Font Size: a A A

Research On Trust Model Of MP2P Network Environment

Posted on:2020-04-29Degree:MasterType:Thesis
Country:ChinaCandidate:Y ZhaoFull Text:PDF
GTID:2428330623965260Subject:Computer technology
Abstract/Summary:PDF Full Text Request
In order to effectively promote the sharing of resources on the network,many technologies emerged during the rapid development of the Internet.Among them,P2 P technology is one of the important technologies.Over 70% of the entire network resource flow is achieved through this technology.With the integration of mobile Internet and Internet,with the rapid development of 4G communication technology,P2 P network has also entered a new era of MP2P(Mobile P2P)network.With the rapid development of mobile communication technologies and mobile terminal devices,the application of MP2 P technology has become more and more extensive,and it has a promising future for resource sharing and file download.In the process of development,it has many advantages,but influenced by its own network node autonomy,it often makes the malicious node make a chance to create a situation that people do not want to see,such as malicious attacks.In order to avoid this undesirable situation,a trust model is needed.At the present stage,most of the trust models in MP2 P have evolved on the basis of MP2 P trust models,but MP2 P networks have many special properties that P2 P networks do not have,such as strong dynamic,strong node mobility,and limited terminal resources,and this model often does not take into account these differences,Therefore,the existing models can not be well applied to MP2 P networks.In this paper,based on the characteristics of MP2 P networks,based on the in-depth study of related theoretical knowledge,a trust model based on similar behaviors is proposed.Because in the MP2 P network,nodes can enter or leave the network at random,this behavior is easy to cause information loss.Under this unfavorable situation,the model proposed in this section can use the similarity to make a correct evaluation of the remaining nodes;After obtaining information from nodes,in order to ensure the accuracy of calculating the trust value,the number of transactions between the synthesized nodes instead of the comprehensive recommendation information is adopted.Moreover,the simulation experiment is carried out to analyze the results of the simulation experiment.The analysis results show that the SBTM model has a higher download success rate and can effectively resist the attack of malicious nodes.
Keywords/Search Tags:MP2P, Trust model, Similar behavior trust, Peersim simulation
PDF Full Text Request
Related items