Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Acta Electronica Sinica》 2012-01
Add to Favorite Get Latest Update

A Dynamic Secure Trust Model for Mobile P2P Networks

LI Zhi-yuan1,2,WANG Ru-chuan1,3,4(1.College of Computer,Nanjing University of Posts and Telecommunications,Nanjing,Jiangsu 210003,China;2.School of Computer Science and Telecommunication Engineering,Jiangsu University,Zhenjiang,Jiangsu 212013,China;3.High Technology Research Key Lab of Wireless Sensor Networks,Nanjing University of Posts and Telecommunications,Nanjing,Jiangsu 210003,China;4.Institute of Computer,Nanjing University of Posts and Telecommunications,Nanjing,Jiangsu 210003,China)  
Trust is the most important key issue for Mobile P2P(MP2P) networks security.As the MP2P networks and the P2P networks environments are fundamentally different,the existing trust models for P2P networks are not suitable for MP2P networks.In view of this,a dynamic secure trust model for MP2P networks(DSTM-MP2P) is proposed.DSTM-MP2P is comprised of two schemes.One is node type-identifying mechanism based on node behavior under the situation of the known or part of the known trust information of the nodes.And the other is node probability selection strategy based on Bayesian game under the situation of the unknown trust information of the nodes.The theoretical analysis and experimental results show that whatever MP2P network environment is,a request node under the direction of the DSTM-MP2P model is always first to connect the safe and reliable nodes,which greatly increases the downloading success rate.
【Fund】: 国家自然科学基金(No.60973139 No.60773041 No.61003039 No.61003236);; 江苏省科技支撑计划(工业)项目(No.BE2010197 No.BE2010198);; 江苏省级现代服务业发展专项资金;; 江苏省高校自然科学基础研究项目(No.10KJB520013);; 高校科研成果产业化推进工程项目(No.JH10-14);; 国家和江苏省博士后基金(No.20090451240 No.20090451241 No.20100471353 No.20100471355);; 江苏高校科技创新计划项目(No.CX10B-196Z No.CX10B-197Z No.CX10B-198Z No.CX10B-199Z No.CX10B-200Z);; 江苏省六大高峰人才项目(No.2008118);; 江苏省计算机信息处理技术重点实验室基金(2010)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 3 Hits
1 HU Bo~1,WANG Ru-chuan~1,2,Wang Hai-yan~1(1.College of Computer,Nanjing University of Posts and Telecommunications,Nanjing,Jiangsu 210003,China;2.State Key Laboratory for Novel Software Technology,Nanjing University,Nanjing,Jiangsu 210093,China);A Modified Security Solution Based on SPA for Servents' Reputations in P2P Systems[J];Acta Electronica Sinica;2007-02
2 TIAN Chun-Qi1),2)ZOU Shi-Hong2)WANG Wen-Dong2)CHENG Shi-Duan2)1)(Key Laboratory of Embedded System and Service Computing,Ministry of Education,Tongji University,Shanghai 201804)2)(Broadband Network Research Center,State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876);A New Trust Model Based on Recommendation Evidence for P2P Networks[J];Chinese Journal of Computers;2008-02
3 LI Jing-Tao+, JING Yi-Nan, XIAO Xiao-Chun, WANG Xue-Ping, ZHANG Gen-Du (Department of Computer and Information Technology, Fudan University, Shanghai 200433, China);A Trust Model Based on Similarity-Weighted Recommendation for P2P Environments[J];Journal of Software;2007-01
Chinese Journal Full-text Database 10 Hits
1 WU Xu1,HE Jing-sha2,ZHANG Xi3,XU Fei1(1.College of Computer Science and Technology,Beijing University of Technology, Beijing 100124,China;2.School of Software Engineering,Beijing University of Technology,Beijing 100124,China;3.Boren Jirui Computer Network Systems Co.,Ltd,Beijing 100099,China);A Recommendation-based Peer-to-Peer Trust Model[J];Journal of Beijing University of Technology;2010-03
2 LU Feng,ZHENG Kang-feng,NIU Xin-xin,YANG Yi-xian(1.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing 100876,China;2.Key Laboratory of Network and Information Attack and Defence Technology,Ministry of Education,Beijing University of Posts and Telecommunications,Beijing 100876,China;3.National Engineering Laboratory for Disaster Backup and Recovery,Beijing University of Posts and Telecommunications,Beijing 100876,China);Construct a Risk-Aware Peer-to-Peer Security Trust Model[J];Journal of Beijing University of Posts and Telecommunications;2010-01
3 TAN Zhen-hua1,CHENG Wei1,ZHU Zhi-liang1,WANG Xing-wei2(1. School of Software,Northeastern University,Shenyang 110004,China; 2. School of Information Science & Engineering,Northeastern University,Shenyang 110004,China. );A Trust Model with Multidimensional Factor for P2P Routing[J];Journal of Northeastern University(Natural Science);2010-11
4 Yang Li Zhang Yusen Xing Changyou Zhang Tao (Institute of Command Automation,PLA University of Science and Technology,Nanjing 210007,China);Distributed interest-aware trust model for P2P environments[J];Journal of Southeast University(Natural Science Edition);2011-02
5 ZHANG Yu,CHEN Hua-jun,JIANG Xiao-hong,SHENG Hao,YU Tong,ZHOU Lin-hua (College of Computer Science,Zhejiang University,Hangzhou,Zhejiang 310027,China);A Survey of Trust Management for E-commerce Systems[J];Acta Electronica Sinica;2008-10
6 YU Zhen1,SHEN Gui-cheng1,LIU Bing-wu1,LI Jing-chun2,WANG Shao-jie2(1.School of Information,Beijing Wuzi University,Beijing 101149,China;2.National Research Center for Information Technology Security,Beijing 100094,China);METrust:A Trust Model in P2P Networks[J];Acta Electronica Sinica;2010-11
7 SUN Hua1,2,YU Hui-qun1,3,YANG Nian-hua1(1.Department of Computer Science and Engineering,East China University of Science and Technology,Shanghai 200237,China;2.School of Information Science and Engineering,Xinjiang University,Urumqi,Xinjiang 830046,China;3.Shanghai Key Laboratory of Computer Software Evaluating and Testing,Shanghai 201112,China);Local Storage of Reputation Without the Third Parties to Validate Integrity in Peer-to-Peer Environments[J];Acta Electronica Sinica;2011-S1
8 Li Feng① Shen Li-min① Si Ya-li② Mu Yun-feng① ①(Information College,Yanshan University,Qinhuangdao 066004,China) ②(LiRen College,Yanshan University,Qinhuangdao 066004,China);A Trust Forecasting Model Based on Entity Context and Time Stamp[J];Journal of Electronics & Information Technology;2011-05
9 PAN Chun-hua1,ZHU Tong-lin1,YIN Jian-jun1,LIU Hao2(1.College of Informatics,South China Agricultural University,Guangzhou 510642,China;2.School of Computer Science and Engineering,South China University of Technology,Guangzhou 510640,China);A Trust Model Based on Deviation Factor for P2P Networks[J];Journal of Beijing University of Posts and Telecommunications;2011-03
10 Xu Hai-mei①② Qi Shou-qing② Lu Xian-liang① Han Hong①①(School of Computer Science & Engineering,University of Electronic Science & Technology of China,Chengdu 610054,China)②(College of Chongqing Communication,Chongqing 400035,China);A Novel Trust Model of P2P Networks Based on Theory of Probability and Statistics[J];Journal of Electronics & Information Technology;2011-06
China Proceedings of conference Full-text Database 4 Hits
1 Junfeng Tian Institute of Network Technology Hebei University Baoding,P.R.China Dongdong Sun Institute of Network Technology Hebei University Baoding,P.R.China Xiaohui Yang Institute of Network Technology Hebei University Baoding,P.R.China;A Trust Model Based on Capability and Quality for P2P Networks[A];[C];2008
2 Muyong Cai,Xiangming Wen,Wei Zheng,Yinbo Cheng,Yong Sun Institute of Communication Network Integrated Technique,Beijing University of Posts and Telecommunications,Beijing,100876,China;Different-Strategy Management of Malicious Nodes in the Peer-to-Peer Network[A];[C];2009
3 Gan Zhi-gang College of Information & Electronic Engineering Zhejiang Gongshang University,Hangzhou 310018,China;Study on Trust Model in P2P[A];[C];2010
4 Lei Jun-cheng,Wu Yan-peng,and Liu Xiao-Wen Department of Information Engineering,Shaoyang University,Shaoyang,Hunan,China;A Trust Model Based on Impact Factor for P2P Networks[A];[C];2010
【Secondary Citations】
Chinese Journal Full-text Database 6 Hits
1 SUN Quan,YE Xiu qing,GU Wei kang(Institute of Information and Communication Engineering,Zhejiang University,Hangzhou 310027,China);A New Combination Rules of Evidence Theory[J];ACTA ELECTRONICA SINICA;2000-08
2 Zhao Keqin Xuan Aili;Set Pair Theory-A New Theory Method of Non -Define and Its Applications[J];Systems Engineering;1996-01
3 ZHANG Peng; WANG Guang-yuan (School of Civil Engineering & Architecture, Harbin Unly. of Civil Eng. & Arch., Harbin 150090, China);New theory of set pair[J];JOURNAL OF HARBIN UNIVERSITY OF CIVIL ENGINEERING AND ARCHITECTURE;2000-03
4 Zhu Junmao1, Yang Shoubao1, Fan Jianping2, and Chen Mingyu21(Department of Computer Science and Technology, University of Science and Technology of China, Hefei 230026)2(Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080);A Grid & P2P Trust Model Based on Recommendation Evidence Reasoning[J];Journal of Computer Research and Development;2005-05
5 DENG Ai-Lin1,2+, ZHU Yang-Yong1, SHI Bai-Le1 1(Department of Computer and Information Technology, Fudan University, Shanghai 200433, China) 2(Shanghai Telecom Technology Research Institute, Shanghai 200122, China);A Collaborative Filtering Recommendation Algorithm Based on Item Rating Prediction[J];Journal of Software;2003-09
6 DOU Wen+, WANG Huai-Min, JIA Yan, ZOU Peng (School of Computer Science, National University of Defense Technology, Changsha 410073, China);A Recommendation-Based Peer-to-Peer Trust Model[J];Journal of Software;2004-04
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved