计算机科学 ›› 2015, Vol. 42 ›› Issue (8): 106-111.
曹晓梅,胡文捷
CAO Xiao-mei and HU Wen-jie
摘要: 针对移动对等网络中终端稳定性差、动态性高的特点,提出了一种基于动态角色属性的MP2P信任模型。该信任模型引入了交易稳定因子和时间经验值,根据不同时刻的节点时间经验值以及贡献值,动态地赋予网络节点不同的角色,并根据角色的重要性决定计算信任值时的权重和资源下载量。仿真证实,该模型能抑制不稳定节点的影响,提高稳定节点的作用,减少“搭便车”行为以及伪善节点的影响,提高交易成功率。
[1] 李致远,王汝传.一种移动P2P网络环境下的动态安全信任模型[J].电子学报,2012,40(1):1-7 Li Zhi-yuan,Wang Ru-chuan.A Dynamic Secure Trust Model for Mobile P2P Networks [J].Chinese Journal of Electronics,2012,40(1):1-7 [2] 陈世平,王佳炳,裘慧奇.一种移动环境中的P2P网络信任模型[J].计算机应用,2009,29(10):2603-2606 Chen Shi-ping,Wang Jia-bing,Qiu Hui-qi.Trust Model for mobile P2P network [J].Journal of Computer Application,2009,29(10):2603-2606 [3] 任艳,任平安,吴振强,等.移动P2P网络中的多粒度信任模型[J].计算机工程与应用,2009,45(6):137-140 Ren Yan,Ren Ping-an,Wu Zhen-qiang,et al.Multiple granularity trust model in mobile P2P network [J].Computer Enginee-ring and Applications,2009,45(6):137-140 [4] 曹晓梅,朱海涛,沈何阳,等.MP2P网下一种基于代理的安全反馈信任模型[J].计算机科学,2014,41(7):200-205 Cao Xiao-mei,Zhu Hai-tao,Shen He-yang,et al.Proxy-based Security-Feedback Trust Model in MP2P Network [J].Compu-ter Science,2014,41(7):200-205 [5] Zuo Cui-hua,Zhou Jian-fang,Feng Hong-cai.A Novel Multi-le-vel Trust Model to Improve the Security of P2P Networks[C]∥2010 3rd IEEE International Conference Computer Science and Information Technology(ICCSIT).Chengdu,IEEE,2010:100-104 [6] Gao Ji-xun,Guo Yun-hong.Research on P2P Repeated GameTrust Model Based on Unknown Node Type[C]∥2012 International Conference on Computer Science & Service System(CSSS).Nanjing:IEEE,2012:655-658 [7] Hu Jian-lin,Wu Quan-yuan,Zhou Bin.FCTrust:A Robust and Efficient Feedback Credibility-Based Distrubuted P2P Trust Model[C]∥The 9th International Conference for Young Computer Scientists(ICYC 2008).Hunan:IEEE,2008:1963-1968 [8] Li Zhi-yuan,Bi Jun-lei.An Adaptive Trusted Tequest and Authorization Model for Mobile Peer-to-Peer Networks[C]∥2013 IEEE 10th International Conference.Zhang Jiajie:IEEE,2013:1274-1280 [9] Wang Jun-she,Li Xiao-long,Zhang Xun.Research of P2P Network Trust Model [C]∥2013 Fifth International Conference on Intelligent Human-Machine Systems and Cybernetics.Hangzhou:IEEE,2013:70-73 [10] Li Xiong,Liu Ling.PeerTrust:Supporting Reputation-basedTrust for Peer-to-Peer Electronic Communities[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7):843-857 [11] Yang Li,Zhang Yu-se,Xing Chang-you,et al.A Node InterestSimilarity based P2P Trust Model[C]∥ICCT.Nanjing:IEEE,2010:572-575 [12] Xi Jing,Nie Peng-peng,Lu Jian-de.A P2P Trust Model Based on Dynamic Fuzzy Theory—BGTR[C]∥2008 International Symposium on Information Processing(ISIP).Moscow:IEEE,2008:187-191 [13] Hu Jian-lin,Li Xiao-hua,Zhou Bin,et al.SECtrust:A Secure and Effective Distributed P2P Trust Model[C]∥2010 Third International Symposium on Intelligent Information Technology and Security Informatics(IITSI).Jinggangshan:IEEE,2010:34-38 [14] 安晓江,李大兴.基于角色的代理模型的实现[J].计算机工程,2004,30(10):62-64 An Xiao-jiang,Li Da-xing.Realization of Role-based Dlegation Model [J].Computer Engineering,2004,30(10):62-64 [15] 张华平,刘群.基于角色标注的中国人名自动识别研究[J].计算机学报,2004,27(1):85-91 Zhang Hua-ping,Liu Qun.Automatic Recognition of Chinese Personal Name Based on Role Tagging [J].Chinese Journal of Computers,2004,27(1):85-91 |
No related articles found! |
|