期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Three-Level Intrusion Detection Model for Wireless Sensor Networks Based on Dynamic Trust Evaluation
1
作者 Xiaogang Yuan Huan Pei Yanlin Wu 《Computers, Materials & Continua》 2025年第9期5555-5575,共21页
In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stabili... In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stability,data transmission reliability,and overall performance.To effectively address this issue and significantly improve intrusion detection speed,accuracy,and resistance to malicious attacks,this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation(TIDM-DTE).This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust,communication trust,and energy consumption trust by focusing on characteristics such as continuous packet loss and energy consumption changes.By dynamically predicting node trust values using the grey Markov model,the model accurately and sensitively reflects changes in node trust levels during attacks.Additionally,DBSCAN(Density-Based Spatial Clustering of Applications with Noise)data noise monitoring technology is employed to quickly identify attacked nodes,while a trust recovery mechanism restores the trust of temporarily faulty nodes to reduce False Alarm Rate.Simulation results demonstrate that TIDM-DTE achieves high detection rates,fast detection speed,and low False Alarm Rate when identifying various network attacks,including selective forwarding attacks,Sybil attacks,switch attacks,and black hole attacks.TIDM-DTE significantly enhances network security,ensures secure and reliable data transmission,moderately improves network energy efficiency,reduces unnecessary energy consumption,and provides strong support for the stable operation of WSNs.Meanwhile,the research findings offer new ideas and methods for WSN security protection,possessing important theoretical significance and practical application value. 展开更多
关键词 Wireless sensor networks intrusion detection dynamic trust evaluation data noise detection trust recovery mechanism
在线阅读 下载PDF
VANETs group message secure forwarding with trust evaluation
2
作者 Lijun Wang Huajie Hao +1 位作者 Chun Wang Xianzhou Han 《Digital Communications and Networks》 2025年第4期1149-1156,共8页
Efficient and safe information exchange between vehicles can reduce the probability of road accidents,thereby improving the driving experience of vehicles in Vehicular Ad Hoc Networks(VANETs).This paper proposes a gro... Efficient and safe information exchange between vehicles can reduce the probability of road accidents,thereby improving the driving experience of vehicles in Vehicular Ad Hoc Networks(VANETs).This paper proposes a group management algorithm with trust and mobility evaluation to address the enormous pressure on VANETs topology caused by high-speed vehicle movement and dynamic changes in the direction of travel.This algorithm utilizes historical interactive data to mine the fusion trust between vehicles.Then,combined with fusion mobility,the selection of center members and information maintenance of group members is achieved.Furthermore,based on bilinear pairing,an encryption protocol is designed to solve the problem of key management and update when the group structure changes rapidly,ensuring the safe forwarding of messages within and between groups.Numerical analysis shows that the algorithm in the paper ensures group stability and improves performance such as average message delivery rate and interaction delay. 展开更多
关键词 Vehicular ad hoc networks Trust evaluation Group management Double key encryption
在线阅读 下载PDF
Research on Quantification Mechanism of Data Source Reliability Based on Trust Evaluation
3
作者 Gaoshang Lu Fa Fu Zixiang Tang 《Computers, Materials & Continua》 2025年第6期4239-4256,共18页
In the data transaction process within a data asset trading platform,quantifying the trustworthiness of data source nodes is challenging due to their numerous attributes and complex structures.To address this issue,a ... In the data transaction process within a data asset trading platform,quantifying the trustworthiness of data source nodes is challenging due to their numerous attributes and complex structures.To address this issue,a distributed data source trust assessment management framework,a trust quantification model,and a dynamic adjustment mechanism are proposed.Themodel integrates the Analytic Hierarchy Process(AHP)and Dempster-Shafer(D-S)evidence theory to determine attribute weights and calculate direct trust values,while the PageRank algorithm is employed to derive indirect trust values.Thedirect and indirect trust values are then combined to compute the comprehensive trust value of the data source.Furthermore,a dynamic adjustment mechanism is introduced to continuously update the comprehensive trust value based on historical assessment data.By leveraging the collaborative efforts of multiple nodes in the distributed network,the proposed framework enables a comprehensive,dynamic,and objective evaluation of data source trustworthiness.Extensive experimental analyses demonstrate that the trust quantification model effectively handles large-scale data source trust assessments,exhibiting both strong trust differentiation capability and high robustness. 展开更多
关键词 Trust evaluation data source reliability distributed network quantification mechanism
在线阅读 下载PDF
A Dynamic Bayesian-Based Comprehensive Trust Evaluation Model for Dispersed Computing Environment 被引量:1
4
作者 Hongwen Hui Zhengxia Gong +1 位作者 Jianwei An Jianzhong Qi 《China Communications》 SCIE CSCD 2023年第2期278-288,共11页
Dispersed computing is a new resourcecentric computing paradigm.Due to its high degree of openness and decentralization,it is vulnerable to attacks,and security issues have become an important challenge hindering its ... Dispersed computing is a new resourcecentric computing paradigm.Due to its high degree of openness and decentralization,it is vulnerable to attacks,and security issues have become an important challenge hindering its development.The trust evaluation technology is of great significance to the reliable operation and security assurance of dispersed computing networks.In this paper,a dynamic Bayesian-based comprehensive trust evaluation model is proposed for dispersed computing environment.Specifically,in the calculation of direct trust,a logarithmic decay function and a sliding window are introduced to improve the timeliness.In the calculation of indirect trust,a random screening method based on sine function is designed,which excludes malicious nodes providing false reports and multiple malicious nodes colluding attacks.Finally,the comprehensive trust value is dynamically updated based on historical interactions,current interactions and momentary changes.Simulation experiments are introduced to verify the performance of the model.Compared with existing model,the proposed trust evaluation model performs better in terms of the detection rate of malicious nodes,the interaction success rate,and the computational cost. 展开更多
关键词 dispersed computing trust evaluation model malicious node interaction success rate detection rate
在线阅读 下载PDF
Trust evaluation model of power terminal based on equipment portrait 被引量:1
5
作者 Erxia Li Zilong Han +2 位作者 Chaoqun Kang Tao Yu Yupeng Huang 《Global Energy Interconnection》 EI CSCD 2023年第6期758-771,共14页
As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for term... As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for terminals,we propose a trust evaluation model based on equipment portraits for power terminals.First,we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic.Second,we propose an exception evaluation method based on syntax and semantics.The key fields of each message are extracted,and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal.Thus,by combining the network flow order,syntax,and semantic analysis,an equipment portrait can be constructed to guarantee security of the power network terminals.We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time.Finally,the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate,as well as a higher real-time performance,which is more suitable for power terminals. 展开更多
关键词 Power terminal Equipment portrait Trust evaluation
在线阅读 下载PDF
Research Progress of Trust Evaluation Model
6
作者 ZHOU Guoqiang PAN Fangrui +1 位作者 ZHANG Weifeng GUO Jian 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期391-395,共5页
Software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such c... Software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such circumstance, trust evaluation model becomes focus of intense research at current time. Trust evaluation model establishes a management framework of trust relationship between entities, involving expression and measurement of trust, comprehensive calculation of direct trust value and recommended trust value, and recognition of malicious entities and recommendations. Based on the analysis of several typical trust evaluation models, the classification of trust evaluation ideas and modes is discussed, the questions existing in current research and the directions of future research are pointed out. 展开更多
关键词 distributed environment TRUST trust evaluation model trust path
在线阅读 下载PDF
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
7
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 Cross-domain authentication trust evaluation autoencoder
在线阅读 下载PDF
Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection
8
作者 S.Soundararajan B.R.Tapas Bapu +3 位作者 C.Kotteeswaran S.Venkatasubramanian P.J.Sathish Kumar Ahmed Mudassar Ali 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1227-1240,共14页
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,abse... Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,absence of physical protectivity,and accumulated traffic,WSN is highly vulner-able to security concerns.Therefore,this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis.It is challenging to determine if packet loss is caused by a collision in the medium access path,poor channel quality,or a selective forwarding assault.Identifying misbehaving nodes at the earliest opportunity is an acceptable solution for performing secure routing in such networks.As a result,in this study effort,we present a unique Modified Ad Hoc On-Demand Distance Vector(AODV)Routing protocol depending upon the One time password(OTP)method that employs the RSA algorithm.Finally,a trust evaluation process determines which approach is the most optimal.Accord-ing to the simulationfindings of the suggested routing protocol and comparison with existing routing protocols provided in this article,the proposed work is both efficient and cost-effective. 展开更多
关键词 Wireless sensor network selective forward attack one time password trust evaluation RSA algorithm
在线阅读 下载PDF
A Trust Evaluation Model for Social Commerce Based on BP Neural Network
9
作者 Lei Chen Ruimei Wang 《Journal of Data Analysis and Information Processing》 2016年第4期147-158,共12页
Recent years we have witnessed the rapid growth of social commerce in China, but many users are not willing to trust and use social commerce. So improving consumers’ trust and purchase intention has become a crucial ... Recent years we have witnessed the rapid growth of social commerce in China, but many users are not willing to trust and use social commerce. So improving consumers’ trust and purchase intention has become a crucial factor in the success of social commerce. Business factors, environment factors and social factors including twelve secondary indexes build up a social commerce trust evaluation model. Questionnaires are handed out to collect twelve secondary indexes scores as input of BP neural network and composite score of trust as output. Model simulation shows that both training samples and test samples have low level of average error and standard deviation, which certify that the model has good stability and it is a good method for evaluating social commerce trust. 展开更多
关键词 Social Commerce Trust evaluation TRUST BP Neural Network evaluation Model
暂未订购
Blockchain-Based Trust Model for Inter-Domain Routing
10
作者 Qiong Yang Li Ma +3 位作者 Sami Ullah Shanshan Tu Hisham Alasmary Muhammad Waqas 《Computers, Materials & Continua》 2025年第3期4821-4839,共19页
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com... Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain routing.Existing research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP nodes.In this paper,we propose a blockchain-based trust model for inter-domain routing.Our model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the blockchain.The BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective alliance.We incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing service.We forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing behavior.We use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust model.Compared with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks. 展开更多
关键词 Inter-domain routing BGP security blockchain trust model trust mechanisms trust evaluation
在线阅读 下载PDF
Towards intelligent and trustworthy task assignments for 5G-enabled industrial communication systems
11
作者 Mingfeng Huang Anfeng Liu +1 位作者 Neal N.Xiong Athanasios V.Vasilakos 《Digital Communications and Networks》 2025年第1期246-255,共10页
With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic... With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient workers.In this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few workers.Specifically,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each worker.Then,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate tasks.Only when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start issue.More importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker pool.Finally,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%. 展开更多
关键词 Industrial Internet of Things Insufficient workers Trust evaluation Social relation Task assignment
在线阅读 下载PDF
D-S Evidence Theory Based Trust Ant Colony Routing in WSN 被引量:3
12
作者 Ziwen Sun Zhiwei Zhang +1 位作者 Cheng Xiao Gang Qu 《China Communications》 SCIE CSCD 2018年第3期27-41,共15页
This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor ne... This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes. 展开更多
关键词 wireless sensor networks antcolony routing trust evaluation model D-Sevidence theory NS2 simulation
在线阅读 下载PDF
A Multi-dimensional Trust-aware Cloud Service Selection Mechanism Based on Evidential Reasoning Approach 被引量:4
13
作者 Wen-Juan Fan Shan-Lin Yang +1 位作者 Harry Perros Jun Pei 《International Journal of Automation and computing》 EI CSCD 2015年第2期208-219,共12页
In the last few years, cloud computing as a new computing paradigm has gone through significant development, but it is also facing many problems. One of them is the cloud service selection problem. As increasingly boo... In the last few years, cloud computing as a new computing paradigm has gone through significant development, but it is also facing many problems. One of them is the cloud service selection problem. As increasingly boosting cloud services are offered through the internet and some of them may be not reliable or even malicious, how to select trustworthy cloud services for cloud users is a big challenge. In this paper, we propose a multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning(ER) approach that integrates both perception-based trust value and reputation based trust value, which are derived from direct and indirect trust evidence respectively, to identify trustworthy services. Here, multi-dimensional trust evidence, which reflects the trustworthiness of cloud services from different aspects, is elicited in the form of historical users feedback ratings. Then, the ER approach is applied to aggregate the multi-dimensional trust ratings to obtain the real-time trust value and select the most trustworthy cloud service of certain type for the active users. Finally, the fresh feedback from the active users will update the trust evidence for other service users in the future. 展开更多
关键词 Cloud service selection multi-dimensional trust evidence trust and reputation evaluation evidential reasoning(ER) clond service
原文传递
A Jury-Based Trust Management Mechanism in Distributed Cognitive Radio Networks 被引量:2
14
作者 SU Wengui LIAO Yang 《China Communications》 SCIE CSCD 2015年第7期119-126,共8页
In the trust management scheme of the distributed cognitive radio networks, the absence of the central control devices cause many problems such as a lack of standardized control for trust computation, and the absence ... In the trust management scheme of the distributed cognitive radio networks, the absence of the central control devices cause many problems such as a lack of standardized control for trust computation, and the absence of the decision makers in trust evaluation and collaborative decision making. A trust management mechanism based on the jury system for distributed cognitive radio networks is proposed in this paper. The "jury user" is designed to collaboratively examine the reputation of the cognitive user in the networks and to perform data fusion and spectrum allocation for distributed cognitive radio networks. Simulation analysis results show that the proposed scheme can ensure accuracy and fairness in trust evaluation and improve effectiveness and flexibility of spectrum allocation. 展开更多
关键词 cognitive radio network trust scheme jury system distributed network trust evaluation
在线阅读 下载PDF
BCSE:Blockchain-Based Trusted Service Evaluation Model over Big Data 被引量:2
15
作者 Fengyin Li Xinying Yu +3 位作者 Rui Ge Yanli Wang Yang Cui Huiyu Zhou 《Big Data Mining and Analytics》 EI 2022年第1期1-14,共14页
The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure... The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions.Because of these characteristics,the blockchain is suitable for solving certain open problems in the service-oriented social network,where the unreliability of submitted reviews of service vendors can cause serious security problems.To solve the unreliability problems of submitted reviews,this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model.The new trusted service evaluation model consists of the blockchain-based identity authentication scheme,evaluation submission module,and evaluation publicity module.In the proposed evaluation model,only users who have successfully been authenticated can submit reviews to service vendors.The registration and authentication records of users’identity and the reviews for service vendors are all stored in the blockchain network.The security analysis shows that this model can ensure the credibility of users’reviews for service vendors,and other users can obtain credible reviews of service vendors via the review publicity module.The experimental results also show that the proposed model has a lower review submission delay than other models. 展开更多
关键词 social network trusted service evaluation model blockchain identity authentication
原文传递
Improved Collaborative Filtering Recommendation Based on Classification and User Trust 被引量:3
16
作者 Xiao-Lin Xu Guang-Lin Xu 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期25-31,共7页
When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes ... When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes an improved algorithm based on classification and user trust.It firstly classifies all the ratings by the categories of items.And then,for each category,it evaluates the trustworthy degree of each user on the category and imposes the degree on the ratings of the user.Finally,the algorithm explores the similarities between users,finds the nearest neighbors,and makes recommendations within each category.Simulations show that the improved algorithm outperforms the traditional collaborative filtering algorithms and enhances the accuracy of recommendation. 展开更多
关键词 Collaborative filtering credibility of ratings evaluation on user trust item classification similarity metric
在线阅读 下载PDF
A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification
17
作者 Yao Wang Yubo Wang +2 位作者 Zhenhu Ning Sadaqat ur Rehman Muhammad Waqas 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期981-996,共16页
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo... Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneous and dynamic distributed Internet of things environment between different Internet of things.There is a wide demand for cooperation between equipment and management institutions in the smart city.Therefore,it is necessary to establish a trust mechanism to promote cooperation,and based on this,prevent data disorder caused by the interaction between honest terminals and malicious temminals.However,most of the existing research on trust mechanism is divorced from the Internet of things environment,and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of hings devices,resuling in the fact that the research on abstract trust trust mechanism cannot be directly applied to the Internet of things;On the other hand,various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not considered.Aiming at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals,a cross domain trust model(CDTM)based on self-authentication is proposed.Unlike most trust models,this model uses self-certified trust.The cross-domain process of internet of things(IoT)terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain interaction.At the same time,in order to alleviate the collision attack and improve the accuracy of trust evaluation,the overall trust value is calculated by comprehensively considering the quantity weight,time attenuation weight and similarity weight.Finally,the simulation results show that CDTM has good anti collusion attack ability.The success rate of malicious interaction will not increase significantly.Compared with other models,the resource consumption of our proposed model is significantly reduced. 展开更多
关键词 Smart city cross-domain trust model self-certification trust evaluation
在线阅读 下载PDF
A Trust-Based Hierarchical Consensus Mechanism for Consortium Blockchain in Smart Grid 被引量:4
18
作者 Xingguo Jiang Aidong Sun +2 位作者 Yan Sun Hong Luo Mohsen Guizani 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第1期69-81,共13页
As the smart grid develops rapidly,abundant connected devices offer various trading data.This raises higher requirements for secure and effective data storage.Traditional centralized data management does not meet the ... As the smart grid develops rapidly,abundant connected devices offer various trading data.This raises higher requirements for secure and effective data storage.Traditional centralized data management does not meet the above requirements.Currently,smart grid with conventional consortium blockchain can solve the above issues.However,in the face of a large number of nodes,existing consensus algorithms often perform poorly in terms of efficiency and throughput.In this paper,we propose a trust-based hierarchical consensus mechanism(THCM)to solve this problem.Firstly,we design a hierarchical mechanism to improve the efficiency and throughput.Then,intra-layer nodes use an improved Raft consensus algorithm and inter-layer nodes use the Byzantine Fault Tolerance algorithm.Thirdly,we propose a trust evaluation method to improve the election process of Raft.Finally,we implement a prototype system to evaluate the performance of THCM.The results demonstrate that the consensus efficiency is improved by 19.8%,the throughput is improved by 12.34%,and the storage is reduced by 37.9%. 展开更多
关键词 consortium blockchain consensus algorithm trust evaluation method smart grid Internet of Things(IoT)
原文传递
A Cloud-Based Trust Model for Evaluating Quality of Web Services 被引量:2
19
作者 王守信 张莉 +1 位作者 王帅 邱翔 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1130-1142,共13页
Because trust is regarded as an essential secured relationship within a distributed network environment,selecting services over the Internet from the viewpoint of trust has been a major trend.Current research about tr... Because trust is regarded as an essential secured relationship within a distributed network environment,selecting services over the Internet from the viewpoint of trust has been a major trend.Current research about trust model and evaluation in the context of Web services does not rationally and accurately reflect some essential characteristics of trust such as subjective uncertainty and dynamism.In this paper,we analyze some important characteristics of trust,and some key factors that affect the trust relation in the Web service environment.Accordingly,we propose a trust model based on Cloud Model theory to describe the subjective uncertainty of trust factors.A time-related backward cloud generation algorithm is given to express the dynamism of trust.Furthermore,according to the trust model and algorithm,a formalized calculation approach is provided to evaluate the trust degree of services requestors in providers.Our experiment shows that the evaluation of trust degree can effectively support trust-decisions and provide a helpful exploitation for selecting services based on the viewpoint of trust. 展开更多
关键词 Web service TRUST trust evaluation Cloud Model
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部