资源描述:
《a trust management model based on bi-evaluation in p2p networks》由会员上传分享,免费在线阅读,更多相关内容在工程资料-天天文库。
1、IEICETRANS.INF.&SYST.,VOL.E93D,NO.3MARCH2010466PAPERSpecialSectiononTrust,SecurityandPrivacyforPervasiveApplicationsATrustManagementModelBasedonBi-evaluationinP2PNetworks∗∗JingyuFENG†,YuqingZHANG††∗a),Nonmembers,andHongWANG†††,MemberSUMMARYThesecurityofP2Pnetworksdependsonbuildingtrustmosttrust
2、models,trustworthinessofpeersisusedtopre-managementamongpeers.However,currenttrustmanagementmodelsfo-ventuntrustworthyresourcesfromspreadingbymaliciouscusonpreventinguntrustworthyresourcesfromspreadingbymaliciousproviders[4].providers,buthavefeweffectsonreducingdenial-of-serviceattacksofma-Howev
3、er,thisapproachhassomeeffectsonthesim-liciousconsumersandfreeridingofselfishpeers.Pointingtotheseprob-lems,abi-evaluation∗∗∗trustmanagementmodel,calledBiTrust,ispro-pleidentifyingofmaliciousproviders,buthasfeweffectsposed.Inthismodel,thetrustworthinessofapeerisdividedintoserviceoncopingwithdenial-
4、of-serviceattacksofmaliciouscon-andrequesttrustworthiness.Servicetrustworthinessshowstheresourcessumersandfreeridingofselfishpeers.Forexample,thereliabilityofproviders,andrequesttrustworthinessisusedtodealwithre-requestresolutionofconsumingresourcesmaytendtoex-questsfromconsumers,whichcankeepawa
5、ymaliciousconsumersandencourageselfishpeerstoshareresources.Agenericmethodforevalu-hausttheprovidersservingcapabilities(likeprocessingca-atingserviceandrequesttrustworthinessisdescribed.Furthermore,thepacityandbandwidth)[5].Oneofthesimplestattacksofimplementationstrategiesofthemodelarealsodepict
6、edinthispaper.ThemaliciousconsumerscouldbeachievedbybombardingafollowinganalysisandsimulationshowthatBiTrustismoreeffectiveonproviderwithlotsofrequestssoastoreduceitscapabilitiesenhancinghigh-qualityresourcessharingamongpeersandmoreadvancedinsuccessfulexchangesrate.torespondtoothernormalrequests
7、andprovideresources,keywords:P2P,file-sharing,trust,bidirectionalresultingindenial-of-serviceattacks.Furthermore,freerid-ingmayleadtodegradationofthenetworkperformance.It1.Introductionhasbeenestablishedthatnearly70%ofGnutellauserss