A Master-Slave Recommended Credibility Model in Mobile P2P Based on Chord

Mobile P2P is an important research field in recent years, due to the defects of mobile environment; network security of mobile P2P becomes a key factor for its application. Therefore, how to establish effective credibility model is an important research content, a master-slave Chord recommended credibility model is presented in the paper. Adopting the different class management, the nodes are divided into the super nodes (index server) and ordinary ones (clients) according to different data structure and functions, which constitutes hybrid credibility model and enhances the velocity and efficiency of credibility value updating and maintenance. Semi-distributed architecture reduces the terminal computational and storage load, which can make the proposed model be applicable to the mobile P2P, meanwhile improve the flexibility and scalability of network.

[1]  Craig Partridge,et al.  Hash-based IP traceback , 2001, SIGCOMM.

[2]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[3]  Anna R. Karlin,et al.  Practical network support for IP traceback , 2000, SIGCOMM.

[4]  Dawn Xiaodong Song,et al.  Advanced and authenticated marking schemes for IP traceback , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[5]  Meina Song,et al.  A Resource Discovery Algorithm in Mobile Peer-to-Peer Based on Vector Location , 2008, 2008 Third International Conference on Pervasive Computing and Applications.

[6]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[7]  Robert Morris,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.

[8]  Krishna P. Gummadi,et al.  Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.

[9]  David Hutchison,et al.  A survey of key management for secure group communication , 2003, CSUR.