Skip to main content

P2P Network Trust Strategy Based on New Evaluation Criterion

  • Conference paper
  • First Online:
Proceedings of the 2015 Chinese Intelligent Automation Conference

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 336))

  • 1108 Accesses

Abstract

In this paper we proposed a new comprehensive trust strategy which uses Malicious Percentage (MP), Feedback Consistency Percentage (FCP) and Initial Trust Vector (IPV) as the new trust evaluation criterion to help filter malicious peers in selection of peers. Simulations demonstrate that the new trust strategy can speed the execution time of the algorithm and enhance the successful transaction rate when resisting cooperative-cheating peers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Guang-sheng M, Deng-guo F, Pu-rui. S (2009) Colluding clique detector based on activity similarity in P2P trust model. J Commun 30(8):9–20 (in Chinese)

    Google Scholar 

  2. Yong-jun L, Ya-fei D (2010) Research on trust mechanism for peer-to-peer network. Chin J Comput 33(3):390–405 (in Chinese)

    Article  Google Scholar 

  3. Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The EigenTrust algorithm for reputation management in P2P networks. Stanford University, Stanford

    Google Scholar 

  4. Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16(7):843–857

    Article  Google Scholar 

  5. Xiali L, Jingjing X, Sujuan Z Xiaohua Y (2013) An EnhanEigen algorithm trust model in P2P network. In: International conference on mechanical intelligence and automatic control, Xi’an, pp 1177–1180

    Google Scholar 

  6. Xiali L, Licheng W, JingJing X, Huilin M Fang L (2014) A new trust model in P2P network. In: International conference on machine tool technology, mechatronics and information engineering, Guilin, Guangxi, China, pp 3024–3027

    Google Scholar 

Download references

Acknowledgments

This work is supported in part by 2013 Beijing University youth talent plan No. YETP1294. Besides, it is supported in part by the NSFC project No. 51375504 and the Program for New Century Excellent Talents in University.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiali Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, X., Wu, L. (2015). P2P Network Trust Strategy Based on New Evaluation Criterion. In: Deng, Z., Li, H. (eds) Proceedings of the 2015 Chinese Intelligent Automation Conference. Lecture Notes in Electrical Engineering, vol 336. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-46469-4_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-46469-4_32

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-46468-7

  • Online ISBN: 978-3-662-46469-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics