{"title":"基于信任关系的P2P网络路由机制","authors":"Jie Xu, Xiaolin Liu, Keping Long","doi":"10.1109/ICCT.2010.5689133","DOIUrl":null,"url":null,"abstract":"The traditional P2P routing algorithms generally don't consider the routing security. This paper proposes a new trusted routing mechanism based on trust degree for P2P network. The assessment and calculation of trust degree is the key to achieve the secure routing mechanism. In this paper, an improved method to define trust degree is presented. And then, we present the improved trusted routing mechanism based on trust degree. At end of this paper, some simulations and analysis for network problems, such as bad mouthing attacks, self-faults problems and conflict behavior attacks, show that this scheme is helpful to detect which node is more reliable and make honest nodes play a more important part in the network, and make malicious nodes to the edge of network. This study can increase the communication efficiency and improves the survivability of P2P network.","PeriodicalId":253478,"journal":{"name":"2010 IEEE 12th International Conference on Communication Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A routing mechanism based on trust relationship for P2P networks\",\"authors\":\"Jie Xu, Xiaolin Liu, Keping Long\",\"doi\":\"10.1109/ICCT.2010.5689133\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The traditional P2P routing algorithms generally don't consider the routing security. This paper proposes a new trusted routing mechanism based on trust degree for P2P network. The assessment and calculation of trust degree is the key to achieve the secure routing mechanism. In this paper, an improved method to define trust degree is presented. And then, we present the improved trusted routing mechanism based on trust degree. At end of this paper, some simulations and analysis for network problems, such as bad mouthing attacks, self-faults problems and conflict behavior attacks, show that this scheme is helpful to detect which node is more reliable and make honest nodes play a more important part in the network, and make malicious nodes to the edge of network. This study can increase the communication efficiency and improves the survivability of P2P network.\",\"PeriodicalId\":253478,\"journal\":{\"name\":\"2010 IEEE 12th International Conference on Communication Technology\",\"volume\":\"40 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 IEEE 12th International Conference on Communication Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT.2010.5689133\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 IEEE 12th International Conference on Communication Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT.2010.5689133","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A routing mechanism based on trust relationship for P2P networks
The traditional P2P routing algorithms generally don't consider the routing security. This paper proposes a new trusted routing mechanism based on trust degree for P2P network. The assessment and calculation of trust degree is the key to achieve the secure routing mechanism. In this paper, an improved method to define trust degree is presented. And then, we present the improved trusted routing mechanism based on trust degree. At end of this paper, some simulations and analysis for network problems, such as bad mouthing attacks, self-faults problems and conflict behavior attacks, show that this scheme is helpful to detect which node is more reliable and make honest nodes play a more important part in the network, and make malicious nodes to the edge of network. This study can increase the communication efficiency and improves the survivability of P2P network.