Please wait a minute...
Front. Inform. Technol. Electron. Eng.  2017, Vol. 18 Issue (4): 559-569    DOI: 10.1631/FITEE.1601535
Research Articles     
DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks
Mei-juan Jia, Hui-qiang Wang, Jun-yu Lin, Guang-sheng Feng, Hai-tao Yu
College of Computer Science and Technology, Harbin Engineering University, Harbin 150001, China; College of Computer Science and Information Technology, Daqing Normal University, Daqing 163712, China; Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China; College of Tourism, Guilin University of Technology, Guilin 541001, China
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      

Abstract  The special characteristics of the mobile environment, such as limited bandwidth, dynamic topology, heterogeneity of peers, and limited power, pose additional challenges on mobile peer-to-peer (MP2P) networks. Trust management becomes an essential component of MP2P networks to promote peer transactions. However, in an MP2P network, peers frequently join and leave the network, which dynamically changes the network topology. Thus, it is difficult to establish long-term and effective trust relationships among peers. In this paper, we propose a dynamic grouping based trust model (DGTM) to classify peers. A group is formed according to the peers’ interests. Within a group, mobile peers share resources and tend to keep stable trust relationships. We propose three peer roles (super peers, relay peers, and ordinary peers) and two novel trust metrics (intragroup trust and intergroup trust). The two metrics are used to accurately measure the trust between two peers from the same group or from different groups. Simulations illustrate that our proposed DGTM always achieves the highest successful transaction rate and the best communication overhead under different circumstances.

Key wordsMobile P2P networks      Trust management      Dynamic grouping      Super peer     
Received: 08 September 2016      Published: 12 April 2017
CLC:  TP393  
Cite this article:

Mei-juan Jia, Hui-qiang Wang, Jun-yu Lin, Guang-sheng Feng, Hai-tao Yu. DGTM: a dynamic grouping based trust model for mobile peer-to-peer networks. Front. Inform. Technol. Electron. Eng., 2017, 18(4): 559-569.

URL:

http://www.zjujournals.com/xueshu/fitee/10.1631/FITEE.1601535     OR     http://www.zjujournals.com/xueshu/fitee/Y2017/V18/I4/559


DGTM:基于动态分组的移动P2P网络信任模型

概要:移动对等网络的特征,如有限带宽、动态拓扑、对等节点的异质性、有限资源等,给其带来了额外挑战。为促进移动对等网中节点之间的交易,信任管理成为一个重要研究内容。然而,在移动对等网络中,节点频繁地加入和离开网络,网络拓扑经常发生变化,节点之间很难建立长期有效的信任关系。为解决这个问题,我们首次提出基于动态分组的信任管理模型(Dynamic grouping based trust model, DGTM),该模型通过节点的兴趣对节点进行分类,具有相同或者相似兴趣的节点被分在同一组内,保持稳定的信任关系且彼此分享资源。模拟实验验证表明,我们提出的基于动态分组的信任管理模型能够获得较高的成功交易率和较好的通信开销。

关键词: 移动对等网,  信任管理,  动态分组,  超级节点 
[1]   Almenárez, F., Marín, A., Díaz, D., et al., 2011. Trust management for multimedia P2P applications in autonomic networking. Ad Hoc Netw., 9(4):687-697.
doi: 10.1016/j.adhoc.2010.09.005
[2]   Al-Oufi, S., Kim, H.N., El Saddik, A., 2012. A group trust metric for identifying people of trust in online social networks. Expert Syst. Appl., 39(18):13173-13181.
doi: 10.1016/j.eswa.2012.05.084
[3]   Castro, M.C., Kassler, A.J., Chiasserini, C.F., et al., 2009. Peer-to-peer overlay in mobile ad-hoc networks. In: Shen, X.M., Yu, H., Buford, J., et al. (Eds.), Handbook of Peer-to-Peer Networking. Springer US, p.1045-1080.
doi: 10.1007/978-0-387-09751-0_37
[4]   Chang, B.J., Kuo, S.L., 2009. Markov chain trust model for trust-value analysis and key management in distributed multicast MANETs. IEEE Trans. Veh. Technol., 58(4):1846-1863.
doi: 10.1109/TVT.2008.2005415
[5]   Chen, X., Proulx, B., Gong, X.W., et al., 2015. Exploiting social ties for cooperative D2D communications: a mobile social networking case. IEEE/ACM Trans. Netw., 23(5):1471-1484.
doi: 10.1109/TNET.2014.2329956
[6]   Chen, X., Gong, X.W., Yang, L., et al., 2016. Exploiting social tie structure for cooperative wireless networking: a social group utility maximization framework. IEEE/ACM Trans. Netw., 24(6):3593-3606.
doi: 10.1109/TNET.2016.2530070
[7]   Easa, F.R., Bafghi, A.G., Shakeri, H., 2012. A group-based trust propagation method. 2nd Int. eConf. on Computer and Knowledge Engineering, p.313-317.
doi: 10.1109/ICCKE.2012.6395398
[8]   Jeyaraj, J.A.S., Subadra, S., 2014. A study on dynamic source routing in ad hoc wireless networks. Int. J. Eng. Trends Technol., 8(7):401-410.
doi: 10.14445/22315381/IJETT-V8P269
[9]   Jia, M.J., Wang, H.Q., Ye, B., et al., 2016. A dynamic grouping-based trust model for mobile P2P networks. 13th IEEE Int. Conf. on Services Computing, p.848-851.
doi: 10.1109/SCC.2016.121
[10]   Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H., 2003. The eigentrust algorithm for reputation management in P2P networks. Proc. 12th Int. Conf. on World Wide Web, p.640-651.
doi: 10.1145/775152.775242
[11]   Kassinen, O., Harjula, E., Korhonen, J., et al., 2009. Battery life of mobile peers with UMTS and WLAN in a Kademlia-based P2P overlay. 20th Int. Symp. on Personal, Indoor and Mobile Radio Communications, p.662-665.
doi: 10.1109/PIMRC.2009.5450083
[12]   Largillier, T., Vassileva, J., 2012. Using collective trust for group formation. LNCS, 7493:137-144.
doi: 10.1007/978-3-642-33284-5_12
[13]   Leskovec, J., Huttenlocher, D., Kleinberg, J., 2010. Signed networks in social media. Proc. SIGCHI Conf. on Human Factors in Computing Systems, p.1361-1370.
doi: 10.1145/1753326.1753532
[14]   Liang, Z.Q., Shi, W.S., 2005. PET: a PErsonalized Trust model with reputation and risk evaluation for P2P resource sharing. Proc. 38th Annual Hawaii Int. Conf. on System Sciences, p.201b.
doi: 10.1109/HICSS.2005.493
[15]   Nayak, J., Naik, B., Kanungo, D.P., et al., 2015. An improved swarm based hybrid K-means clustering for optimal cluster centers. 2nd Int. Conf. on Information Systems Design and Intelligent Applications, p.545-553.
doi: 10.1007/978-81-322-2250-7_54
[16]   Ou, Z.H., Song, M.N., Zhan, X.S., et al., 2008. Key techniques for mobile peer-to-peer networks. J. Softw., 19(2):404-418 (in Chinese).
doi: 10.3724/sp.j.1001.2008.00404
[17]   Qureshi, B., Min, G., Kouvatsos, D., 2010. M-Trust: a trust management scheme for mobile P2P networks. IEEE/IFIP 8th Int. Conf. on Embedded and Ubiquitous Computing, p.476-483.
doi: 10.1109/euc.2010.79
[18]   Qureshi, B., Min, G., Kouvatsos, D., 2012. A distributed reputation and trust management scheme for mobile peer-to-peer networks. Comput. Commun., 35(5):608-618.
doi: 10.1016/j.comcom.2011.07.008
[19]   Ranjan, R., Zhao, L., 2013. Peer-to-peer service provisioning in cloud computing environments. J. Supercomput., 65(1):154-184.
doi: 10.1007/s11227-011-0710-5
[20]   Ratnasamy, S., Karp, B., Yin, L., et al., 2002. GHT: a geographic hash table for data-centric storage. ACM Int. Workshop on Wireless Sensor Networks and Applications, p.78-87.
doi: 10.1145/570738.570750
[21]   Spaho, E., Kulla, E., Xhafa, F., et al., 2012. P2P solutions to efficient mobile peer collaboration in MANETs. 7th Int. Conf. on P2P, Parallel, Grid, Cloud and Internet Computing.
doi: 10.1109/3pgcic.2012.50
[22]   Sun, Z.X., Tang, Y.W., 2007. Multilayer and grouping P2P trust model based on global reputation. J. Commun., 28(9):133-140 (in Chinese).
[23]   Tan, H., Wang, Y., Hao, X.H., et al., 2010. Arbitrary obstacles constrained full coverage in wireless sensor networks. Proc. 5th Int. Conf. on Wireless Algorithms, Systems, and Applications, p.1-10.
doi: 10.1007/978-3-642-14654-1_1
[24]   Tian, C., Jiang, J., Hu, Z., et al., 2010. A novel super-peer based trust model for peer-to-peer networks. Chin. J. Comput., 33(2):345-355 (in Chinese).
doi: 10.3724/sp.j.1016..2010.00345
[25]   Tian, H.R., Zou, S.H., Wang, W.D., et al., 2006. A group based reputation system for P2P networks. LNCS, 4158:342-351.
doi: 10.1007/11839569_33
[26]   Wu, X., 2011. A stable group-based trust management scheme for mobile P2P networks. Int. J. Dig. Cont. Technol. Appl., 5(2):116-125.
doi: 10.4156/jdcta.vol5.issue2.13
[27]   Xiong, L., Liu, L., 2004. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng., 16(7):843-857.
doi: 10.1109/TKDE.2004.1318566
[28]   Yang, H.S., Sun, J.H., 2016. A study on hybrid trust evaluation model for identifying malicious behavior in mobile P2P. Peer-to-Peer Netw. Appl., 9(3):578-587.
doi: 10.1007/s12083-015-0411-6
[29]   Yates, J.S., Storch, M.F., Nijhawan, S., et al., 2012. Apparatus for Executing Programs for a First Computer Architecture on a Computer of a Second Architecture. US Patent 8 127 121.
[30]   Zhang, Y.C., Chen, S.S., Yang, G., 2009. SFTrust: a double trust metric based trust model in unstructured P2P system. IEEE Int. Symp. on Parallel & Distributed Processing, p.1-7.
doi: 10.1109/IPDPS.2009.5161240
[31]   Zhou, R.F., Hwang, K., 2007. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parall. Distr. Syst., 18(4):460-473.
doi: 10.1109/TPDS.2007.1021
[32]   Zhou, R.F., Hwang, K., Cai, M., 2008. GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans. Knowl. Data Eng., 20(9):1282-1295.
doi: 10.1109/TKDE.2008.48
[33]   Zhu, H.F., Bao, F., 2007. Quantifying trust metrics of recommendation systems in ad-hoc networks. IEEE Wireless Communications and Networking Conf., p.2904-2908.
doi: 10.1109/WCNC.2007.538
No related articles found!