[1]王海艳,岳席文,王汝传.一种角色独立的多层次信任度计算方案[J].东南大学学报(自然科学版),2011,41(6):1165-1170.[doi:10.3969/j.issn.1001-0505.2011.06.008]
 Wang Haiyan,Yue Xiwen,Wang Ruchuan.Independent role based multi-leveled trust evaluation scheme[J].Journal of Southeast University (Natural Science Edition),2011,41(6):1165-1170.[doi:10.3969/j.issn.1001-0505.2011.06.008]
点击复制

一种角色独立的多层次信任度计算方案()
分享到:

《东南大学学报(自然科学版)》[ISSN:1001-0505/CN:32-1178/N]

卷:
41
期数:
2011年第6期
页码:
1165-1170
栏目:
计算机科学与工程
出版日期:
2011-11-20

文章信息/Info

Title:
Independent role based multi-leveled trust evaluation scheme
作者:
王海艳1234岳席文1王汝传123
(1南京邮电大学计算机学院,南京210003)
(2南京邮电大学江苏省无线传感网高技术研究重点实验室,南京210003)(3南京邮电大学宽带无线通信与传感网技术教育部重点实验室,南京210003)(4东南大学计算机科学与工程学院,南京211189)
Author(s):
Wang Haiyan1234Yue Xiwen1Wang Ruchuan123
(1College of Computer Science, Nanjing University of Posts and Telecommunications, Nanjing 210003,China)
(2Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, NJUPT,
Nanjing 210003, China)
(3Key Laboratory of Broadband Wireless Communication and Sensor Network Technology of Ministry of Education, NJUPT, Nanjing 210003, China)
(4School of Computer Science and Engineering, Southeast University, Nanjing 211189, China)
关键词:
角色独立 信任度计算方案 评价因子 评价权重
Keywords:
role independent trust evaluation scheme evaluation factor evaluation weight
分类号:
TP393.08
DOI:
10.3969/j.issn.1001-0505.2011.06.008
摘要:
为设计细粒度的信任度计算方案,提高信任度计算结果的准确性,提出了角色独立的多层次信任度计算方案.通过将评价因子分为关键因子、主要因子和次要因子,实现细粒度的评价过程; 利用评价权重的概念,对各次交互赋予权值,决定每次交互对信任度的影响; 采用角色独立的策略,实现同一节点在作为申请方和提供方2种不同角色时具有不同的信任度.将这种信任度计算方法应用于搭建的P2P文件共享系统中,给出了文件共享系统评价值和评价权重的计算方法,以及交互评价与信任度计算流程.4种仿真攻击实验表明,该方法能够较好地区分恶意节点与正常交互节点,提高信任模型的抗恶意攻击能力.
Abstract:
In order to design a fine-grained trust evaluation scheme and improve the accuracy of trust evaluation result, an independent role-based multi-leveled trust evaluation scheme is presented in this paper. Evaluation factors are classified into key factors, main factors and subordinate factors so that fine-grained evaluation process is enabled. Evaluation weight is also introduced and impact of each interaction on trust evaluation is decided upon specified evaluation weight. Furthermore, for each node, trust as an applicant role and as a provider role are distinguished with independent role policy. Applying the proposed trust evaluation scheme to the establishment of P2P (peer to peer) file sharing system, calculation of evaluation value and evaluation weight is given, followed with a detailed description of the interaction and trust evaluation process. Simulation of four designed attacks demonstrates that the proposed scheme can effectively differentiate malicious nodes from normal ones and help trust model improve the ability of anti-malicious attacks.

参考文献/References:

[1] Sepandar D K,Mario T S,Hector G M. The EigenTrust algorithm for reputation management in P2P networks [C]//Proceedings of the 12th International Conference on World Wide Web. Budapest,Hungary, 2003:640-651.
[2] Fang Q,Ji Y,Wu G X. A run-length coding based dynamic trust model in P2P network [C]//2008 International Conference on Computational Intelligence and Security. Nanjing,China,2008:534-539.
[3] 常俊胜,王怀民,尹刚. DyTrust:一种P2P系统中基于时间帧的动态信任模型 [J]. 计算机学报,2006, 29(8):1301-1307.
  Chang Junsheng,Wang Huaimin,Yin Gang. DyTrust:a time-frame based dynamic trust model for P2P systems [J]. Chinese Journal of Computers,2006,29(8):1301-1307. (in Chinese)
[4] Zhou R F,Hwang K. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing [J]. IEEE Transactions on Parallel and Distributed Systems,2007,18(4):460-473.
[5] Li X,Ling L. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities [J]. IEEE Transactions on Knowledge and Data Engineering,2004,16(7):843-857.
[6] 窦文,王怀民,贾焰,等. 构造基于推荐的peer-to-peer 环境下的Trust模型 [J].软件学报,2004,15(4):571-583.
  Dou Wen,Wang Huaimin,Jia Yan,et al. A recommendation-based peer-to-peer trust model [J]. Journal of Software,2004,15(4):571-583.(in Chinese)
[7] Hu J L,Wu Q Y,Zhou B. RBTrust: a recommendation belief based distributed trust management model for P2P networks [C]//The 10th IEEE International Conference on High Performance Computing and Communications. Dalian,China,2008:950-957.
[8] 王守信,张莉,李鹤松. 一种基于云模型的主观信任评价方法[J]. 软件学报,2010,21(6):1341-1352.
  Wang Shouxin,Zhang Li,Li Hesong. Evaluation approach of subjective trust based on cloud model [J]. Journal of Software,2010,21(6):1341-1352.(in Chinese)
[9] 苗光胜,冯登国,苏璞睿. P2P信任模型中基于行为相似度的共谋团体识别模型 [J]. 通信学报,2009, 30(8):9-20.
  Miao Guangsheng,Feng Dengguo,Su Purui. Colluding clique detector based on activity similarity in P2P trust model [J]. Journal on Communications,2009,30(8):9-20.(in Chinese)
[10] 谭振华,王兴伟,程维,等. 基于多维历史向量的P2P 分布式信任评价模型[J]. 计算机学报,2010,33(9):1725-1735.
  Tan Zhenhua,Wang Xingwei,Cheng Wei,et al. A distributed trust model for peer-to-peer networks based on multi-dimension-history vector [J]. Chinese Journal of Computers,2010,33(9):1725-1735.(in Chinese)

备注/Memo

备注/Memo:
作者简介: 王海艳(1974—),女,博士,教授,wanghy@njupt.edu.cn.
基金项目: 国家自然科学基金青年科学基金资助项目(61003039)、江苏省自然科学基金资助项目(BK2011072)、江苏省博士后科研资助计划资助项目 (H1002005C)、江苏高校优势学科建设工程资助项目(yx002001).
引文格式: 王海艳,岳席文,王汝传.一种角色独立的多层次信任度计算方案[J].东南大学学报:自然科学版,2011,41(6):1165-1170. [doi:10.3969/j.issn.1001-0505.2011.06.008]
更新日期/Last Update: 2011-11-20