A service recovery method based on trust evaluation in mobile social network

被引:0
作者
Danmei Niu
Lanlan Rui
Haoqiu Huang
Xuesong Qiu
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] Henan University of Science and Technology,Information Engineering College
来源
Multimedia Tools and Applications | 2017年 / 76卷
关键词
Multimedia content; Service recovery; Trust evaluation; Mobile social network;
D O I
暂无
中图分类号
学科分类号
摘要
Mobile social network makes users create and share multimedia contents freely and conveniently. However, some nodes in mobile social network have malicious behavior, such as discarding or tampering packet. These factors will cause service interruptions in the process of providing multimedia contents for the user. When the service interruption happens, how to choose the more reliable backup device, reduce interruption number, increase the packet transmission efficiency and improve user’s experience of sharing multimedia contents is the object of this paper. We propose a service recovery method based on trust evaluation which adopts Dempster-Shafer (D-S) evidence theory. The service requester calculates the direct trust degree and the recommended trust degree of the backup devices, then uses the evidence combination rule to calculate the comprehensive trust degree. The backup device with the highest trust value will be seclected to recover the service. The simulation results show that this method effectively improves the packet delivery ratio, reduces the service execution time and provides users with more stable multimedia contents.
引用
收藏
页码:3255 / 3277
页数:22
相关论文
共 69 条
[1]  
Aivaloglou E(2010)Hybrid trust and reputation management for sensor networks Wirel Netw 16 1493-1510
[2]  
Gritzalis S(2014)Energy efficient and load balanced clustering algorithms for wireless sensor networks Int J Inf Commun Technol 6 272-291
[3]  
Amgoth T(2012)Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection IEEE Trans Netw Serv Manag 9 169-183
[4]  
Jana PK(2016)LEACH-MAC: a new cluster head selection algorithm for wireless sensor networks Wirel Netw 22 49-60
[5]  
Bao FY(2013)Mobile social networking middleware: a survey Pervasive Mob Comput 9 437-453
[6]  
Chen IR(1967)Upper and lower probabilities induced by multi-valued mapping Ann Math Stat 38 325-339
[7]  
Chang MJ(2014)OMUS: an optimized multimedia service for the home environment Multimedia Tools Appl 72 281-311
[8]  
Cho JH(1996)Dynamic source routing in ad hoc wireless networks Mobile Comput 353 153-181
[9]  
Batra PK(2014)Towards cost efficient mobile service and information management in ubiquitous environment with cloud resource scheduling Int J Inf Manag 34 319-328
[10]  
Kant K(2012)Self-adaptable media service architecture for guaranteeing reliable multimedia services Multimedia Tools Appl 57 633-650