计算机科学 ›› 2014, Vol. 41 ›› Issue (7): 200-205.doi: 10.11896/j.issn.1002-137X.2014.07.042

• 信息安全 • 上一篇    下一篇

MP2P网下一种基于代理的安全反馈信任模型

曹晓梅,朱海涛,沈何阳,陈贵海   

  1. 南京邮电大学计算机与软件学院 南京210003;江苏省无线传感网高技术研究重点实验室 南京210003;南京邮电大学计算机与软件学院 南京210003;江苏省无线传感网高技术研究重点实验室 南京210003;南京邮电大学计算机与软件学院 南京210003;江苏省无线传感网高技术研究重点实验室 南京210003;南京大学计算机科学与技术系 南京210093
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家重点基础研究发展项目(973计划)(2011CB302903),国家自然科学基金项目(60873231,61202353),江苏高校优势学科建设工程项目(yx002001)资助

Proxy-based Security-feedback Trust Model in MP2P Network

CAO Xiao-mei,ZHU Hai-tao,SHEN He-yang and CHEN Gui-hai   

  • Online:2018-11-14 Published:2018-11-14

摘要: 信任问题是移动对等网(Mobile P2P,MP2P)安全中的关键性问题。针对MP2P网与传统P2P网终端设备在编址、通信方式和标识上的差异性以及网络中可能存在的冒名、恶意诋毁、合谋以及“搭便车”等安全问题,提出一种MP2P网下基于代理的安全反馈信任模型(PSTM)。不同类别的代理服务器接入不同类型的终端,以屏蔽网络层终端设备之间的差异性。同时,代理服务器之间对信息的相互备份能够缓解服务器“单点失效”问题。在资源安全选择协议中对反馈方进行身份、资格的认证后进行相似性筛选并加权处理。在多粒度的信任值计算中引入全局节点贡献度和评价可信度,并将直接信任度分为面向节点的与面向资源的来激励移动节点真实地反馈信息。实验表明,PSTM能够减少诋毁以及合谋恶意行为,同时能够抑制“搭便车”行为,从而增加网络善意节点的交易成功率。

关键词: 结构化MP2P网,信任模型,代理服务器,安全反馈,相似度加权 中图法分类号TP393.08文献标识码A

Abstract: Trust problem is the key issue for Mobile P2P (MP2P) network security.In MP2P network,terminal devices’ addressing mode,communication mode and identifiers are different to traditional P2P network.Some security issues such as:allusion attack,malicious slander and collusion,“free ride” phenomenon,are even more serious compared to traditional P2P network.Aiming at these above issues,a Proxy-based Security-Feedback Trust Model (PSTM) was proposed in this paper.Different types of terminal devices access to different proxy servers to shield the discrepancy between different terminal equipments on MP2P device access network layer.Meanwhile,proxy servers can reduce the problem of single point failure with the method of related information’s backup and recovery.Certificate Feedback Ra-ter’s identification and qualification through security resource-selection protocol,then integrate trust information accor-ding to similarity of terminal and resource types with weighted method.Furthermore,set global contribution value and evaluation value in multi-granularity trust computation to motivate mobile peers’honest feedbacks.Divide mobile peer’s direct trust value into peer-oriented and resource-oriented values to make trust feedbacks more authentic.Simulation experiments show that PSTM can reduce malicious slander and collusion effectively.It also can restrain selfish peers’ free ride behaviors and increase successful cooperation rate of high-contributed peers in MP2P network.

Key words: Structured mobile P2P network,Trust model,Proxy server,Security feedback,Weighted by similarity

[1] Basit Q,Geyong M.A distributed reputation and trust management scheme for mobile peer-to-peer networks[J].Computer Communications,2012,35(5):608-618
[2] Wu Xu.A distributed trust management model for mobile P2P networks[J].Peer-to-Peer Networking and Applications,Springer Science,2012,5:193-204
[3] 李致远.一种移动P2P网络环境下的动态安全信任模型[J].电子学报,2012,40(1):1-7
[4] 任艳,任平安,吴振强,等.移动P2P网络中的多粒度信任模型[J].计算机工程与应用,2009,45(6):137-140
[5] Jameel H,Hung L,Kalim U,et al.A trust model for ubiquitous systems based on vectors of trust values[C]∥Proc of the 7th IEEE Int’l Symp.on Multimedia.Washington:IEEE Computer Society Press,2005:674-679
[6] Almenarez F,Marin A,Campo C,et al.PTM:A pervasive trust management model for dynamic open environments[C]∥Proc.of the 1st Workshop on Pervasive Security,Privacy and Trust.Boston:IEEE Computer Society Press,2004:345-350
[7] 王昕.基于移动P2P的分布式网络信任模型研究[D].石家庄:河北科技大学,2010
[8] 程久军,李玉宏,程时端,等.移动P2P系统体系结构与关键技术的研究[J].北京邮电大学学报,2006,29(4):86-89
[9] 胡建理,周斌,吴泉源.一种P2P信任管理安全性协议[J].计算机科学,2011,38(10):64-67
[10] 苗光胜,冯登国,苏璞睿.P2P信任模型中基于模糊逻辑的共谋团体识别方法[J].计算机研究与发展,2011,48(12):2187-2200
[11] Chin-Chih C,Yen-Chen C.A mechanism for sharing Web serv-ices in mobile P2P networks[C]∥2011international conference on agricultural and natural resources engineering.Singapore:Advances in Biomedical Engineering,2011:251-260
[12] Kokkonen E,Baset S,Matuszewski M.Demonstration of Peer-to-Peer Session Initiation Protocol(P2PSIP) in the Mobile Environment[C]∥Consumer Communications and Networking Conference.Las Vegas,NV:IEEE Computer Society Press,2008:1221-1222
[13] 陈宏旦.移动P2P网络中的基于DHT分层Chord算法研究[D].重庆:重庆大学通信工程学院,2010
[14] Wu Xu,He Jing-sha,Chia-Hu C,et al.A Power Peer-BasedReputation Scheme for Mobile P2P Systems[C]∥Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing.Taiwan:Springer-Verlag,2009:615-625
[15] 乐光学,李任发,陈志,等.P2P网络中搭便车行为分析与抑制机制建模[J].计算机研究与发展,2011,48(3):382-397
[16] Zou Dong-yao,Gan Yong,Qu Hai-tao.Research of structure consistency between overlay and network layer based on mobile P2P[C]∥Computer Science and Information Technology(ICCSIT).Beijing:IEEE Computer Society Press,2009:254-258

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!