By Topic

An Improved Trust Model in P2P

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Xiaohui Ren ; Sch. of Comput. & Commun., Changsha ; Kenli Li ; Kenli Li ; Lei Yang

Based on the Bayesian network trust model, an improved trust model is proposed in this paper. It includes two parts: one is the improved searching resource peers algorithm, which can reduce the redundancy packages received by peers and enhance the reliability of system; the other is the improved trust computing and updating method, which applies logarithm for evaluation and the number of services to compute and update the trust, so that it can prevent malicious peers from attacking normal peers efficiently, meanwhile restrain malicious peers from increasing their trust respectively by collusion in its clique. The sketch maps of trust value illustrate that the new model controls the behavior of malicious peer in P2P more efficiently

Published in:

Services Computing, 2006. APSCC '06. IEEE Asia-Pacific Conference on

Date of Conference:

Dec. 2006