移動對等網(wǎng)信任模型研究
發(fā)布時間:2018-10-09 15:14
【摘要】:傳統(tǒng)的P2P(Peer to Peer)網(wǎng)絡被描述為可直接進行資源與服務交換的網(wǎng)絡。P2P技術(shù)的核心思想是利用分布式存儲和計算能力來替代集中式處理方式。隨著移動網(wǎng)絡與互聯(lián)網(wǎng)的融合,P2P網(wǎng)絡也必將進入MP2P(Mobile P2P)網(wǎng)絡的新時代。MP2P網(wǎng)絡的主要功能是通過移動設備間的直接數(shù)據(jù)交換來實現(xiàn)移動服務的協(xié)同和資源的共享。由于MP2P能使資源受限的終端相互協(xié)同工作,并克服傳統(tǒng)P2P網(wǎng)中由于有限的寬帶和處理能力所帶來服務質(zhì)量下降的問題,因此該網(wǎng)絡可以在較大范圍內(nèi)利用好有限的網(wǎng)絡資源。 移動用戶間信任關(guān)系的確立是可信MP2P網(wǎng)首先要解決的關(guān)鍵性問題。針對MP2P網(wǎng)與傳統(tǒng)P2P網(wǎng)終端設備在編址、通信方式以及標識上的差異性以及網(wǎng)絡中可能存在的冒名、惡意詆毀、合謀以及“搭便車”等安全問題,本文提出一種MP2P網(wǎng)下基于代理服務器的安全反饋信任模型(PSTM):不同類別的代理服務器接入不同類型的終端,以屏蔽網(wǎng)絡層終端設備之間的差異性。同時,代理服務器之間對信息的相互備份能夠緩解服務器“單點失效”問題。在資源安全選擇協(xié)議中對反饋方進行身份、資格的認證后進行相似性篩選并加權(quán)處理。在多粒度的信任值計算中引入全局節(jié)點貢獻度和評價可信度,并將直接信任度分為面向節(jié)點與面向資源兩類,,來激勵移動節(jié)點真實地反饋信息。實驗表明:PSTM能夠減少詆毀以及合謀惡意行為,同時能夠抑制“搭便車”行為從而增加網(wǎng)絡善意節(jié)點的交易成功率。 在移動節(jié)點無法獲取到代理服務器的全局評價可信度以及貢獻度的情況下,本文提出一種基于模糊理論的Q學習算法信任模型(FQTM),該模型研究的內(nèi)容是如何通過學習、適應周圍陌生環(huán)境使得自己的利益最大化。FQTM將模糊理論應用于Q-學習算法的狀態(tài)轉(zhuǎn)移概率的計算中,通過策略迭代算法不斷根據(jù)以往的交易對手調(diào)整自己的決策方案,更新Q值收益,最終Q值快速收斂至一個穩(wěn)定的狀態(tài)。實驗表明:FQTM能夠使得移動終端代理方的Q值收斂速度優(yōu)于貪心策略模型并且?guī)椭砣藢崿F(xiàn)利益最大化。
[Abstract]:The core idea of traditional P2P (Peer to Peer) network, which can exchange resources and services directly, is to make use of distributed storage and computing power to replace centralized processing. With the convergence of mobile network and Internet, P2P network will also enter the new era of MP2P (Mobile P2P) network. The main function of .MP2P network is to realize the cooperation of mobile services and the sharing of resources through the direct data exchange between mobile devices. Because MP2P can make resource constrained terminals work together, and overcome the problem of poor QoS caused by limited broadband and processing capacity in traditional P2P networks, the network can make good use of limited network resources in a large range. The establishment of trust relationship between mobile users is the first key problem to be solved in trusted MP2P networks. In view of the differences between MP2P network and traditional P2P network terminal equipment, the differences in communication mode and identification, and the possible security problems in the network, such as impersonation, malicious denigration, collusion and "hitchhiking", etc. In this paper, a security feedback trust model based on proxy server in MP2P network is proposed. Different types of proxy servers of (PSTM): are connected to different types of terminals to shield the differences between terminal devices in network layer. At the same time, the mutual backup of information between proxy servers can alleviate the problem of single point failure. In the resource security selection protocol, the feedback party is identified, the qualification is authenticated and the similarity is filtered and weighted. The global node contribution and evaluation credibility are introduced in the multi-granularity trust value calculation, and the direct trust is divided into node-oriented and resource-oriented to encourage mobile nodes to truly feedback information. Experiments show that: PSTM can reduce slander and malicious collusion, and restrain "free rider" behavior, thus increasing the transaction success rate of network bona fide nodes. When mobile nodes can not obtain the global evaluation reliability and contribution of proxy server, this paper presents a trust model of Q learning algorithm based on fuzzy theory, (FQTM),. The research content of this model is how to study by learning. The fuzzy theory is applied to the calculation of the state transition probability of the Q- learning algorithm, and the strategy iterative algorithm is used to adjust its decision scheme according to the previous counterparty, and the fuzzy theory is applied to the calculation of the state transition probability of the Q- learning algorithm. The Q value is updated and the Q value converges quickly to a stable state. The experiments show that: FQTM can make the Q convergence speed of mobile terminal agent faster than greedy policy model and help the agent to maximize the benefits.
【學位授予單位】:南京郵電大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP393.02;TN929.5
本文編號:2259801
[Abstract]:The core idea of traditional P2P (Peer to Peer) network, which can exchange resources and services directly, is to make use of distributed storage and computing power to replace centralized processing. With the convergence of mobile network and Internet, P2P network will also enter the new era of MP2P (Mobile P2P) network. The main function of .MP2P network is to realize the cooperation of mobile services and the sharing of resources through the direct data exchange between mobile devices. Because MP2P can make resource constrained terminals work together, and overcome the problem of poor QoS caused by limited broadband and processing capacity in traditional P2P networks, the network can make good use of limited network resources in a large range. The establishment of trust relationship between mobile users is the first key problem to be solved in trusted MP2P networks. In view of the differences between MP2P network and traditional P2P network terminal equipment, the differences in communication mode and identification, and the possible security problems in the network, such as impersonation, malicious denigration, collusion and "hitchhiking", etc. In this paper, a security feedback trust model based on proxy server in MP2P network is proposed. Different types of proxy servers of (PSTM): are connected to different types of terminals to shield the differences between terminal devices in network layer. At the same time, the mutual backup of information between proxy servers can alleviate the problem of single point failure. In the resource security selection protocol, the feedback party is identified, the qualification is authenticated and the similarity is filtered and weighted. The global node contribution and evaluation credibility are introduced in the multi-granularity trust value calculation, and the direct trust is divided into node-oriented and resource-oriented to encourage mobile nodes to truly feedback information. Experiments show that: PSTM can reduce slander and malicious collusion, and restrain "free rider" behavior, thus increasing the transaction success rate of network bona fide nodes. When mobile nodes can not obtain the global evaluation reliability and contribution of proxy server, this paper presents a trust model of Q learning algorithm based on fuzzy theory, (FQTM),. The research content of this model is how to study by learning. The fuzzy theory is applied to the calculation of the state transition probability of the Q- learning algorithm, and the strategy iterative algorithm is used to adjust its decision scheme according to the previous counterparty, and the fuzzy theory is applied to the calculation of the state transition probability of the Q- learning algorithm. The Q value is updated and the Q value converges quickly to a stable state. The experiments show that: FQTM can make the Q convergence speed of mobile terminal agent faster than greedy policy model and help the agent to maximize the benefits.
【學位授予單位】:南京郵電大學
【學位級別】:碩士
【學位授予年份】:2014
【分類號】:TP393.02;TN929.5
【參考文獻】
相關(guān)期刊論文 前7條
1 吳鵬;吳國新;方群;;一種基于概率統(tǒng)計方法的P2P系統(tǒng)信任評價模型[J];計算機研究與發(fā)展;2008年03期
2 高建清;王浩;于磊;方寶富;;一種模糊強化學習算法及其在RoboCup中的應用[J];計算機工程與應用;2006年06期
3 任艷;任平安;吳振強;馬建峰;;移動P2P網(wǎng)絡中的多粒度信任模型[J];計算機工程與應用;2009年06期
4 陳學松;楊宜民;;強化學習研究綜述[J];計算機應用研究;2010年08期
5 李小勇;桂小林;;大規(guī)模分布式環(huán)境下動態(tài)信任模型研究[J];軟件學報;2007年06期
6 歐中洪;宋美娜;戰(zhàn)曉蘇;宋俊德;;移動對等網(wǎng)絡關(guān)鍵技術(shù)[J];軟件學報;2008年02期
7 周文莉;吳曉非;;P2P技術(shù)綜述[J];計算機工程與設計;2006年01期
本文編號:2259801
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/2259801.html
最近更新
教材專著