A master-slave recommended credibility model in mobile P2P based on Chord

被引:0
作者
Qu, Haitao [1 ]
Song, Meina [1 ]
Wang, Rihua [2 ]
Qu, Wu [3 ]
Song, Junde [1 ]
机构
[1] BUPT, Comp Sch, Beijing, Peoples R China
[2] Lib CUC, Beijing, Peoples R China
[3] K Touch Corp, Beijing, Peoples R China
来源
2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8 | 2009年
关键词
mobile P2P; credibility model; Chord;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Mobile P2P is an important research field in recent years, due to the defects of mobile environment; network security of mobile P2P becomes a key factor for its application. Therefore, how to establish effective credibility model is an important research content, a master-slave Chord recommended credibility model is presented in the paper. Adopting the different class management, the nodes are divided into the super nodes (index server) and ordinary ones (clients) according to different data structure and functions, which constitutes hybrid credibility model and enhances the velocity and efficiency of credibility value updating and maintenance. Semi-distributed architecture reduces the terminal computational and storage load, which can make the proposed model be applicable to the mobile P2P, meanwhile improve the flexibility and scalability of network.
引用
收藏
页码:4412 / +
页数:2
相关论文
共 7 条
[1]  
[Anonymous], P 2001 C APPL TECHN, DOI DOI 10.1145/383059.383071
[2]  
GUMMADI K, 2003, P ACM S OP SYST PRIN
[3]  
QU HT, RESOURCE DISCOVERY A
[4]   A survey of key management for secure group communication [J].
Rafaeli, S ;
Hutchison, D .
ACM COMPUTING SURVEYS, 2003, 35 (03) :309-329
[5]  
SAVAGES W, 2009, P ACM SIGCOMM C STOC, P295
[6]   Hash-based IP traceback [J].
Snoeren, AC ;
Partridge, C ;
Sanchez, LA ;
Jones, CE ;
Tchakountio, F ;
Kent, ST ;
Strayer, WT .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2001, 31 (04) :3-14
[7]  
Song DXD, 2001, IEEE INFOCOM SER, P878, DOI 10.1109/INFCOM.2001.916279