Technology; Guangzhou 510006; PRC 3School of Computer Science and Technology; Dalian University of Technology; Dalian 116023; PRC 4School of Computing; De Montfort University; Leicester; LE1
  • [2] 基于时间窗反馈机制的动态P2P信任模型
    石志国
    刘冀伟
    王志良
    [J]. 通信学报, 2010, 31 (02) : 120 - 129
  • [3] 一种基于聚集超级节点的P2P网络信任模型
    田春岐
    江建慧
    胡治国
    李峰
    [J]. 计算机学报, 2010, 33 (02) : 345 - 355
  • [4] A Neuro-genetic Based Short-term Forecasting Framework for Network Intrusion Prediction System[J] Siva S. Sivatha Sindhu;S. Geetha;M. Marikannan;A. Kannan; International Journal of Automation & Computing 2009, 04
  • [5] 一种基于反馈可信度的分布式P2P信任模型
    胡建理
    吴泉源
    周斌
    刘家红
    [J]. 软件学报, 2009, 20 (10) : 2885 - 2898
  • [6] A Secure Short Message Communication Protocol[J] Chao-Wen Chang~(1; 2;*) Heng Pan~2 Hong-Yong Jia~2 1 School of Electronic and Information Engineering; Xi'an Jiaotong University; Xi'an 710071; PRC 2 Institute of Electronic Technology; Information Engineering University; Zhengzhou 450004; PRC International Journal of Automation & Computing 2008, 02
  • [7] 一种基于推荐证据的有效抗攻击P2P网络信任模型
    田春岐
    邹仕洪
    王文东
    程时端
    [J]. 计算机学报, 2008, (02) : 270 - 281
  • [8] A Trust Model Based on Evidence Theory for P2P Systems[J] Huang Li Dong;Xue Gang;He Xiang Lin;Zhuang Hong Lin Applied Mechanics and Materials 2010,
  • [9] Reputation management algorithms for DHT-based peer-to-peer environment[J] Natalya Fedotova;Luca Veltri Computer Communications 2009,
  • [10] Free Riding in Peer-to-Peer Networks[J] Karakaya; Murat;Korpeoglu; Ibrahim;Ulusoy; Ozgur IEEE Internet Computing 2009,