Trusted Network Evaluation Model Based on Comprehensive Trust

被引:2
作者
Yin Ansheng [1 ]
Huang Haiping [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Coll Comp, Nanjing 210023, Peoples R China
基金
中国国家自然科学基金;
关键词
Trusted network; Trust Evaluation; Direct trust; Indirect trust; Comprehensive trust; REPUTATION; PRIVACY; SECURITY;
D O I
10.1049/cje.2021.07.028
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Trusted network is currently evaluated based on the trustworthiness of the nodes in the network; thus, trust in the nodes is required to achieve trust in the network. The methods for calculating node trust mainly utilize the following three types of models: node behavior model, multiple-attribute decision-making model and reputation model. User behavior model always determines trust values based on harmful node behaviors. Multi-attribute decision-making model can be regarded as refinements of node behavior model. The trust values of the nodes are determined based on compromised trust attribute data and not just harmful behavior data. Reputation model calculates the trust values of nodes using subjective evaluation data for nodes. This paper presents a comprehensive trust model that combines subjective evaluation data and objective attribute data to calculate node trust. The experimental results show that malicious nodes can be effectively identified, which improves the service success rate of the system.
引用
收藏
页码:1178 / 1188
页数:11
相关论文
共 53 条
[1]  
[Anonymous], 2009, ACM INT C PROCEEDING
[2]   BTEM: Belief based trust evaluation mechanism for Wireless Sensor Networks [J].
Anwar, Raja Waseem ;
Zainal, Anazida ;
Outay, Fatma ;
Yasar, Ansar ;
Iqbal, Saleem .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 96 :605-616
[3]   Iterative Trust and Reputation Management Using Belief Propagation [J].
Ayday, Erman ;
Fekri, Faramarz .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (03) :375-386
[4]   A formal model for trust in dynamic networks [J].
Carbone, M ;
Nielsen, M ;
Sassone, V .
FIRST INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND FORMAL METHODS, PROCEEDINGS, 2003, :54-61
[5]   A Fake Content Remove Scheme using Binomial Distribution Characteristics of Collective Intelligence in Peer-to-Peer Environment [J].
Cha, ByungRae ;
Park, Sun ;
Kim, JongWon .
IETE JOURNAL OF RESEARCH, 2011, 57 (05) :423-429
[6]   Analyzing User Behavior across Social Sharing Environments [J].
de Meo, Pasquale ;
Ferrara, Emilio ;
Abel, Fabian ;
Aroyo, Lora ;
Houben, Geert-Jan .
ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2013, 5 (01)
[7]  
Derbas G, 2004, IEEE/ACS INTERNATIONAL CONFERENCE ON PERVASIVE SERVICES, PROCEEDINGS, P113
[8]   Community-Structured Evolutionary Game for Privacy Protection in Social Networks [J].
Du, Jun ;
Jiang, Chunxiao ;
Chen, Kwang-Cheng ;
Ren, Yong ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2018, 13 (03) :574-589
[9]  
Fallah M.S., 2011, GAME BASED SYBIL RES
[10]   BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks [J].
Fang, Weidong ;
Zhang, Chuanlei ;
Shi, Zhidong ;
Zhao, Qing ;
Shan, Lianhai .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 :88-94