Font Size: a A A

Design And Implementation Of A Trust Management Model Based On Recommended Trust Iteration In P2P Environment

Posted on:2016-08-26Degree:MasterType:Thesis
Country:ChinaCandidate:J ZhouFull Text:PDF
GTID:2358330464463545Subject:Engineering
Abstract/Summary:PDF Full Text Request
Trust management has been widespread concern in the field of security research since the concept appeared. For different professional fields, the trust management model is also increasingly perfect. However, in the current P2 P environment, the process of option transactions is facing many problems. First of all, both parties lack sufficient trust to support transaction smoothly, meanwhile, the trust itself between nodes also have temporal correlation and conditions of transitivity. Next, primary node is too blind for the choice of trust of the target node. It is the problem that how to select target node more comprehensive and reality to exchange resource and information from the network urgently to be solved in the field of the trust management.In this paper, we first introduce the trust management background and meaning, the development of network scale, the popularization of internet and the demand of users for network security on the basis of the environment of the P2 P networks. After that, we detailed summarize the concepts of P2 P network and trust management. We Sort out the various relationships in the process of constructing trust management model through detailed analyze and interpret the related concepts about trust management. Consequently, we design two trust management models based on recommendation trust iteration and voting agreement respectively. Which improve the success rate of interaction between nodes in the field of trust management and improve the ability of the recognition of malicious nodes.In the paper, we receive inspiration from Dou Wen that design a trust management model based on recommended in the P2 P networks and propose a new trust management model based on trust iterative through introducing historical transaction success rate to affect credibility in the process of the computing of the directly credibility. Which form a more efficient comprehensive trust evaluation mechanism and can distinguish reliability and credibility of nodes. That reflect dynamic of the trust worthy and subjective uncertainty sufficiently. The experimental results of the simulations show that the adaptability and the accuracy of nodes interaction have been much improved compared with other results in the P2 P network environment. Nodes always make wrong choices under the affection of malicious nodes when making the interaction choice decision, since they lack of corresponding identification and punishment mechanism. In order to solve the problem, in the paper, we add transaction cheat punishment mechanism in the computing process of directly credibility and punish the nodes that provide false information or make false evaluation. At the same time, according to voting mechanism, primary nodes send vote request to neighborswhen selecting interaction node for the choice of trust. All neighbor nodes that have the interaction with this target node will vote for it. The primary node makes the decision whether establish interaction with the target node according to the results of the neighbors. Hence, the reliability of indirect credibility will be improved greatly.
Keywords/Search Tags:Trust management, P2P network, Recommendation trust iteration, The optimal recommended chain, Voting mechanism
PDF Full Text Request
Related items