
浏览全部资源
扫码关注微信
1. 同济大学计算机科学与技术系
2. 同济大学嵌入式系统与服务计算教育部重点实验室
3. 上海交通大学导航与控制研究所
纸质出版日期:2008
移动端阅览
鲍宇, 曾国荪, 曾连荪, 等. P2P网络中防止欺骗行为的一种信任度计算方法[J]. 通信学报, 2008,(10):215-222.
BAO Yu1, ZENG Guo-sun1, ZENG Lian-sun3, et al. Reputation computation based on new metric in P2P network[J]. 2008, (10): 215-222.
P2P网络节点之间可信性问题处理常基于信誉
但对其中交易记录的时效性
节点其他行为和性能考虑很少。因此对信任评价中的欺骗行为进行分析
将推荐行为单独考虑
弥补计算节点可信度时的不足。其次
在信任评价中引入时间衰减因子
按行为区分恶意节点。仿真表明可以降低恶意串通和间谍攻击
提高下载中有效文件的比率。
For most of P2P file sharing trusted download
the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed
and the recommender behavior in P2P network was considered separately
which made up for computation based on the interac-tion behavior in computation of reputation.Secondly
for the positive and negative evaluation
different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files
but also restrain the collusion in malicious nodes
especially the spy action.
0
浏览量
703
下载量
4
CSCD
关联资源
相关文章
相关作者
相关机构
京公网安备11010802024621