期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Dynamic Bayesian-Based Comprehensive Trust Evaluation Model for Dispersed Computing Environment 被引量:1
1
作者 Hongwen Hui Zhengxia Gong +1 位作者 Jianwei An Jianzhong Qi 《China Communications》 SCIE CSCD 2023年第2期278-288,共11页
Dispersed computing is a new resourcecentric computing paradigm.Due to its high degree of openness and decentralization,it is vulnerable to attacks,and security issues have become an important challenge hindering its ... Dispersed computing is a new resourcecentric computing paradigm.Due to its high degree of openness and decentralization,it is vulnerable to attacks,and security issues have become an important challenge hindering its development.The trust evaluation technology is of great significance to the reliable operation and security assurance of dispersed computing networks.In this paper,a dynamic Bayesian-based comprehensive trust evaluation model is proposed for dispersed computing environment.Specifically,in the calculation of direct trust,a logarithmic decay function and a sliding window are introduced to improve the timeliness.In the calculation of indirect trust,a random screening method based on sine function is designed,which excludes malicious nodes providing false reports and multiple malicious nodes colluding attacks.Finally,the comprehensive trust value is dynamically updated based on historical interactions,current interactions and momentary changes.Simulation experiments are introduced to verify the performance of the model.Compared with existing model,the proposed trust evaluation model performs better in terms of the detection rate of malicious nodes,the interaction success rate,and the computational cost. 展开更多
关键词 dispersed computing trust evaluation model malicious node interaction success rate detection rate
在线阅读 下载PDF
Research Progress of Trust Evaluation Model
2
作者 ZHOU Guoqiang PAN Fangrui +1 位作者 ZHANG Weifeng GUO Jian 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期391-395,共5页
Software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such c... Software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such circumstance, trust evaluation model becomes focus of intense research at current time. Trust evaluation model establishes a management framework of trust relationship between entities, involving expression and measurement of trust, comprehensive calculation of direct trust value and recommended trust value, and recognition of malicious entities and recommendations. Based on the analysis of several typical trust evaluation models, the classification of trust evaluation ideas and modes is discussed, the questions existing in current research and the directions of future research are pointed out. 展开更多
关键词 distributed environment trust trust evaluation model trust path
在线阅读 下载PDF
D-S Evidence Theory Based Trust Ant Colony Routing in WSN 被引量:3
3
作者 Ziwen Sun Zhiwei Zhang +1 位作者 Cheng Xiao Gang Qu 《China Communications》 SCIE CSCD 2018年第3期27-41,共15页
This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor ne... This paper proposes a trust ant colony routing algorithm by introducing a node trust evaluation model based on the D-S evidence theory into the ant colony routing protocol to improve the security of wireless sensor networks. To reduce the influence of conflict evidences caused by malicious nods, the consistent intensity is introduced to preprocess conflict evidences before using the D-S combination rule to improve the reliability of the D-S based trust evaluation. The nodes with high trust values will be selected as the routing nodes to insure the routing security, and the trust values are used as heuristic functions of the ant colony routing algorithm. The simulation tests are conducted by using the network simulator NS2 to observe the outcomes of performance metrics of packets loss rate and average end-to-end delay etc. to indirectly evaluate the security issue under the attack of inside malicious nodes. The simulation results show that the proposed trust routing algorithm can efficiently resist malicious attacks in terms of keeping performances of the average end-to-end delay, the throughtput and the routing packet overhead under attacking from malicious nodes. 展开更多
关键词 wireless sensor networks antcolony routing trust evaluation model D-Sevidence theory NS2 simulation
在线阅读 下载PDF
BCSE:Blockchain-Based Trusted Service Evaluation Model over Big Data 被引量:2
4
作者 Fengyin Li Xinying Yu +3 位作者 Rui Ge Yanli Wang Yang Cui Huiyu Zhou 《Big Data Mining and Analytics》 EI 2022年第1期1-14,共14页
The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure... The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions.Because of these characteristics,the blockchain is suitable for solving certain open problems in the service-oriented social network,where the unreliability of submitted reviews of service vendors can cause serious security problems.To solve the unreliability problems of submitted reviews,this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model.The new trusted service evaluation model consists of the blockchain-based identity authentication scheme,evaluation submission module,and evaluation publicity module.In the proposed evaluation model,only users who have successfully been authenticated can submit reviews to service vendors.The registration and authentication records of users’identity and the reviews for service vendors are all stored in the blockchain network.The security analysis shows that this model can ensure the credibility of users’reviews for service vendors,and other users can obtain credible reviews of service vendors via the review publicity module.The experimental results also show that the proposed model has a lower review submission delay than other models. 展开更多
关键词 social network trusted service evaluation model blockchain identity authentication
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部