Font Size: a A A

Research On Trust Evaluation And Data Dissemination Methods Based On Trust Domains For Mobile P2P Networks

Posted on:2018-01-08Degree:DoctorType:Dissertation
Country:ChinaCandidate:M J JiaFull Text:PDF
GTID:1318330542991544Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
The emergence of a large number of mobile terminal equipments,such as palmtop computers,intelligent mobile phones,mobile Internet devices,and the deployment of high-speed wireless broadband network technology and wireless broadband network,provides the physical environment support for the application of mobile P2 P technology in the mobile Internet.However,the characteristics of MP2 P networks,such as non-centralized,frequent changes in topology and limited resources of mobile nodes,bring a series of challenges to the development of MP2 P networks.First of all,the MP2 P network is a dynamic,distributed and self-organizing overlay network,so how to build overlay network topology structure with good performance,promote the cooperation and resource sharing between nodes is a basic problem to be solved in current MP2 P networks.Secondly,no centralized management makes the node trust relationship become unreliable in MP2 P networks,or a trust relationship cannot be established for a long time.Due to the characteristics of the limited resources,nodes in MP2 P networks do not respond to requests for resources for the sake of resources constraint,and even provide a large number of unreliable services.Therefore,one of the key problems in the research of MP2 P network is to establish the corresponding trust management mechanism and punish malicious nodes in MP2 P networks.Thirdly,the MP2 P network is based on the sharing of resources in the network,and the limited resources of the nodes in the MP2 P network makes the nodes do not respond to the request of the resource.Therefore,in order to achieve efficient resource sharing between nodes and improve the performance of networks,it is necessary to design a reasonable data dissemination method to promote the healthy development of MP2 P networks.This paper takes the construction of MP2 P overlay network topology and credible data method as the research object,uses fuzzy theory,clustering analysis,theory of infectious disease model as a means to construct an overlay network based on a trusted domain hierarchy.This paper proposes a novel method for data dissemination,which provides a reference for the improvement and development of MP2 P network.The main research contents of this paper are as follows:Firstly,in the aspect of the construction of MP2 P overlay network,this paper proposes a hierarchical management overlay network HONTD(Hierarchical Overlay Based on TrustDomain)based on trusted domain.The layers are divided into different management domains,and the nodes are selected based on the matching of interest.The domain is divided into different groups.Super nodes are selected based on trust value in domain group.Common mobile nodes in the domain group are distributed structure,and form a centralized structure around super node.HONTD has good scalability,flexibility,autonomy and reliability,reducing the difficulty of management.HONTD can effectively solve the problem of resource download rate decrease due to the high mobility of nodes in MP2 P networks,and is suitable for MP2 P networks with the characteristics of high mobility,large network.Secondly,in order to solve the problem that the MP2 P network can not establish a long-term and effective trust relationship between nodes,the trust degree of nodes is evaluated to establish a reliable connection between nodes.Trust evaluation uses fuzzy evaluation method.The direct trust and indirect trust between nodes,the residual energy of nodes and the activity degree of nodes are analyzed,and the weights of four key factors are determined by a weighted average method.The experimental results show that compared with the existing trust mechanisms,this scheme can effectively improve the packet transmission success rate between the nodes in MP2 P networks,which reduces the average end-to-end delay and network overload rate,thus improving the overall performance of networks.Thirdly,in order to effectively punish nodes in networks for the malicious behaviors,to guide them to take positive and friendly attitude to trade,promote cooperation between nodes,a behavior detection method is proposed to evaluate trust degrees among nodes.The acquisition method based on node's history behavior,through the analysis of the collected information,access to historical node behaviors,evaluates the consistency,degree of satisfaction and the inertia of its behavior.Node trust is evaluated and updated by the fusion of direct trust and recommendation trust.The experimental results show that the proposed method can effectively suppress the malicious behavior of nodes and guide them to actively participate in the network transactions.Finally,in order to achieve efficient resource sharing between nodes,improve the network performance,the data dissemination method of infectious disease model based on the trusted domain is proposed.Combining infectious disease model and single feedback path,the method establishes resources sharing group between the nodes in the same domain group,to effectively control of the target node number,reduce the transmission information floodingoccupied by a large number of the channel,thereby reducing the information redundancy in the network.However,the use of one-way feedback path improves the distribution efficiency in case of small target node number.The experimental results show that this method greatly improves the MP2 P response to cyber source accuracy and resource transmission success rate,and can effectively reduce the increase of network traffic and the network delay due to the increase in the number of nodes so that the MP2 P network resource utilization becomes fast and efficient,which is more suitable for the requirements of users for resource applications.
Keywords/Search Tags:MP2P network, Trust domain, Overlay network, Trust evaluation, Data dissemination
PDF Full Text Request
Related items