Volume 30 Issue 6
Nov.  2021
Turn off MathJax
Article Contents
YIN Ansheng and HUANG Haiping, “Trusted Network Evaluation Model Based on Comprehensive Trust,” Chinese Journal of Electronics, vol. 30, no. 6, pp. 1178-1188, 2021, doi: 10.1049/cje.2021.07.028
Citation: YIN Ansheng and HUANG Haiping, “Trusted Network Evaluation Model Based on Comprehensive Trust,” Chinese Journal of Electronics, vol. 30, no. 6, pp. 1178-1188, 2021, doi: 10.1049/cje.2021.07.028

Trusted Network Evaluation Model Based on Comprehensive Trust

doi: 10.1049/cje.2021.07.028
Funds:

This work is supported by the the National Natural Science Foundation of China (No.62072252).

  • Received Date: 2019-09-02
  • Rev Recd Date: 2021-05-15
  • Available Online: 2021-09-23
  • Publish Date: 2021-11-05
  • Trusted network is currently evaluated based on the trustworthiness of the nodes in the network; thus, trust in the nodes is required to achieve trust in the network. The methods for calculating node trust mainly utilize the following three types of models:node behavior model, multiple-attribute decision-making model and reputation model. User behavior model always determines trust values based on harmful node behaviors. Multi-attribute decision-making model can be regarded as refinements of node behavior model. The trust values of the nodes are determined based on compromised trust attribute data and not just harmful behavior data. Reputation model calculates the trust values of nodes using subjective evaluation data for nodes. This paper presents a comprehensive trust model that combines subjective evaluation data and objective attribute data to calculate node trust. The experimental results show that malicious nodes can be effectively identified, which improves the service success rate of the system.
  • loading
  • S. Sicari, A. Rizzardi, LA Grieco, et al., "Security, privacy and trust in Internet of things", Computer Networks the International Journal of Computer & Telecommunications Networking, Vol.76, No.15, pp.146-164, 2015.
    D. Meiling, X. Siya, S. Sujie, et al., "Blockchain-based reliable fog-cloud service solution for IIoT", Chinese Journal of Electronics, Vol.30, No.2, pp.359-366, 2021.
    Vamsi P R and Kant K, "Performance analysis of trust based geographic routing protocols for wireless sensor networks", Proceedings of 2014 3rd International Conference on Parallel, Distributed and Grid Computing (PDGC), pp.318-323, 2015.
    Movahedi Z and Hosseini Z, "A green trust-distortion resistant trust management scheme on mobile ad hoc networks", Wireless Personal Communications, Vol.30, No.16, pp.1c17, 2017.
    J. Du, C. Jiang, K.C. Chen, et al., "Community-structured evolutionary game for privacy protection in social networks", IEEE Transactions on Information Forensics & Security, Vol.13, No.3, pp.574-589, 2018.
    H. Xie, R. Ma and J. Lui,"Enhancing reputation via price discounts in E-commerce systems:A data-driven approach", ACM Transactions on Knowledge Discovery from Data, Vol.12, No.3, pp.1-29, 2018.
    X. Wang, W. Cheng, P. Mohapatra, et al., "Enabling reputation and trust in privacy-preserving mobile sensing", IEEE Transaction on Mobile Computing, Vol.13, No.12, pp.2777-2790, 2014.
    Z.Z. Xian, Q.L Li., X.Y. Huang, et al., "Differential privacy protection for collaborative filtering algorithms with explicit and implicit trust", Acta Electronica Sinica, Vol.46, No.12, pp.3051-3059, 2018. (in Chinese)
    Velten M, Schneider P, Wessel S, et al., "User identity verification based on touchscreen interaction analysis in Web contexts", Information Security Practice and Experience. Springer International Publishing, pp.268-282, 2015.
    T. Wesolwski and P. Kudlacik, "User profiling based on multiple aspects of activity in a computer system", Journal of Medical Informatics & Technologies, Vol.11, No.6, pp.121-130, 2014.
    J. Peng and N. Gao, "Research on identity trusted level evaluation mechanism based on user behavior analysis", Netinfo Security, Vol.9, pp.124-129, 2016.
    C. Lin, L.Q. Tian and Y.Z. Wang, "Research on user behavior trust in trustworthy network", Journal of Computer Research and Development, Vol.45, No.12, pp.2033-2043, 2008. (in Chinese)
    J.F. Tian, Y.L. Liu and R.Z. Du, "Trust evaluation model based node behavior character", Computer Research and Development, Vol.48, No.6, pp.934-944, 2011. (in Chinese)
    P.D. Meo, E. Ferrara, F. Abel, et al., "Analyzing user behavior across social sharing environments", ACM Transactions on Intelligent Systems & Technology, Vol.5, No.1, pp.1-31, 2013.
    J.J. Jung, "Trustworthy knowledge diffusion model based on risk discovery on peer-to-peer networks", Expert Systems with Applications, Vol.36, No.3, pp.7123-7128, 2009.
    D. Wu, F. Zhang, H. Wang, et al., "Security-oriented opportunistic data forwarding in mobile social networks", Future Generation Computer Systems, Vol.87, pp.803-815, 2018.
    X.Y. Li and X.L. Gui, "Trust quantitative model with multiple decision factors in trusted network", Chinese Journal of Computers, Vol.32, No.3, pp.405-416, 2009. (in Chinese)
    P.Y. Zhang, Y. Kong, M.C. Zhou, "A domain partition-based trust model for unreliable clouds", IEEE Transactions on Information Forensics & Security, Vol.13, No.9, pp.2167-2178, 2018.
    X. Yang, P. Luo and J. Gui, "The concept model of software trustworthiness based on trust-theory of sociology", Acta Electronica Sinica, Vol.47, No.11, pp.2344-2353, 2019. (in Chinese)
    G. Xiong, J.L Lang, Y.X. Hu, et al., "Evaluation approach for network components performance using trustworthiness measurement", Journal on Communications, Vol.37, No.3, pp.117-127, 2016. (in Chinese)
    G. Derbas et al., "TRUMMAR:A trust model for mobile agent systems based on reputation", Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS), pp.113-120, 2004.
    S.D. Kamvar, M.T. Schlosser and H. Garcia-Molina, "The eigentrust algorithm for reputation management in P2P networks", International Conference on World Wide Web. ACM, pp.640-651, 2003.
    G.Q Zhou and Q.K. Zeng, "Trust evaluation model based on role separation", Journal of Software, Vol.23, No.12, pp.3187-3197, 2012. (in Chinese)
    A.M. Kowshalya and M.L. Valarmathi, "Dynamic trust management for secure communications in social internet of things (SIoT)", Sadhana-Academy Proceedings in Engineering Sciences, Vol.43, No.9, pp.136-146, 2018.
    A. Josang and W. Quattrociocchi, "Advanced features in Bayesian reputation systems", International Conference on Trust, Privacy and Security in Digital Business (DBLP), pp.105-114, 2009.
    A. Josang and J. Haller, "Dirichlet reputation systems", Proceedings of 2nd International Conference on Availability, Reliability and Security, ARES 2007, pp.112-119, 2007.
    M. Coles, D. Kioussis and H. Veiga, "Reputation measurement and malicious feedback rating prevention in web service recommendation systems", IEEE Transactions on Services Computing, Vol.8, No.5, pp.755-767, 2015.
    H.G. Zhang, L. Chen and L.Q. Zhang, "Research on trusted network connection", Chinese Journal of Computers, Vol.33, No.4, pp.706-717, 2010. (in Chinese)
    Z. Yue, "An extended TOPSIS for determining weights of decision makers with interval numbers", Knowledge-Based Systems, Vol.24, No.1, pp.146-153, 2011.
    D.X. Huang, Z.Y. Wu and Y.Z Zong, "An Impersonal MultiAttribute Weight Allocation Method Based on Attribute Importance", System Engineering-Theory Methodology Applications, Vol.13, No.3, pp.201-207, 2004.
    M. Carbone, M. Nielsen, V. Sassone, "A Formal Model for Trust in Dynamic Networks", Proceedings-First International Conference onSoftware Engineering and Formal Methods, pp.54-61, 2003.
    P.D. Meo, A. Nocera, G. Quattrone, et al., "Finding reliable users and social networks in a social internetworking system", ACM International Conference Proceeding Series, pp.173-181, 2009.
    Z.Q. Guo, Q. Wang, Y.D. Wan, et al., "A classification prediction mechanism based on comprehensive assessment for wireless link quality", Journal of Computer Research and Development, Vol.50, No.6, pp.1227-1238, 2013. (in Chinese)
    S. Ganeriwal, L.K. Balzano, M.B. Srivastava, "Reputationbased framework for high integrity sensor networks", ACM Transactions on Sensor Networks, Vol.4, No.3, pp.66-77, 2008.
    W. Fang, C. Zhang, Z. Shi, et al., "BTRES:Beta-based trust and reputation evaluation system for wireless sensor networks", Journal of Network and Computer Applications, Vol.59, pp.88-94, 2016. (in Chinese)
    C. Tian and B. Yang, "A D-S evidence theory based fuzzy trust model in file-sharing P2P networks", Peer-to-Peer Networking and Applications, Vol.7, No.4, pp.332-345, 2014.
    S.X. Wang, L. Zhang and H.S. Li, "Evaluation approach of subjective trust based on cloud model", Journal of Software, Vol.21, No.6, pp.1341-1352, 2010. (in Chinese)
    J. Wang, Y. Zhang, Y. Wang, et al., "RPRep:A robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs", International Journal of Distributed Sensor Networks, Vol.3, No.4, pp.1-15, 2016.
    E. Ayday and F. Fekri, "Iterative trust and reputation management using belief propagation", IEEE Transactions on Dependable & Secure Computing, Vol.9, No.3, pp.375-386, 2012.
    W.A. Raja, Z. Anazida, et al., "BTEM:Belief based trust evaluation mechanism for wireless sensor networks", Future Generation Computer Systems, Vol.96, pp.605-616, 2019.
    J. J. Guo, J.F. Ma, Q. Li, et al., "Game theory based trust management method for mobile ad hoc networks", Journal on communications, Vol.35, No.11, pp.50-58, 2014. (in Chinese)
    M.S. Fallah, M. Mouzarani, A Game-based Sybil-resistant Strategy for Reputation Systems in Self-organizing MANETs, Oxford University Press, 2011.
    Y. Wu, K. Liu, "An information secrecy game in cognitive radio networks", IEEE Transactions on Information Forensics & Security, Vol.6, No.3, pp.831-842, 2011.
    H. Yahyaoui, "A trust-based game theoretical model for Web services collaboration", Knowledge-Based Systems, Vol.27, No.3, pp.162-169, 2012.
    J. Pawlick and Q. Zhu, "Strategic trust in cloud-enabled cyber-physical systems with an application to glucose control", IEEE Transactions on Information Forensics & Security, Vol.12, No.12, pp.2906-2919, 2017.
    S. Nepal, W. Sherchan and A. Bouguettaya, "A behaviourbased trust model for service web", IEEE International Conference on Service-Oriented Computing and Applications. IEEE, pp.1c4, 2010.
    J.Y. Ma, Z.J. Zhao and X.Y. Ye, "User behavior assessment in trusted network based on fuzzy decision analysis", Computer Engineering, Vol.37, No.13, pp.125-131, 2011. (in Chinese)
    B.R. Cha, P. Sun and J.W. Kim, "A fake content remove scheme using binomial distribution characteristics of collective intelligence in peer-to-peer environment", Iete Journal of Research, Vol.57, No.5, pp.423-429, 2011.
    L. Zhang, Y.W. Huang, J. Xuan, et al., "Trust evaluation model based on PSO and LSTM for huge information environments", Chinese Journal of Electronics, Vol.30, No.1, pp.92-101, 2021.
    P.F. Shen, S.F. Liu and L. Han, "Distrust prediction in signed social network", Chinese Journal of Electronics, Vol.28, No.1, pp.188-194, 2019.
    J. Yang, X.J. Zhu, X.Z. Zhou, et al., "Personalized Web service recommendation based on heterogeneous social network", Acta Electronica Sinica, Vol.48, No.2, pp.341-349, 2020. (in Chinese)
    Z.G. Shi, J.W. Liu and Z.L. Wang, "Dynamic P2P trust model based on time-window feedback mechanism", Journal on communications, Vol.31, No.2, pp.120-129, 2010. (in Chinese)
    B.W. Xu and Y.M. Zhou, "An improved accuracy measure for rough sets", Journal of Computer and Information Science, Vol.71, No.2, pp.163-173, 2005. (in Chinese)
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (338) PDF downloads(30) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return