Unlock instant, AI-driven research and patent intelligence for your innovation.

Group-based trust data management method in mobile P2P network

A P2P network, trust data technology, applied in the field of computer networks, can solve problems such as destroying system security, avoid collusion and deception, realize safe storage and access, and reduce communication load.

Inactive Publication Date: 2012-08-15
BEIJING UNIV OF TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage is: there are cases where nodes provide false data, which destroys the security of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Group-based trust data management method in mobile P2P network
  • Group-based trust data management method in mobile P2P network
  • Group-based trust data management method in mobile P2P network

Examples

Experimental program
Comparison scheme
Effect test

example

[0025] According to the principle of DHT, the G i The node name of the node is used as a keyword for hash operation, that is, Hash(G i ), then G i The location in the hash space is: loc i =Hash(G i ). After the position of each node in the logical space point is determined, then use Hash 1 (G i ), Hash 2 (G i ),...Hash n (G i ) to determine G i M management nodes, W i (G i ) = Hash 1 (G i ) = Hash(G i ‖1), where ‖ is a connection symbol. At the same time, node G i It is also a management node, which manages the data of multiple other nodes. The sample program is as follows:

[0026]Foreach group i do

[0027] Submit recommended values to all peer managers at locations

[0028] W k (G i ), K=1,...M;

[0029] Collect recommended values and sets of B c i of G i ′s child peer c∈C j ;

[0030] Submit child c′s recommend values ​​r cj to peer managers W k (G j ), K=1,...M;

[0031] ∀ j ∈ B ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a group-based trust data management method in a mobile P2P network. Through the method, nodes with the same mobile proxy are classified into the same group, and a mode of managing trust data on the same node by a plurality of nodes in the group is adopted, wherein management nodes are selected randomly. The method comprises the following steps: determining and setting M management nodes of each mobile node; transmitting the trust data; dividing all mobile nodes in groups, wherein each group has only one mobile proxy; for the mobile node which takes charge of independent space, determining and setting M nodes for managing data thereof according to a DHT theory in the group to which the mobile node belongs; performing a Hash operation by taking a node name as a key word; determining the management nodes of Gi by using Hash1 (Gi), Hash2 (Gi),..., and Hashn (Gi) respectively; transmitting the trust data by using a TITP transmission protocol; and performing evaluation, signature and encrypted transmission on the trust data. Safe storage and access of trust information of the mobile nodes are realized through smaller groups so that large-scale trust information exchange among nodes is avoided and network communication load is greatly reduced.

Description

technical field [0001] The invention relates to a group-based trust data management method in a mobile P2P network, and the basic idea is: assign nodes with the same mobile agent to the same group. For a mobile node, M nodes are determined and set up in the group to which it belongs according to the DHT principle to manage its data. In order to strengthen the security of trusted data transmission, a password-based trust data transmission protocol (Trust Information Transportation Protocol) (TITP) is also designed. When a certain node needs the trust data of the mobile node, K nodes among the M nodes are randomly queried (K<M). After getting the response, the inquirer selects most consistent data from it, thereby excluding false data provided by malicious nodes, which belongs to the field of computer networks. Background technique [0002] In recent years, P2P applications have developed rapidly, from the first Napster, to the later Gnutella, and now the popular BitTorre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L9/32H04W12/04H04W88/18H04W12/03H04W12/06
Inventor 何泾沙吴旭徐菲
Owner BEIJING UNIV OF TECH