Unlock instant, AI-driven research and patent intelligence for your innovation.

System for managing P2P network security and trust based on path optimization and finding

A P2P network and path optimization technology, applied in the field of network security, can solve problems such as difficult implementation, low efficiency of malicious node search, and no initial trust of newly added nodes, so as to achieve the effect of suppressing behavior, improving security and search efficiency

Inactive Publication Date: 2010-05-05
XIDIAN UNIV
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. It takes a lot of time to search for failed links, and find malicious nodes by comparing multiple failed links. This method reduces the efficiency of malicious node search in the entire system and is not easy to implement
[0005] 2. As for the P2P network trust initialization, it is not mentioned in the scheme that the newly joined node cannot communicate with other nodes because there is no initial trust;
[0006]3. There is no limit to the maximum length of the search path, and the search may go on indefinitely, which reduces the efficiency of path search

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System for managing P2P network security and trust based on path optimization and finding
  • System for managing P2P network security and trust based on path optimization and finding
  • System for managing P2P network security and trust based on path optimization and finding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] refer to figure 1 , the security trust management system of the present invention includes:

[0050] 1. The initialization module is used to assign the initial trust degree of nodes newly added to the P2P network, formulate the trust factor of the system, and set the maximum search length of the network.

[0051]1a) Newly added nodes can neither be completely trusted nor completely distrusted, because the value range of the comprehensive trust degree T(a, b) is between 0 and 1, 0 represents no trust at all, and 1 represents complete trust, so it is 0.5 The nearby value is more reasonable, so set the initial trust degree of the newly added node to 0.5, so that it is fair for each newly added node;

[0052] 1b) Set the credibility factor T to 0.5, if the risk of this transaction is greater, the credibility factor will increase accordingly;

[0053] 1c) Set the maximum search length L of the P2P network to 10, so that the search path time is limited.

[0054] 2. The sto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a system for managing P2P network security and trust based on the path optimization and finding, mainly solving the problems that a newly added node is not initialized, a recommended path can not be efficiently found out, and various actions of bad nodes are prevented in a traditional system. The system carries out management according to the following steps of : (1) initializing a P2P network; (2) storing trust information of all nodes directly interactive with a source node; (3) searching a recommended path by an ant colony optimization algorithm and calculating the recommendation trust degree of the source node on a target node; (4) querying direct trust degree, recommendation trust degree and credit value of the target node by the source node; (5) calculating comprehensive trust degree of the target node; (6) deciding whether the source node and the target node are interactive or not; (7) evaluating the target node by the source node; (8) adopting a reward and punishment mechanism for the target node; and (9) updating the direct trust degree of the source node to the target node. The system has the advantages of high path searching efficiency and capability of preventing various actions of a bad node, and can be applied to the security and trust management of the P2P network.

Description

technical field [0001] The invention belongs to the technical field of network security, relates to a security trust management system in a P2P network, and is used for better restraining behaviors of malicious nodes. Background technique [0002] With the rapid development of P2P network, it has been widely used in remote communication, file sharing, distributed computing and other fields. Therefore, how to efficiently manage the trust between nodes in the network has become an urgent problem to be solved in the P2P network. At present, most P2P networks mainly study how to distinguish potential benevolent nodes from malicious nodes. In recent years, there have been more and more researches on this aspect. The most common method is to establish a trust model, by calculating the trust degree of each node in the model and Reputation value to solve this problem. However, these trust models cannot effectively suppress various malicious behaviors of nodes, such as providing un...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/56H04L29/08H04L12/24H04L29/06
Inventor 李晖于静张跃宇
Owner XIDIAN UNIV