Computer Science ›› 2013, Vol. 40 ›› Issue (7): 71-73.

Previous Articles     Next Articles

Trust Optimization Search p2p Node Localization Algorithm

SUN Tao,ZHAO Guo-sheng and WANG Bin   

  • Online:2018-11-16 Published:2018-11-16

Abstract: The traditional method HDHT uses trust mechanism to complete isomerism node location of the resources.When the node selection initial trust is yet not established,some processing power weaker node will generate congestion.Node congestion phenomenon will severely affect the performance of the search algorithm.This paper put forward a trust optimization search p2p node localization algorithm,which is based on credibility,establishes a search interval,in every search process,uses the direct search to optimize the search direction,to ensure that each node can be searched along the trust optimization direction,avoid the disadvantages of repeatly searching node due to p2p network heterogeneous distribution in the traditional algorithm.Experimental results show that this algorithm not only in the initial trust establishment can improve the node resources search efficiency,but also can improve download success rate after setting up trust.Algorithm can be realized in p2p query cycle platform,and the experimental analysis verifies the effectiveness of the proposed algorithm.

Key words: Heterogeneous network,Trust mechanism,Resource location

[1] Xiong Li,Liu Ling.PeerTrust:supporting reputation-based trust for Peer-to-Peer electronic communities [J].IEEE Transactions on Know ledge and D ata Engineering,2004,6(7):843-857
[2] Kamvar S,ScholsserM,Garcia-Molina H.The EigenTrust algorithm for reputation management in P2P netw orks [A]∥Proc.12th Int’l World Wide Web Conf[C].New York:ACM Press,2003:640-651
[3] Kamvar S D,Schlosser M T.EigenRep:Reputation management in P2P networks[C]∥Lawrence S,ed.Proc.of the 12th Int’l World Wide Web Conf.Budapest:ACM Press:123-134
[4] Colorni A,Drigo M,Maniezzo V.Distributed Optimization by Ant Colonies[C]∥Proc of the 1st European Conf Artificial Life.1991:134-142
[5] Colorni A,Drigo M,Maniezzo V.An Investigation of someProperties of an Ant Algorithm [C]∥Proc of PPSN ’92.1992:509-520
[6] 窦文,王怀民,贾焰,等.构造基于推荐的Peer-to-Peer环境下的Trust模型[J].软件学报,2004,5(4):571-583
[7] 李俊青,潘全科,王文宏,等.蚁群优化在P2P网络防范DDoS攻击中的应用研究[J].计算机应用研究,2009,26(1):339-341
[8] 于真,郑少峰,王少杰,等.P2P信任模型研究[J].小型微型计算机系统,2009,0(9):1715-1719
[9] 李绍滋,王挺,周昌乐.基于蚁群算法的非结构化P2P信息检索[J].计算机工程与科学,2009,1(8):99-103,9
[10] 余智华.Peer-to-Peer信任模型中的恶意行为分析[J].计算机工程与应用,2007,3(13):18-21
[11] 王新生,李学,贾冬艳.基于蚁群算法的非结构化P2P资源搜索机制[J].计算机工程,2009,5(7):189-190,4

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!