Abstract
In this paper we proposed a new comprehensive trust strategy which uses Malicious Percentage (MP), Feedback Consistency Percentage (FCP) and Initial Trust Vector (IPV) as the new trust evaluation criterion to help filter malicious peers in selection of peers. Simulations demonstrate that the new trust strategy can speed the execution time of the algorithm and enhance the successful transaction rate when resisting cooperative-cheating peers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Guang-sheng M, Deng-guo F, Pu-rui. S (2009) Colluding clique detector based on activity similarity in P2P trust model. J Commun 30(8):9–20 (in Chinese)
Yong-jun L, Ya-fei D (2010) Research on trust mechanism for peer-to-peer network. Chin J Comput 33(3):390–405 (in Chinese)
Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The EigenTrust algorithm for reputation management in P2P networks. Stanford University, Stanford
Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857
Xiali L, Jingjing X, Sujuan Z Xiaohua Y (2013) An EnhanEigen algorithm trust model in P2P network. In: International conference on mechanical intelligence and automatic control, Xi’an, pp 1177–1180
Xiali L, Licheng W, JingJing X, Huilin M Fang L (2014) A new trust model in P2P network. In: International conference on machine tool technology, mechatronics and information engineering, Guilin, Guangxi, China, pp 3024–3027
Acknowledgments
This work is supported in part by 2013 Beijing University youth talent plan No. YETP1294. Besides, it is supported in part by the NSFC project No. 51375504 and the Program for New Century Excellent Talents in University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, X., Wu, L. (2015). P2P Network Trust Strategy Based on New Evaluation Criterion. In: Deng, Z., Li, H. (eds) Proceedings of the 2015 Chinese Intelligent Automation Conference. Lecture Notes in Electrical Engineering, vol 336. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46469-4_32
Download citation
DOI: https://doi.org/10.1007/978-3-662-46469-4_32
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-46468-7
Online ISBN: 978-3-662-46469-4
eBook Packages: EngineeringEngineering (R0)