System for managing P2P network security and trust based on path optimization and finding
A P2P network and path optimization technology, applied in the field of network security, to suppress behavior, improve security and search efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] refer to figure 1 , the security trust management system of the present invention includes:
[0051] 1. The initialization module is used to assign the initial trust degree of nodes newly added to the P2P network, formulate the trust factor of the system, and set the maximum search length of the network.
[0052] 1a) Newly added nodes can neither be completely trusted nor completely distrusted, because the value range of the comprehensive trust degree T(a, b) is between 0 and 1, 0 represents no trust at all, and 1 represents complete trust, so it is 0.5 The nearby value is more reasonable, so set the initial trust degree of the newly added node to 0.5, so that it is fair for each newly added node;
[0053] 1b) Set the credibility factor T to 0.5, if the risk of this transaction is greater, the credibility factor will increase accordingly;
[0054] 1c) Set the maximum search length L of the P2P network to 10, so that the search path time is limited.
[0055] 2. The sto...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 