期刊文献+

P2P的PKI信任模型研究

PKI trust model research of P2P
在线阅读 下载PDF
导出
摘要 P2P(peer-to-peer)网络具有动态性、匿名性、可扩展性等特征。由于P2P应用是一种分散的、去中心化、无控制的自发行为,并且具有匿名发布的特性,如何控制信息内容的安全已经成为一个难题。在P2P的网络环境中在基于PKI的多重数字签名的基础上引入对节点的行为特征分析的方法,把节点的行为分为不同的等级。根据不同的等级赋予不同的扣分系数比例,从而使得节点的信誉值更加合理,更好地避免了节点同过获得高信誉值而进行的恶意攻击,从整体上提高了系统的安全性和可靠性。 P2P(peer-to-peer) networks have dynamics, anonymity, scalability and other features. Because P2P applications are a dispersed, decentralized, uncontrolled spontaneous behavior, and has anonymous release characteristics, how to control the information content of security has become a problem. In the P2P network environment, the behavioral characteristics of the node analysis method were introduced on the basis of multiple digital signatures based on PKI, and assorted the behavior of the nodes into different grades. According to different levels, it gave a different coefficient of the ratio points, made a more reasonable value of the node's credibility, and better avoided the nodes with high reputation values to get malicious attacks. It improved system security and reliability on the whole.
出处 《电子设计工程》 2010年第9期8-10,15,共4页 Electronic Design Engineering
关键词 P2P 分散 去中心化 匿名发布 PKI 行为特征 P2P dispersion decentralized anonymous release PKI behavior characteristics
作者简介 江浩伟(1984-),男,河南汤阴人,硕士研究生。研究方向:网络安全。
  • 相关文献

参考文献6

二级参考文献33

  • 1李胜勇,陈文元,张卫平.PKI技术及其存在问题的分析[J].微计算机信息,2005,21(1):171-172. 被引量:27
  • 2Aberer K, Despotovic Z. Managing Trust in a Peer-to-Peer Information System[C]//Proe of ACM Int' l Conf on Information and Knowledge Management, 2001 : 310-317.
  • 3Kamvar S, Schlosser M,Garcia Molina H. The Eigentrust Algorithm for Reputation Management in P2P Networks[C]// Proc of the 12th Int'l World Wide Web Conf,2003:640- 651.
  • 4McKnight D H, Chervany N L. The Meanings of Trust[R]. Technical Report WP9604, Management Information Systems Research Center, University of Minnesota, 1996.
  • 5Selcuk A, Uzun E, Pariente M. A Reputation-Based Trust Management System for P2P Networks[C]//Proc of the 4th IEEE/ACM Int'l Symp on Cluster Computing and the Grid, 2004.
  • 6Ratnasamy S. Routing Algorithms for DHTs: Some Open Questions[C]//Proc of the 1st Int'l Workshop on Peer-to- Peer Systems, 2002 : 45-52.
  • 7Wang Yan, I.in Fu ren. Trust and Risk Evaluation of Transactions with Different Amounts in Peer-to-Peer E-commerce Environments[C]//Proc of IEEE Int' l Conf on e-Business Engineering, 2006: 102-109.
  • 8Kamvar S. EigenRep.. Reputation Management in P2P Networks[R]. Technical Report SCCM-02-16, Stanford University,2002.
  • 9Kamvar S D, Schlosser M T. EigenRep: Reputation Management in P2P Networks [C]//Proc of the 12th World Wide Web Conf, 2003: 123-134.
  • 10Wang Y,Vassileva J. Bayesian Network-Based Trust Model[C]//Proc of IEEE/WIC Int'l Conf on Web Intelligence, 2003,372- 378.

共引文献36

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部