Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for selecting certificate storage nodes and network node

A storage node and network node technology, applied in the field of P2P network communication, can solve the problems of increased reliable storage of certificates, difficulties, and difficulty for nodes to know network topology, performance, routing, etc., and achieve the effect of low overhead, simple execution, and reliable storage

Inactive Publication Date: 2015-07-22
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The dynamic nature of P2P networks (nodes frequently join or leave the network) makes reliable storage of certificates difficult
In a non-centered P2P network, it is difficult for nodes to know the entire network topology, performance, routing and other information. How to select reliable nodes to store certificates has become a very important issue. In the non-centered P2P network in the prior art , there is no safe and reliable node selection method to ensure the reliable storage of certificates

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for selecting certificate storage nodes and network node
  • Method for selecting certificate storage nodes and network node
  • Method for selecting certificate storage nodes and network node

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] In the solution provided by Embodiment 1 of the present invention, firstly, each node in the P2P network needs to maintain a list of neighbor nodes, and periodically exchange the information of these neighbor lists. The basic scheme is: first, set the node v i is a neighbor of node v. In the process of communicating with other nodes, node v points statistics to node v i the number of nodes. If there are m nodes pointing to node v within a set unit time period t i , we say node v i The local in-degree observed by node v at time period t is m. The idea of ​​this scheme is that node v maintains a "memory" of the local in-degree of its neighbor nodes, and the local in-degree does not exceed the actual in-degree of the node at most. A node with a large in-degree actually has a large local in-degree in node v, because a node with a large local in-degree will be selected as its neighbor node by many other nodes, which also means that the performance of the node is better ...

Embodiment 2

[0067] In a specific embodiment, the specific algorithm of the scheme provided by the embodiment of the present invention can be expressed as follows:

[0068] Randomly select some nodes from the set Г(v) to form the set P(v); randomly select some nodes u except v from the set Г(v) of the neighbor table of node v i , u i ∈Г(v), to each selected node u i Send P(v).

[0069]

[0070] Among them, v i .Inset points to node v observed by node v i set of nodes, v i .Indeg is the node v observed by node v i local ingress.

[0071] In the above scheme, when receiving a neighbor list exchange message from node v, the processing of the message by node u mainly includes two steps: the first step is to process the part of the set P(v) that is already in Г(u) The second step is to add the nodes in the set P(v) that are not in Г(u) to Г(u).

Embodiment 3

[0073] Such as figure 2 As shown, it is a specific example provided by Embodiment 3 of the present invention, wherein the solid line represents the topology of the network before implementing the solution provided by the embodiment of the present invention, and the dotted line represents the increased after executing the algorithm described in the embodiment of the present invention Network Topology. Specifically, node E randomly selects a neighbor node G and randomly selects a set P(E) (see Table 2) from its own neighbor table (see Table 1), and transfers P(E) to node G. According to the specific algorithm in the above-mentioned embodiment 2, and referring to formula (1), node G will select node B and node C as new neighbor nodes according to a certain probability. Among them, the probability of selecting node B is (1+1) / (1+1+2+1)=2 / 5; the probability of selecting node C is (2+1) / (1+1+2+1)= 3 / 5. Accordingly, node G chooses whether to use node B and node C as its new neigh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for selecting certificate storage nodes and belongs to the technical field of peer-to-peer network communication. The method comprises the following steps: maintaining a list for neighbor nodes by all nodes, wherein the list for the neighbor nodes comprises the local in-degree of the neighbor nodes; selecting the neighbor nodes with the higher local in-degree to serve as the certificate storage nodes, wherein the local in-degree refers to the number of the neighbor nodes vi observed to be pointed to by all the nodes v in unit time. The invention also discloses a network node. According to the method for selecting the certificate storage nodes, the comparatively reliable network node is obtained to store a certificate through maintaining the list for the self neighbor nodes by all the nodes in a peer-to-peer network, introducing the conception of the local in-degree into the list for the neighbor nodes and comparing the local in-degree. By adopting the scheme provided by the embodiment of the invention, as statistics and updating are finished on the local in-degree by all the nodes in the process of exchanging a neighbor list, the execution is simple, the expenses are low, and the reliable certificate storage nodes can be conveniently and rapidly selected.

Description

technical field [0001] The invention relates to the technical field of P2P network communication, in particular to a method for selecting a certificate storage node and a network node. Background technique [0002] In P2P network service software, the security of service is a very important issue. In a P2P network with a central server, security services can be provided through a trusted third party, for example, security services can be provided through the public key infrastructure PKI. For a decentralized P2P network, although it is impossible to provide security services through a trusted third party, public key certificates can be used to provide security services. [0003] In a P2P network with a central server, certificate storage can be solved by a trusted third party. For a decentralized P2P network, how to ensure reliable storage of node certificates is a challenge. The dynamic nature of P2P networks (nodes frequently join or leave the network) adds difficulties...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 陆天波王晓芹李峥陈渌萍高志新李欲晓
Owner BEIJING UNIV OF POSTS & TELECOMM