Research of Trust Model Based on Peer-to-Peer Network Security

被引:2
|
作者
Kun, Huang [1 ]
Lu, Wang [1 ]
机构
[1] China Ship Dev & design Ctr, Wuhan, Peoples R China
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA) | 2013年
关键词
Peer-to-Peer Network; Trust Model; Network Attack; Access Control;
D O I
10.1109/ITA.2013.35
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
P2P network is dynamic, self-organized, and anonymous and has some other features. P2P network cannot guarantee that all the peers can provide reliable resources and good service. Some Peers even have malicious behavior, such as Provision of false information, spread of illegal advertising, dissemination of Trojans and worms. In order to solve these Problems, the trust mechanism is introduced to P2P network and trust model is built to establish trust relationship between Peers. The popular research directions were introduced. The major sorts and key technologies were analyzed, and the algorithms in recent research were summarized. Based on the analysis of the capabilities of the trust model, its shortages were presented. Finally, some directions for future research were discussed.
引用
收藏
页码:126 / 129
页数:4
相关论文
共 50 条
  • [41] A reputation-based trust model for peer-to-peer eCommerce communities
    Xiong, L
    Liu, L
    IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE, 2003, : 275 - 284
  • [42] Caching Scheme Research Based on Unstructured Peer-to-Peer Network
    Jiang, Xueying
    Gao, Pengfei
    Zhao, Yuhui
    Shi, Yingjin
    INTERNATIONAL CONFERENCE ON SOLID STATE DEVICES AND MATERIALS SCIENCE, 2012, 25 : 1076 - 1083
  • [43] Research on network-warning model based on dynamic peer-to-peer overlay hierarchy
    Xu, Jia
    Feng, Dengguo
    Su, Purui
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2010, 47 (09): : 1574 - 1586
  • [44] Peer-to-Peer Network Security Issues and Analysis: Review
    Alharbi, Adel R.
    Aljaedi, Amer
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2020, 20 (11): : 74 - 88
  • [45] Correlation Trust Authentication Model for Peer-to-Peer Networks
    Cheng, Wei
    Tan, Zhenhua
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION APPLICATIONS (ICCIA 2012), 2012, : 267 - 270
  • [46] An Investigation into Peer-to-Peer Network Security Using Wireshark
    Musa, Ahmad
    Abubakar, Aliyu
    Gimba, Usman Abdul
    Rasheed, Rasheed Abubakar
    2019 15TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTER AND COMPUTATION (ICECCO), 2019,
  • [47] A Social Network Peer-to-Peer Model for Peer Clustering
    Modarresi, Amir
    Mamat, Ali
    Ibrahim, Hamidah
    Mustapha, Norwati
    INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 1572 - 1578
  • [48] Distributed peer-to-peer trust model and computer simulation
    InfoNet Lab., University of Science and Technology of China, Anhui 230027, China
    Xitong Fangzhen Xuebao, 2006, 4 (938-942):
  • [49] A Peer-to-Peer Multidimensional Trust Model for Digital Ecosystems
    Ion, Mihaela
    Danzi, Andrea
    Koshutanski, Hristo
    Telesca, Luigi
    2008 2ND IEEE INTERNATIONAL CONFERENCE ON DIGITAL ECOSYSTEMS AND TECHNOLOGIES, 2008, : 93 - +
  • [50] A probabilistic trust model for semantic peer-to-peer systems
    Nguyen, Gia-Hien
    Chatalic, Philippe
    Rousset, Marie-Christine
    ECAI 2008, PROCEEDINGS, 2008, 178 : 881 - +