当前位置:主页 > 管理论文 > 移动网络论文 >

移动对等网信任模型研究

发布时间:2018-10-09 15:14
【摘要】:传统的P2P(Peer to Peer)网络被描述为可直接进行资源与服务交换的网络。P2P技术的核心思想是利用分布式存储和计算能力来替代集中式处理方式。随着移动网络与互联网的融合,P2P网络也必将进入MP2P(Mobile P2P)网络的新时代。MP2P网络的主要功能是通过移动设备间的直接数据交换来实现移动服务的协同和资源的共享。由于MP2P能使资源受限的终端相互协同工作,并克服传统P2P网中由于有限的宽带和处理能力所带来服务质量下降的问题,因此该网络可以在较大范围内利用好有限的网络资源。 移动用户间信任关系的确立是可信MP2P网首先要解决的关键性问题。针对MP2P网与传统P2P网终端设备在编址、通信方式以及标识上的差异性以及网络中可能存在的冒名、恶意诋毁、合谋以及“搭便车”等安全问题,本文提出一种MP2P网下基于代理服务器的安全反馈信任模型(PSTM):不同类别的代理服务器接入不同类型的终端,以屏蔽网络层终端设备之间的差异性。同时,代理服务器之间对信息的相互备份能够缓解服务器“单点失效”问题。在资源安全选择协议中对反馈方进行身份、资格的认证后进行相似性筛选并加权处理。在多粒度的信任值计算中引入全局节点贡献度和评价可信度,并将直接信任度分为面向节点与面向资源两类,,来激励移动节点真实地反馈信息。实验表明:PSTM能够减少诋毁以及合谋恶意行为,同时能够抑制“搭便车”行为从而增加网络善意节点的交易成功率。 在移动节点无法获取到代理服务器的全局评价可信度以及贡献度的情况下,本文提出一种基于模糊理论的Q学习算法信任模型(FQTM),该模型研究的内容是如何通过学习、适应周围陌生环境使得自己的利益最大化。FQTM将模糊理论应用于Q-学习算法的状态转移概率的计算中,通过策略迭代算法不断根据以往的交易对手调整自己的决策方案,更新Q值收益,最终Q值快速收敛至一个稳定的状态。实验表明:FQTM能够使得移动终端代理方的Q值收敛速度优于贪心策略模型并且帮助代理人实现利益最大化。
[Abstract]:The core idea of traditional P2P (Peer to Peer) network, which can exchange resources and services directly, is to make use of distributed storage and computing power to replace centralized processing. With the convergence of mobile network and Internet, P2P network will also enter the new era of MP2P (Mobile P2P) network. The main function of .MP2P network is to realize the cooperation of mobile services and the sharing of resources through the direct data exchange between mobile devices. Because MP2P can make resource constrained terminals work together, and overcome the problem of poor QoS caused by limited broadband and processing capacity in traditional P2P networks, the network can make good use of limited network resources in a large range. The establishment of trust relationship between mobile users is the first key problem to be solved in trusted MP2P networks. In view of the differences between MP2P network and traditional P2P network terminal equipment, the differences in communication mode and identification, and the possible security problems in the network, such as impersonation, malicious denigration, collusion and "hitchhiking", etc. In this paper, a security feedback trust model based on proxy server in MP2P network is proposed. Different types of proxy servers of (PSTM): are connected to different types of terminals to shield the differences between terminal devices in network layer. At the same time, the mutual backup of information between proxy servers can alleviate the problem of single point failure. In the resource security selection protocol, the feedback party is identified, the qualification is authenticated and the similarity is filtered and weighted. The global node contribution and evaluation credibility are introduced in the multi-granularity trust value calculation, and the direct trust is divided into node-oriented and resource-oriented to encourage mobile nodes to truly feedback information. Experiments show that: PSTM can reduce slander and malicious collusion, and restrain "free rider" behavior, thus increasing the transaction success rate of network bona fide nodes. When mobile nodes can not obtain the global evaluation reliability and contribution of proxy server, this paper presents a trust model of Q learning algorithm based on fuzzy theory, (FQTM),. The research content of this model is how to study by learning. The fuzzy theory is applied to the calculation of the state transition probability of the Q- learning algorithm, and the strategy iterative algorithm is used to adjust its decision scheme according to the previous counterparty, and the fuzzy theory is applied to the calculation of the state transition probability of the Q- learning algorithm. The Q value is updated and the Q value converges quickly to a stable state. The experiments show that: FQTM can make the Q convergence speed of mobile terminal agent faster than greedy policy model and help the agent to maximize the benefits.
【学位授予单位】:南京邮电大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP393.02;TN929.5

【参考文献】

相关期刊论文 前7条

1 吴鹏;吴国新;方群;;一种基于概率统计方法的P2P系统信任评价模型[J];计算机研究与发展;2008年03期

2 高建清;王浩;于磊;方宝富;;一种模糊强化学习算法及其在RoboCup中的应用[J];计算机工程与应用;2006年06期

3 任艳;任平安;吴振强;马建峰;;移动P2P网络中的多粒度信任模型[J];计算机工程与应用;2009年06期

4 陈学松;杨宜民;;强化学习研究综述[J];计算机应用研究;2010年08期

5 李小勇;桂小林;;大规模分布式环境下动态信任模型研究[J];软件学报;2007年06期

6 欧中洪;宋美娜;战晓苏;宋俊德;;移动对等网络关键技术[J];软件学报;2008年02期

7 周文莉;吴晓非;;P2P技术综述[J];计算机工程与设计;2006年01期



本文编号:2259801

资料下载
论文发表

本文链接:https://www.wllwen.com/guanlilunwen/ydhl/2259801.html


Copyright(c)文论论文网All Rights Reserved | 网站地图 |

版权申明:资料由用户9765e***提供,本站仅收录摘要或目录,作者需要删除请E-mail邮箱bigeng88@qq.com