CN104038539B - A kind of dynamic mobile P 2 P trust management model system and method - Google Patents

A kind of dynamic mobile P 2 P trust management model system and method Download PDF

Info

Publication number
CN104038539B
CN104038539B CN201410240774.1A CN201410240774A CN104038539B CN 104038539 B CN104038539 B CN 104038539B CN 201410240774 A CN201410240774 A CN 201410240774A CN 104038539 B CN104038539 B CN 104038539B
Authority
CN
China
Prior art keywords
node
mrow
value
trust
trust value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410240774.1A
Other languages
Chinese (zh)
Other versions
CN104038539A (en
Inventor
王玉峰
朱振武
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Zhongneng Huihong Economic Development Co.,Ltd.
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201410240774.1A priority Critical patent/CN104038539B/en
Publication of CN104038539A publication Critical patent/CN104038539A/en
Application granted granted Critical
Publication of CN104038539B publication Critical patent/CN104038539B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of dynamic mobile P 2 P trust management model system, each node of the system is calculated by local trust value and memory module, indirect reputation value metric module, trade management module are constituted;Local trust value computing module and memory module are that the historical transactional information of integration node calculates the global trust value of egress, and storage had the Transaction Information and trust value of the node of transaction with this node, trade management module is given the trust value of node;Indirect reputation value metric module is to collect the trust value of neighbor node feedback, validation verification is carried out to the trust value fed back to received, exclude incredible value of feedback, selectively converge after calculate node reputation value and the reputation value of the node calculated is sent to trade management module;Trade management module is to select transaction node according to the height of node reputation value or trust value, performs transaction, and the information of the node of this transaction, which is sent to trust value computing, memory module, to be stored.

Description

A kind of dynamic mobile P 2 P trust management model system and method
Technical field
The present invention relates to a kind of dynamic mobile P 2 P trust management model system and method, belong to wireless communication skill Art field.
Background technology
Peer-to-peer network is (referred to as:P2P successful application) causes numerous researchers to begin to focus on mobile computing field.And with That the storage of intelligent mobile terminal, computing capability constantly strengthen, battery capacity constantly expands, resource-sharing, community network etc. exist Line P2P application extensions more and more hold out broad prospects to wireless domain.
But the mobility of mobile P 2 P network interior joint, anonymity, the finiteness of resource, node are dynamically added and left So that there is a series of unsafe factor in network, such as:Service quality is unreliable, malicious node may provide virus document, False file, selfish node may be not involved in the interaction of network.These factors can make to lack trust between node, hinder mobile P 2 P The growth of technology.And the present invention the problem of can solve above well.
The content of the invention
Present invention aims at a kind of dynamic mobile P 2 P trust management model system and method are provided, this method is solved The problem of trusting relationship between node is set up under mobile P 2 P network, and solve the trusting relationship between node with the time The problem of change and node provide spurious feedback.
The technical scheme adopted by the invention to solve the technical problem is that:A kind of dynamic mobile P 2 P trust management model System is (referred to as:DPTM), each node of the system is by local trust value computing module, memory module, indirect reputation value degree Measure module, trade management module composition.Local trust value computing module and memory module are the historical transactional informations of integration node, The global trust value of egress is calculated, storage had the Transaction Information and trust value of the node of transaction with this node, node Trust value give trade management module.Indirect reputation value metric module is to collect the trust value of neighbor node feedback, to receiving The trust value that feeds back to carry out validation verification, exclude incredible value of feedback, the name of calculate node after selectively converging The reputation value of the node calculated is simultaneously sent to trade management module by reputation value.The function of trade management module is according to node fame The height of value or trust value selects transaction node, performs transaction, the information of the node of this transaction be sent to trust value computing, Memory module is stored.
System of the present invention is mobile P 2 P trust management model system, will be whole in the local trust value of calculate node The individual time is divided into several transaction intervals, in the trust value of the interval interior calculate node in real time of each transaction, then by each transaction Trust value in interval is weighted, and finally gives the global trust value of node.The trust value so calculated can more reflect section The current behavior of point.On this basis, the trust value of neighbor node feedback is collected, spurious feedback is excluded, finally calculates section The reputation value of point.
The node of system of the present invention more believes the trust value calculated by the direct dealing experience of oneself, rather than The reputation value calculated by iterative manner.Because substantial amounts of flooding query messages can be produced in an iterative process, and node Spoofing may be received.Trust and fame is measured with as node is credible, when requesting node knows service node During trust value just not by way of the whole network iteration calculate node reputation value, but trust value is used as to the credible amount of node Degree.
The present invention also provides a kind of execution method of dynamic mobile P 2 P trust management model system, and this method is included such as Lower step:
Step 1:File request node sends the trust value inquiry request to service node, if service node is neighbours' section Point is then calculated to local trust value and memory module inquires about trust value, and the trust value then is sent into trade management module;
Step 2:Otherwise, indirect reputation value metric module is inquired about, i.e., neighbor node is collected by indirect reputation value metric module The trust value to service section of feedback, weeds out spurious feedback, then calculates reputation value of the requesting node to service node.Most The reputation value is sent to trade management module afterwards;
Step 3:Trust value and reputation value that trade management module is relatively received, selection have maximum local trust value or The node of indirect reputation value is traded.After the completion of transaction will transaction success or failure situation be sent to local trust value calculate and Memory module, by trust value of the module computation requests node to service node.
Beneficial effect:
1st, feature of the present invention with dynamic and personalization.
2nd, the present invention can suppress malicious node some node is excessively exaggerated or slandered.
3rd, the present invention preferably solves the problems, such as strategy attack and calumny attack, improves the file in mobile P 2 P network Download into
Power.
Brief description of the drawings
Fig. 1 is system structure diagram of the invention.
Fig. 2 is execution method flow diagram of the invention.
Embodiment
The invention is described in further detail below in conjunction with Figure of description.
As shown in figure 1, the present invention provides a kind of dynamic mobile P 2 P trust management model system (referred to as:DPTM), this is Each node of system is calculated by local trust value and memory module, indirect reputation value metric module, trade management module are constituted. Local trust value computing module and memory module are the historical transactional informations of integration node, calculate the global trust value of egress, Storage had the Transaction Information and trust value of the node of transaction with this node, and trade management mould is given the trust value of node Block.Indirect reputation value metric module is to collect the trust value of neighbor node feedback, is had to the trust value fed back to received The checking of effect property, excludes incredible value of feedback, the reputation value of calculate node and the node calculated after selectively converging Reputation value is sent to trade management module.The function of trade management module is selected according to the height of node reputation value or trust value Transaction node, performs transaction, and the information of the node of this transaction, which is sent to trust value computing, memory module, to be stored.
System of the present invention is mobile P 2 P trust management model system, will be whole in the local trust value of calculate node The individual time is divided into several transaction intervals, in the trust value of the interval interior calculate node in real time of each transaction, then by each transaction Trust value in interval is weighted, and finally gives the global trust value of node.The trust value so calculated can more reflect section The current behavior of point.On this basis, the trust value of neighbor node feedback is collected, spurious feedback is excluded, finally calculates section The reputation value of point.
The node of the system more believes the trust value calculated by the direct dealing experience of oneself, rather than by repeatedly The reputation value calculated for mode.Because substantial amounts of flooding query messages can be produced in an iterative process, and node may Receive spoofing.Trust and fame is measured with as node is credible, when requesting node knows the trust value of service node When just not by way of the whole network iteration calculate node reputation value, but trust value being measured as node is credible.
" the performing the trust value for merchandising and updating transaction node " of the present invention and " search for the indirect fame of simultaneously calculate node The specific implementation process of value " is as follows:
(1) trust value for merchandising and updating transaction node is performed;
In the trust value of calculate node, influence of the interval transaction of different transaction to node trust value is distinguished.Away from current The weight that time nearer transaction is endowed is higher, and the transaction of current time of adjusting the distance farther out carries out appropriate decay.So both The current behavioral aspect of node can be embodied can encourage node to be continuously kept good behavior in a network again.Therefore, will be whole Period is divided into several transaction intervals, and t is used respectively1,t2,t3......tnRepresent.N is bigger to be represented closer to current transaction Time.The interval length of transaction can be divided according to the trading situation between node.If the transaction between two nodes is non- Often frequently, then the interval length of transaction can divide shorter.Otherwise merchandise interval length can just divide greatly one A bit.Assuming that in transaction interval tkIt is interior, node i and node j Successful Transactions suc times, failed transactions fail times, then in tkThis Individual transaction interval interior nodes i is to node j trust value:
In order to accommodate the dynamic of trust, this method is the trust value calculated in different transaction intervals by formula (1) The different weight of distribution.It is bigger closer to the allocated weight of the trust value of current time, it is otherwise relatively small.It is specific and Speech, system of the present invention is that the distribution of weight is performed using attenuation function.By weighting the trust value in each transaction interval To obtain global trust value of the node i to node j.I.e. node i is to node j global trust value:
The implication of each parameter is as follows in formula (2):
tk:K-th of transaction is interval.
(j):In trust values of k-th of transaction interval interior nodes i to node j.
Wk:In tkIn individual transaction is interval, weight of the node i to node j trust value.
ρn+1-k:For the weights of the interval trust value distribution of each transaction.ρ(0<ρ<1) value can neatly be determined by system.K is K-th of transaction is interval;N is the interval number of total transaction.Weights WkThe condition must being fulfilled for is:0<Wk<1 and Wn>Wn-1>…>W1
(2) the indirect reputation value of search and calculate node;
Node j reputation value is a kind of indirect trust value of overall importance, is pair for the neighbor node feedback that node i is received The set of node j trust value.It represents all nodes for having transaction with j in network and the subjectivity of node j behavior is seen Method.Node i before node j transaction with needing decision node j credibility.This both can also rely on fame by trust value Value.Just measured when resource request node possesses the trust value to contributed nodes in this, as node is credible, without Computing resource provides the reputation value of node again.Otherwise will calculate node reputation value.
But reputation value is calculated by collecting the feedback of nodes, so being excluded when calculating reputation value Spurious feedback.Therefore, the measure that this method is taken is the similitude detection for carrying out node feeding back information, difference is excluded very big Feedback information, i.e., the consistent trust value of similarity-rough set fed back only with trusted node.
The detecting step of system of the present invention comprises the following steps:
After node receives the trust value of neighbor node feedback, the flat of the trust value that receives is calculated according to formula (3) first Average, then calculates the standard deviation of the trust value received according to formula (4).Finally, trust value and letter are calculated according to formula (5) Appoint the departure degree of the average value of value.If the trust value of some node, formula (5) formula are excessively calumniated or exaggerated to malicious node It will set up.The purpose of formula (5) is that verification individual node is whole to all neighbor nodes in the trust value and network of some node Departure degree between the trust value that body is provided.The standard of the trust value provided if the deviation from degree beyond all neighbor nodes Deviation, then it is assumed that the trust value is excessively exaggerated or slandered, is spurious feedback and is abandoned in the reputation value of calculate node The value of feedback.After all incredible feedback trust values received have been rejected, using formula (6) come the fame of calculate node Value.Institute can suppress malicious node and some node is excessively exaggerated or slandered in this way.
The implication of symbol is as follows in above-mentioned formula (3), formula (4), formula (5):
Tk(j):Trust values of the neighbor node k to offer node j
Ti(k):Trust value of the resource request node i to neighbor node k
The average value of node j trust value is provided
Sj:The standard deviation of node j trust values is provided
n:The number of neighbor node of the trust value of node i more than 0.5.
As n=0 or 1, similitude detection is no longer carried out, directly R is calculated with formula (6)ij
Reputation value R of the node i to node jijComputational methods be:
Wherein RkjRepresent reputation values of the node k to node j.
As shown in Fig. 2 the present invention provides a kind of execution method of dynamic mobile P 2 P trust management model system, the party Method comprises the following steps:
Step 1:File request node sends the trust value inquiry request to service node.
Step 2:Trust value is inquired about to trust value computing, memory module if service node is neighbor node, then will The trust value is sent to trade management module.
Step 3:Otherwise, inquiry fame value metric module is to clothes by reputation value metric module collection neighbor node feedback The trust value of business section, weeds out spurious feedback, then calculates reputation value of the requesting node to service node.Finally by the fame Value is sent to trade management module.
Step 4:Trust value and reputation value that trade management module is relatively received, selection have maximum trust value or fame The node of value is traded.Transaction success or failure situation is sent to trust value computing, memory module after the completion of transaction.
Step 5:Trust value computing, memory module store transaction trust simultaneously trust of the computation requests node to service node Value.

Claims (6)

1. a kind of dynamic mobile P 2 P trust management model system, it is characterised in that:Each node of the system is by part Trust value computing and memory module, indirect reputation value metric module, trade management module composition;Local trust value is calculated and stored Module is that the historical transactional information of integration node calculates the global trust value of egress, and storage had the node of transaction with this node Transaction Information and trust value, give trade management module the trust value of node;Indirect reputation value metric module is to collect The trust value of neighbor node feedback, carries out validation verification to the trust value fed back to received, excludes incredible value of feedback, Selectively converge after calculate node reputation value and the reputation value of the node calculated is sent to trade management module;Transaction pipe It is to select transaction node according to the height of node reputation value or trust value to manage module, performs transaction, the node of this transaction Information be sent to trust value computing, memory module storage, the system includes:
(1) trust value for merchandising and updating transaction node is performed;
In the trust value of calculate node, influence of the interval transaction of different transaction to node trust value is distinguished;Away from current time The weight that nearer transaction is endowed is higher, and the transaction of current time of adjusting the distance farther out carries out appropriate decay;By the whole time Section is divided into several transaction intervals, and t is used respectively1,t2,t3......tnRepresent;The bigger expressions of n are closer to current exchange hour; The interval length of transaction is divided according to the trading situation between node, if the transaction between two nodes is very frequent, that The interval length of transaction can divide shorter, and the length in interval of otherwise merchandising just can divide larger;Assuming that Merchandise interval tkIt is interior, node i and node j Successful Transactions suc times, failed transactions fail times, then in tkThis transaction is interval Interior nodes i is to node j trust value:
<mrow> <msup> <msub> <mi>T</mi> <mi>i</mi> </msub> <msub> <mi>t</mi> <mi>k</mi> </msub> </msup> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> <mo>=</mo> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <mfrac> <mrow> <mi>s</mi> <mi>u</mi> <mi>c</mi> </mrow> <mrow> <mi>s</mi> <mi>u</mi> <mi>c</mi> <mo>+</mo> <mi>f</mi> <mi>a</mi> <mi>i</mi> <mi>l</mi> </mrow> </mfrac> <mo>,</mo> <mi>s</mi> <mi>u</mi> <mi>c</mi> <mo>+</mo> <mi>f</mi> <mi>a</mi> <mi>i</mi> <mi>l</mi> <mo>&amp;NotEqual;</mo> <mn>0</mn> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mn>0.5</mn> <mo>,</mo> <mi>s</mi> <mi>u</mi> <mi>c</mi> <mo>+</mo> <mi>f</mi> <mi>a</mi> <mi>i</mi> <mi>l</mi> <mo>=</mo> <mn>0</mn> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow>
Different weights are distributed for the interval interior trust value calculated by formula (1) of different transaction, closer to the current time Trust value it is allocated weight it is bigger, it is otherwise relatively small;The system performs the distribution of weight using attenuation function, Global trust value of the node i to node j is obtained by weighting the trust value in each transaction interval, i.e., node i is to the whole of node j Body trust value is:
<mrow> <mtable> <mtr> <mtd> <mrow> <msub> <mi>T</mi> <mi>i</mi> </msub> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> <mo>=</mo> <msub> <mi>W</mi> <mn>1</mn> </msub> <mo>*</mo> <msubsup> <mi>T</mi> <mi>i</mi> <msub> <mi>t</mi> <mn>1</mn> </msub> </msubsup> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> <mo>+</mo> <msub> <mi>W</mi> <mn>2</mn> </msub> <mo>*</mo> <msubsup> <mi>T</mi> <mi>i</mi> <msub> <mi>t</mi> <mn>2</mn> </msub> </msubsup> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> <mo>+</mo> <mn>...</mn> <mo>+</mo> <msub> <mi>W</mi> <mi>n</mi> </msub> <mo>*</mo> <msubsup> <mi>T</mi> <mi>i</mi> <msub> <mi>t</mi> <mi>n</mi> </msub> </msubsup> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>=</mo> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>k</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>n</mi> </munderover> <msup> <mi>&amp;rho;</mi> <mrow> <mi>n</mi> <mo>+</mo> <mn>1</mn> <mo>-</mo> <mi>k</mi> </mrow> </msup> <mo>*</mo> <msubsup> <mi>T</mi> <mi>i</mi> <msub> <mi>t</mi> <mi>k</mi> </msub> </msubsup> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> <mo>,</mo> <mi>n</mi> <mo>&gt;</mo> <mn>1</mn> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msubsup> <mi>T</mi> <mi>i</mi> <msub> <mi>t</mi> <mn>1</mn> </msub> </msubsup> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> <mo>,</mo> <mi>n</mi> <mo>=</mo> <mn>1</mn> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mn>0.5</mn> <mo>,</mo> <mi>o</mi> <mi>t</mi> <mi>h</mi> <mi>e</mi> <mi>r</mi> <mi>s</mi> </mrow> </mtd> </mtr> </mtable> </mfenced> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </mrow>
The implication of each parameter is as follows in formula (2):
tk:K-th of transaction is interval;
In trust values of k-th of transaction interval interior nodes i to node j;
Wk:In tkIn individual transaction is interval, weight of the node i to node j trust value;
ρn+1-k:For the weights of the interval trust value distribution of each transaction, ρ (0<ρ<1) value can neatly be determined that k is k-th by system Transaction is interval, and n is the interval number of total transaction, weights WkThe condition must being fulfilled for is:0<Wk<1 and Wn>Wn-1>…>W1
(2) the indirect reputation value of search and calculate node;
Node j reputation value is a kind of indirect trust value of overall importance, be node i receive neighbor node feedback to node The set of j trust value, it represents in network all nodes for having transaction with j to the subjective opinion of node j behavior, section Decision node j credibility is needed before point i and node j transaction;Both reputation value was also depended on by trust value;When resource request section Point is just measured when possessing the trust value to contributed nodes in this, as node is credible, and no longer computing resource provides section The reputation value of point;
Reputation value is calculated by collecting the feedback of nodes, so being excluded when calculating reputation value false anti- Feedback;Therefore, what the system took is the similitude detection for carrying out node feeding back information, difference very big feedback letter is excluded Breath, only with the consistent trust value of the similarity-rough set of trusted node feedback.
2. a kind of dynamic mobile P 2 P trust management model system according to claim 1, it is characterised in that:The system The whole time is divided into several transaction intervals by system in the local trust value of calculate node, real in each transaction is interval When calculate node trust value, then by it is each transaction interval in trust value be weighted, finally give the global trust of node Value;The trust value of neighbor node feedback is collected, spurious feedback is excluded, the final reputation value for calculating egress.
3. a kind of dynamic mobile P 2 P trust management model system according to claim 1, it is characterised in that:The system The trust value that the node of system is calculated by the direct dealing experience of oneself;Trust and fame is with as the credible amount of node Degree, when requesting node knows the trust value of service node just not by way of the whole network iteration calculate node reputation value, and It is to measure trust value as node is credible.
4. a kind of dynamic mobile P 2 P trust management model system according to claim 1, it is characterised in that:The system Unite as mobile P 2 P trust management model system.
5. a kind of dynamic mobile P 2 P trust management model system according to claim 1, it is characterised in that the system The execution method of system comprises the following steps:
Step 1:File request node sends the trust value inquiry request to service node, if service node is neighbor node Calculated to local trust value and memory module inquires about trust value, the trust value is then sent to trade management module;
Step 2:Otherwise, indirect reputation value metric module is inquired about, neighbor node feedback is collected by indirect reputation value metric module To the trust value of service section, spurious feedback is weeded out, reputation value of the requesting node to service node is then calculated, finally should Reputation value is sent to trade management module;
Step 3:Trust value and reputation value that trade management module is relatively received, selection have maximum local trust value or indirect The node of reputation value is traded;Transaction success or failure situation is sent into local trust value after the completion of transaction to calculate and store Module, by trust value of the module computation requests node to service node.
6. a kind of detection method of dynamic mobile P 2 P trust management model system, it is characterised in that methods described includes as follows Step:
After node receives the trust value of neighbor node feedback, the average value of the trust value received is calculated according to formula (3) first, Then the standard deviation of the trust value received is calculated according to formula (4);Finally, trust value and trust value are calculated according to formula (5) Average value departure degree;If the trust value of some node is excessively calumniated or exaggerated to malicious node, formula (5) into It is vertical;The effect of formula (5) is that verification individual node is integrally provided to all neighbor nodes in the trust value and network of some node Trust value between departure degree;The standard deviation of the trust value provided if the deviation from degree beyond all neighbor nodes, Then think that the trust value is excessively exaggerated or slandered, be spurious feedback and abandon the feedback in the reputation value of calculate node Value;After all incredible feedback trust values received have been rejected, using formula (6) come the reputation value of calculate node;
<mrow> <msub> <mi>S</mi> <mi>j</mi> </msub> <mo>=</mo> <msqrt> <mfrac> <mrow> <munderover> <mo>&amp;Sigma;</mo> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>n</mi> </munderover> <msup> <mrow> <mo>(</mo> <msub> <mi>T</mi> <mi>k</mi> </msub> <mo>(</mo> <mi>j</mi> <mo>)</mo> <mo>-</mo> <msub> <mover> <mi>T</mi> <mo>&amp;OverBar;</mo> </mover> <mi>j</mi> </msub> <mo>)</mo> </mrow> <mn>2</mn> </msup> </mrow> <mrow> <mi>n</mi> <mo>-</mo> <mn>1</mn> </mrow> </mfrac> </msqrt> <mo>,</mo> <mi>n</mi> <mo>&gt;</mo> <mn>1</mn> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4</mn> <mo>)</mo> </mrow> </mrow>
<mrow> <mfrac> <mrow> <mo>|</mo> <msub> <mover> <mi>T</mi> <mo>&amp;OverBar;</mo> </mover> <mi>j</mi> </msub> <mo>-</mo> <msub> <mi>T</mi> <mi>k</mi> </msub> <mrow> <mo>(</mo> <mi>j</mi> <mo>)</mo> </mrow> <mo>|</mo> </mrow> <msub> <mi>S</mi> <mi>j</mi> </msub> </mfrac> <mo>&gt;</mo> <mn>1</mn> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mo>)</mo> </mrow> </mrow>
The implication of symbol is as follows in above-mentioned formula (3), formula (4), formula (5):
Tk(j):Trust values of the neighbor node k to offer node j;
Ti(k):Trust value of the resource request node i to neighbor node k;
The average value of node j trust value is provided;
Sj:The standard deviation of node j trust values is provided;
n:The number of neighbor node of the trust value of node i more than 0.5;
As n=0 or 1, similitude detection is no longer carried out, directly R is calculated with formula (6)ij
Reputation value R of the node i to node jijComputational methods be:
Wherein RkjRepresent reputation values of the node k to node j.
CN201410240774.1A 2014-05-30 2014-05-30 A kind of dynamic mobile P 2 P trust management model system and method Active CN104038539B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410240774.1A CN104038539B (en) 2014-05-30 2014-05-30 A kind of dynamic mobile P 2 P trust management model system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410240774.1A CN104038539B (en) 2014-05-30 2014-05-30 A kind of dynamic mobile P 2 P trust management model system and method

Publications (2)

Publication Number Publication Date
CN104038539A CN104038539A (en) 2014-09-10
CN104038539B true CN104038539B (en) 2017-09-29

Family

ID=51469127

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410240774.1A Active CN104038539B (en) 2014-05-30 2014-05-30 A kind of dynamic mobile P 2 P trust management model system and method

Country Status (1)

Country Link
CN (1) CN104038539B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243592A (en) * 2014-09-24 2014-12-24 岑黎光 P2P trust mechanism and management method thereof
CN108833493A (en) * 2018-05-24 2018-11-16 浙江工商大学 Selection method, system and the storage medium of best transaction node in peer-to-peer network set

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217396A (en) * 2007-12-29 2008-07-09 华中科技大学 An Ad hoc network invasion detecting method and system based on trust model
CN101404592A (en) * 2008-11-14 2009-04-08 西安交通大学 Total trust degree decision method based on history evidence window
CN101714976A (en) * 2009-10-15 2010-05-26 浙江大学 Method for resisting malicious behaviors of nodes in P2P network

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217396A (en) * 2007-12-29 2008-07-09 华中科技大学 An Ad hoc network invasion detecting method and system based on trust model
CN101404592A (en) * 2008-11-14 2009-04-08 西安交通大学 Total trust degree decision method based on history evidence window
CN101714976A (en) * 2009-10-15 2010-05-26 浙江大学 Method for resisting malicious behaviors of nodes in P2P network

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于信任和名誉的P2P安全模型;索瑾;《中国优秀硕博学位论文全文数据库(硕士)信息科技辑》;20070615;第29-36页 *
面向P2P电子商务的信任管理模型研究;崔萌;《中国优秀硕博学位论文全文数据库(硕士)信息科技辑》;20120915;第31-42页 *

Also Published As

Publication number Publication date
CN104038539A (en) 2014-09-10

Similar Documents

Publication Publication Date Title
Kim et al. Blockchain-based node-aware dynamic weighting methods for improving federated learning performance
Lodhi et al. Using peeringDB to understand the peering ecosystem
WO2018049713A1 (en) Method and system for data management based on blockchain consistency algorithm
CN105207821B (en) A kind of network synthesis performance estimating method of service-oriented
CN104301305B (en) Interest bag is forwarded under information centre&#39;s network method and forwarding terminal
CN110062037B (en) Content distribution method and device
Fan et al. Behavior-based reputation management in P2P file-sharing networks
CN104486236B (en) The method and routing device of load balancing
CN103152436A (en) P2P (peer-to-peer) internet trust cloud model computing method based on interest group
CN104009993B (en) A kind of method for evaluating trust based on blur filter
CN103249062A (en) Repeated game-based converged ubiquitous network multi-terminal cooperation trust mechanism
CN104038539B (en) A kind of dynamic mobile P 2 P trust management model system and method
CN102571983B (en) Method for establishing peer-to-peer network storage data trust model
Suryani et al. ConTrust: a trust model to enhance the privacy in internet of things
CN102377826B (en) Method for optimal placement of unpopular resource indexes in peer-to-peer network
CN103812696B (en) A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm
CN102006305A (en) Method for suppressing malicious behavior based on distributed recommendable reputation in peer-to-peer (P2P) network
CN112069416B (en) Cross-social network user identity recognition method based on community discovery
CN108966210A (en) A kind of design method of wireless network Trust Valuation Model
CN103491128B (en) The optimization laying method of popular Resource Replica in a kind of peer-to-peer network
Wang et al. The comparison of distributed P2P trust models based on quantitative parameters in the file downloading scenarios
CN105959368A (en) Social cloud hot spot resource prediction and disposition method
Liu et al. LCT: A lightweight cross-domain trust model for the mobile distributed environment
CN114417184A (en) Seed node screening method, device, equipment and storage medium
Pouryazdan et al. On coalitional and non-coalitional games in the design of user incentives for dependable mobile crowdsensing services

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20211231

Address after: 215163 300 Qingcheng Shan Road, hi tech Zone, Suzhou, Jiangsu

Patentee after: Jiangsu Zhongneng Huihong Economic Development Co.,Ltd.

Address before: 210023 9 Wen Yuan Road, Ya Dong new town, Nanjing, Jiangsu.

Patentee before: NANJING University OF POSTS AND TELECOMMUNICATIONS

TR01 Transfer of patent right