Font Size: a A A

Research And Implementation, Based On The Trust Model Of P2p Networks

Posted on:2009-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:H LiangFull Text:PDF
GTID:2208360275983141Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
In the P2P network appears kinds of attacks, which has become the main factors of threatening the network normal operation. And this is all because, some malicious nodes exist in the P2P network that lead to malicious behavior. How to distinguish the malicious nodes in the P2P network, restrain and stop the malicious behavior caused by nodes becomes a hot spot at present studies. Among this, researchers pay more attentions to the research of node creditworthiness. Because whether both sides trust each other is a premise for their transaction. Creditworthiness may be used to express whether the node behavior is suited to participate in this network community.This article proposes one trust model base on the P2P network. By calculating the prestige value of a node, we can estimate whether this node will possibly have malicious operation behavior in the future transaction. In this trust model, we reasonably used a number of parameters to imitate the real transaction in the network community, analyzed the possible security problems from a number of ways in the P2P network, and proposed the effective methods of calculating the prestige value.
Keywords/Search Tags:P2P network, Trust, Trust Model, Credibility, Malicious Nodes
PDF Full Text Request
Related items