Research of Trust Model Based on Peer-to-Peer Network Security

被引:2
|
作者
Kun, Huang [1 ]
Lu, Wang [1 ]
机构
[1] China Ship Dev & design Ctr, Wuhan, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA) | 2013年
关键词
Peer-to-Peer Network; Trust Model; Network Attack; Access Control;
D O I
10.1109/ITA.2013.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P network is dynamic, self-organized, and anonymous and has some other features. P2P network cannot guarantee that all the peers can provide reliable resources and good service. Some Peers even have malicious behavior, such as Provision of false information, spread of illegal advertising, dissemination of Trojans and worms. In order to solve these Problems, the trust mechanism is introduced to P2P network and trust model is built to establish trust relationship between Peers. The popular research directions were introduced. The major sorts and key technologies were analyzed, and the algorithms in recent research were summarized. Based on the analysis of the capabilities of the trust model, its shortages were presented. Finally, some directions for future research were discussed.
引用
收藏
页码:126 / 129
页数:4
相关论文
共 50 条
  • [21] An evaluation of the security of the Bitcoin Peer-to-Peer Network
    Tapsell, James
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1057 - 1062
  • [22] A reputation-based trust management in peer-to-peer network systems
    Stakhanova, N
    Ferrero, S
    Wong, J
    Cai, Y
    PARALLEL AND DISTRIBUTED COMPUTING SYSTEMS, 2004, : 510 - 515
  • [23] An Optimized Trust-based Search Approach in Peer-to-peer Network
    Xie, Sheng-xian
    Li, Jun-qing
    Jia, Baoxian
    Zuo, Fengchao
    2010 ETP/IITA CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (SSSE 2010), 2010, : 157 - 160
  • [24] Efficient trust model for peer-to-peer environment
    Liu, Zheng
    Zhang, Qian
    Wen, Xue-Zhi
    Dongbei Daxue Xuebao/Journal of Northeastern University, 2007, 28 (05): : 656 - 659
  • [25] Trust and reputation model in peer-to-peer networks
    Wang, Y
    Vassileva, J
    THIRD INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P2003), PROCEEDINGS, 2003, : 150 - 157
  • [26] A Hierarchical Trust Model for Peer-to-Peer Networks
    Al-Otaiby, Nehal
    Kurdi, Heba
    Al-Megren, Shiroq
    CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 59 (02): : 397 - 404
  • [27] Research of peer-to-peer network architecture
    Li, ZP
    Huang, DY
    Liu, IR
    Huang, JH
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 312 - 315
  • [28] Collaborative work model based on peer-to-peer network
    JIANG Jian-zhong a
    Journal of Chongqing University(English Edition), 2007, (02) : 130 - 134
  • [29] Research on Peer-to-Peer layered network model of spatial information
    Bi, Fang-Ming
    Cao, Tian-Jie
    Zhongguo Kuangye Daxue Xuebao/Journal of China University of Mining and Technology, 2011, 40 (03): : 499 - 504
  • [30] QoS based peer-to-peer network search model
    Lu Wei
    Meng Xianyu
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 2379 - +