Citation: | YIN Ansheng and HUANG Haiping, “Trusted Network Evaluation Model Based on Comprehensive Trust,” Chinese Journal of Electronics, vol. 30, no. 6, pp. 1178-1188, 2021, doi: 10.1049/cje.2021.07.028 |
S. Sicari, A. Rizzardi, LA Grieco, et al., "Security, privacy and trust in Internet of things", Computer Networks the International Journal of Computer & Telecommunications Networking, Vol.76, No.15, pp.146-164, 2015.
|
D. Meiling, X. Siya, S. Sujie, et al., "Blockchain-based reliable fog-cloud service solution for IIoT", Chinese Journal of Electronics, Vol.30, No.2, pp.359-366, 2021.
|
Vamsi P R and Kant K, "Performance analysis of trust based geographic routing protocols for wireless sensor networks", Proceedings of 2014 3rd International Conference on Parallel, Distributed and Grid Computing (PDGC), pp.318-323, 2015.
|
Movahedi Z and Hosseini Z, "A green trust-distortion resistant trust management scheme on mobile ad hoc networks", Wireless Personal Communications, Vol.30, No.16, pp.1c17, 2017.
|
J. Du, C. Jiang, K.C. Chen, et al., "Community-structured evolutionary game for privacy protection in social networks", IEEE Transactions on Information Forensics & Security, Vol.13, No.3, pp.574-589, 2018.
|
H. Xie, R. Ma and J. Lui,"Enhancing reputation via price discounts in E-commerce systems:A data-driven approach", ACM Transactions on Knowledge Discovery from Data, Vol.12, No.3, pp.1-29, 2018.
|
X. Wang, W. Cheng, P. Mohapatra, et al., "Enabling reputation and trust in privacy-preserving mobile sensing", IEEE Transaction on Mobile Computing, Vol.13, No.12, pp.2777-2790, 2014.
|
Z.Z. Xian, Q.L Li., X.Y. Huang, et al., "Differential privacy protection for collaborative filtering algorithms with explicit and implicit trust", Acta Electronica Sinica, Vol.46, No.12, pp.3051-3059, 2018. (in Chinese)
|
Velten M, Schneider P, Wessel S, et al., "User identity verification based on touchscreen interaction analysis in Web contexts", Information Security Practice and Experience. Springer International Publishing, pp.268-282, 2015.
|
T. Wesolwski and P. Kudlacik, "User profiling based on multiple aspects of activity in a computer system", Journal of Medical Informatics & Technologies, Vol.11, No.6, pp.121-130, 2014.
|
J. Peng and N. Gao, "Research on identity trusted level evaluation mechanism based on user behavior analysis", Netinfo Security, Vol.9, pp.124-129, 2016.
|
C. Lin, L.Q. Tian and Y.Z. Wang, "Research on user behavior trust in trustworthy network", Journal of Computer Research and Development, Vol.45, No.12, pp.2033-2043, 2008. (in Chinese)
|
J.F. Tian, Y.L. Liu and R.Z. Du, "Trust evaluation model based node behavior character", Computer Research and Development, Vol.48, No.6, pp.934-944, 2011. (in Chinese)
|
P.D. Meo, E. Ferrara, F. Abel, et al., "Analyzing user behavior across social sharing environments", ACM Transactions on Intelligent Systems & Technology, Vol.5, No.1, pp.1-31, 2013.
|
J.J. Jung, "Trustworthy knowledge diffusion model based on risk discovery on peer-to-peer networks", Expert Systems with Applications, Vol.36, No.3, pp.7123-7128, 2009.
|
D. Wu, F. Zhang, H. Wang, et al., "Security-oriented opportunistic data forwarding in mobile social networks", Future Generation Computer Systems, Vol.87, pp.803-815, 2018.
|
X.Y. Li and X.L. Gui, "Trust quantitative model with multiple decision factors in trusted network", Chinese Journal of Computers, Vol.32, No.3, pp.405-416, 2009. (in Chinese)
|
P.Y. Zhang, Y. Kong, M.C. Zhou, "A domain partition-based trust model for unreliable clouds", IEEE Transactions on Information Forensics & Security, Vol.13, No.9, pp.2167-2178, 2018.
|
X. Yang, P. Luo and J. Gui, "The concept model of software trustworthiness based on trust-theory of sociology", Acta Electronica Sinica, Vol.47, No.11, pp.2344-2353, 2019. (in Chinese)
|
G. Xiong, J.L Lang, Y.X. Hu, et al., "Evaluation approach for network components performance using trustworthiness measurement", Journal on Communications, Vol.37, No.3, pp.117-127, 2016. (in Chinese)
|
G. Derbas et al., "TRUMMAR:A trust model for mobile agent systems based on reputation", Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS), pp.113-120, 2004.
|
S.D. Kamvar, M.T. Schlosser and H. Garcia-Molina, "The eigentrust algorithm for reputation management in P2P networks", International Conference on World Wide Web. ACM, pp.640-651, 2003.
|
G.Q Zhou and Q.K. Zeng, "Trust evaluation model based on role separation", Journal of Software, Vol.23, No.12, pp.3187-3197, 2012. (in Chinese)
|
A.M. Kowshalya and M.L. Valarmathi, "Dynamic trust management for secure communications in social internet of things (SIoT)", Sadhana-Academy Proceedings in Engineering Sciences, Vol.43, No.9, pp.136-146, 2018.
|
A. Josang and W. Quattrociocchi, "Advanced features in Bayesian reputation systems", International Conference on Trust, Privacy and Security in Digital Business (DBLP), pp.105-114, 2009.
|
A. Josang and J. Haller, "Dirichlet reputation systems", Proceedings of 2nd International Conference on Availability, Reliability and Security, ARES 2007, pp.112-119, 2007.
|
M. Coles, D. Kioussis and H. Veiga, "Reputation measurement and malicious feedback rating prevention in web service recommendation systems", IEEE Transactions on Services Computing, Vol.8, No.5, pp.755-767, 2015.
|
H.G. Zhang, L. Chen and L.Q. Zhang, "Research on trusted network connection", Chinese Journal of Computers, Vol.33, No.4, pp.706-717, 2010. (in Chinese)
|
Z. Yue, "An extended TOPSIS for determining weights of decision makers with interval numbers", Knowledge-Based Systems, Vol.24, No.1, pp.146-153, 2011.
|
D.X. Huang, Z.Y. Wu and Y.Z Zong, "An Impersonal MultiAttribute Weight Allocation Method Based on Attribute Importance", System Engineering-Theory Methodology Applications, Vol.13, No.3, pp.201-207, 2004.
|
M. Carbone, M. Nielsen, V. Sassone, "A Formal Model for Trust in Dynamic Networks", Proceedings-First International Conference onSoftware Engineering and Formal Methods, pp.54-61, 2003.
|
P.D. Meo, A. Nocera, G. Quattrone, et al., "Finding reliable users and social networks in a social internetworking system", ACM International Conference Proceeding Series, pp.173-181, 2009.
|
Z.Q. Guo, Q. Wang, Y.D. Wan, et al., "A classification prediction mechanism based on comprehensive assessment for wireless link quality", Journal of Computer Research and Development, Vol.50, No.6, pp.1227-1238, 2013. (in Chinese)
|
S. Ganeriwal, L.K. Balzano, M.B. Srivastava, "Reputationbased framework for high integrity sensor networks", ACM Transactions on Sensor Networks, Vol.4, No.3, pp.66-77, 2008.
|
W. Fang, C. Zhang, Z. Shi, et al., "BTRES:Beta-based trust and reputation evaluation system for wireless sensor networks", Journal of Network and Computer Applications, Vol.59, pp.88-94, 2016. (in Chinese)
|
C. Tian and B. Yang, "A D-S evidence theory based fuzzy trust model in file-sharing P2P networks", Peer-to-Peer Networking and Applications, Vol.7, No.4, pp.332-345, 2014.
|
S.X. Wang, L. Zhang and H.S. Li, "Evaluation approach of subjective trust based on cloud model", Journal of Software, Vol.21, No.6, pp.1341-1352, 2010. (in Chinese)
|
J. Wang, Y. Zhang, Y. Wang, et al., "RPRep:A robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs", International Journal of Distributed Sensor Networks, Vol.3, No.4, pp.1-15, 2016.
|
E. Ayday and F. Fekri, "Iterative trust and reputation management using belief propagation", IEEE Transactions on Dependable & Secure Computing, Vol.9, No.3, pp.375-386, 2012.
|
W.A. Raja, Z. Anazida, et al., "BTEM:Belief based trust evaluation mechanism for wireless sensor networks", Future Generation Computer Systems, Vol.96, pp.605-616, 2019.
|
J. J. Guo, J.F. Ma, Q. Li, et al., "Game theory based trust management method for mobile ad hoc networks", Journal on communications, Vol.35, No.11, pp.50-58, 2014. (in Chinese)
|
M.S. Fallah, M. Mouzarani, A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs, Oxford University Press, 2011.
|
Y. Wu, K. Liu, "An information secrecy game in cognitive radio networks", IEEE Transactions on Information Forensics & Security, Vol.6, No.3, pp.831-842, 2011.
|
H. Yahyaoui, "A trust-based game theoretical model for Web services collaboration", Knowledge-Based Systems, Vol.27, No.3, pp.162-169, 2012.
|
J. Pawlick and Q. Zhu, "Strategic trust in cloud-enabled cyber-physical systems with an application to glucose control", IEEE Transactions on Information Forensics & Security, Vol.12, No.12, pp.2906-2919, 2017.
|
S. Nepal, W. Sherchan and A. Bouguettaya, "A behaviourbased trust model for service web", IEEE International Conference on Service-Oriented Computing and Applications. IEEE, pp.1c4, 2010.
|
J.Y. Ma, Z.J. Zhao and X.Y. Ye, "User behavior assessment in trusted network based on fuzzy decision analysis", Computer Engineering, Vol.37, No.13, pp.125-131, 2011. (in Chinese)
|
B.R. Cha, P. Sun and J.W. Kim, "A fake content remove scheme using binomial distribution characteristics of collective intelligence in peer-to-peer environment", Iete Journal of Research, Vol.57, No.5, pp.423-429, 2011.
|
L. Zhang, Y.W. Huang, J. Xuan, et al., "Trust evaluation model based on PSO and LSTM for huge information environments", Chinese Journal of Electronics, Vol.30, No.1, pp.92-101, 2021.
|
P.F. Shen, S.F. Liu and L. Han, "Distrust prediction in signed social network", Chinese Journal of Electronics, Vol.28, No.1, pp.188-194, 2019.
|
J. Yang, X.J. Zhu, X.Z. Zhou, et al., "Personalized Web service recommendation based on heterogeneous social network", Acta Electronica Sinica, Vol.48, No.2, pp.341-349, 2020. (in Chinese)
|
Z.G. Shi, J.W. Liu and Z.L. Wang, "Dynamic P2P trust model based on time-window feedback mechanism", Journal on communications, Vol.31, No.2, pp.120-129, 2010. (in Chinese)
|
B.W. Xu and Y.M. Zhou, "An improved accuracy measure for rough sets", Journal of Computer and Information Science, Vol.71, No.2, pp.163-173, 2005. (in Chinese)
|