北京邮电大学学报

  • EI核心期刊

北京邮电大学学报 ›› 2010, Vol. 33 ›› Issue (1): 33-37.doi: 10.13190/jbupt.201001.33.219

• 论文 • 上一篇    下一篇

构建风险敏感的对等网安全信任模型

陆峰;郑康锋;钮心忻;杨义先   

  1. (1. 北京邮电大学 网络与交换技术国家重点实验室, 北京 100876; 2. 北京邮电大学 网络与信息攻防技术教育部重点实验室, 北京 100876; 3. 北京邮电大学 灾备技术国家工程实验室, 北京 100876)
  • 收稿日期:2009-09-08 修回日期:2009-10-28 出版日期:2010-02-28 发布日期:2010-02-28
  • 通讯作者: 陆峰

Construct a Risk-Aware Peer-to-Peer Security Trust Model

LU Feng;ZHENG Kang-feng;NIU Xin-xin;YANG Yi-xian   

  1. (1.State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China; 2.Key Laboratory of Network and Information Attack and Defence Technology, Ministry of Education, Beijing University of Posts and Telecommunications, Beijing 100876, China; 3.National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China)
  • Received:2009-09-08 Revised:2009-10-28 Online:2010-02-28 Published:2010-02-28
  • Contact: Lu Feng

摘要:

为在对等(P2P)网环境中构建一个高效、可扩展和安全的信任模型,研究了对等网信任模型,并提出了一种风险敏感的对等网信任模型. 该模型构建了一种新的风险信誉关系模型,并将风险因素推广到推荐信誉中. 借用了新的风险评估函数和串联概率模型计算方法,更加精确地量化了直接交易与间接推荐带来的风险. 为防止恶意节点的诋毁和协同作弊攻击,对推荐的局部信誉和局部信誉风险度采用了中心偏离度方法做去噪处理. 仿真实验和分析证明,该模型较其他模型有较大的性能提高,能大大增强系统的安全性.

关键词: 对等网, 信任模型, 风险评估, 推荐信誉, 局部信誉

Abstract:

To build an efficient, scalable, and security trust model in peer-to-peer (P2P) networks, the P2P trust model is studied and a risk-aware P2P trust model is built. This model constructs a new relationship model between risk and reputation, and interlards recommendation reputation with risk. By means of the new risk evaluation function and the computation of probability model in series, the risk brought by direct exchange and indirect recommendation is well quantified. To avoid slander or coordinated cheat attack among malicious nodes, this model filters the local recommendation reputation and local recommendation risk with the center deviation method. Through P2P networks simulations, the performance gains brought by this model are significant and the system security is greatly improved.

Key words: peer-to-peer network, trust model, risk evaluation, recommendation reputation, local reputation