1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y....

10
1 A secure model for contr olling the hubs in P2P w ireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source: Computer Communications, v ol. 33, pp. 997-1004, 2010 Speaker: Shu-Fen Chiou ( 邱邱邱 )

Transcript of 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y....

Page 1: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

1

A secure model for controlling the hubs in P2P wireless network based on trust value

Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. LinSource: Computer Communications, vol. 33, pp. 997-1004, 2010Speaker: Shu-Fen Chiou ( 邱淑芬 )

Page 2: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

2

Free riders

0

1

2

3

Free rider

Page 3: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

3

Concepts

High trust value and low connections can get better quality of service.

Prevent free riders

Page 4: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

4

Proposed method

resource. typefor and between trans.of successes ofnumber :)(, kvvs jikji

resource. typefor and between trans.of fail ofnumber :)(, kvvf jikji

. node a from node a of ue trust val theof sum:)(, ijkji vvT

Page 5: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

5

Proposed method

0,1,)()(

)()(,

kijkij

kijkji fs

sD

resources type for the node a and node abetween st valuedirect tru:)(, kvvD jikji

4

6

5

10

)(,

)(,

)(,

)(,

kai

kai

kji

kji

f

s

f

sVa

1,1,625.015110

10)(,

kjiD

1,1,55.01416

6)(,

kaiD

•Direct trust value

Page 6: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

6

Proposed method

xkx

jkj

vkT

vkRt

set in resource type of ue trust val theof sum:

nodein resources type of ue trust valrecommend:

)(

)(

34.03.06.02.08.0

84.075.08.06.04.0

)(

)(

ka

kj

Rt

Rt

55.0

625.0

4

6

5

10

)(,

)(,

)(,

)(,

)(,

)(,

kai

kji

kai

kai

kji

kji

D

D

f

s

f

sVa•Recommend trust value

ixBx

kxjkxkj

kj

DTRt&

)()()(

)(

Page 7: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

7

Proposed method

445.034.05.055.05.0

7325.084.05.0625.05.0

1,0,

)(

)(

)()()(

kia

kij

kjkijkij

T

T

RtDT

•Trust value

34.0

84.0

55.0

625.0

4

6

5

10

)(

)(

)(,

)(,

)(,

)(,

)(,

)(,

ka

kj

kai

kji

kai

kai

kji

kji

Rt

Rt

D

D

f

s

f

s Va

Page 8: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

8

Proposed method•Select resource provider

445.0

7325.0

34.0

84.0

55.0

625.0

4

6

5

10

)(

)(

)(

)(

)(,

)(,

)(,

)(,

)(,

)(,

kia

kij

ka

kj

kai

kji

kai

kai

kji

kji

T

T

Rt

Rt

D

D

f

s

f

sVa

node a of sconnection ofnumber :)(

sconnection download

concurrent ofnumber greatest :)(

)(

)(

)()(

iN

iD

eTQ iN

iD

Bjkijkij

j

5)(,20)(,3466.0445.0

10)(,20)(,4443.07325.0

20

5

)(

20

10

)(

iDiNeQ

iDiNeQ

kia

kij

Page 9: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

9

Simulation results

Page 10: 1 A secure model for controlling the hubs in P2P wireless network based on trust value Authors: Y. Liu, N. Xiong, K. Xu, J. H. Park, and C. Lin Source:

10

Comments The free riders can not respond the

request msg. Only the initiator considers the

trust value of resource provider.