scholarly journals Trust Evaluation Model for P2P Networks based on Time and Interaction

2018 ◽  
Vol 208 ◽  
pp. 05005
Author(s):  
Ke Xuemeng ◽  
Zhou Guofu ◽  
Du Zhoumin

The traditional centralized trusting mechanism does not meet the requirements of the modern P2P network, so it is necessary to establish a distributed trusting mechanism to strengthen the system’s reliability. Factors including time attenuation factor, interactive frequency factor, interactive size factor and average online time factor markedly influence the trust of the nodes in a P2P network. This paper defines the precise effects of these factors on trust and proposes a comprehensive trust model and global trust model based on direct trust and indirect trust.

2017 ◽  
Vol 2017 ◽  
pp. 1-16 ◽  
Author(s):  
Zhengwang Ye ◽  
Tao Wen ◽  
Zhenyu Liu ◽  
Xiaoying Song ◽  
Chongguo Fu

Trust evaluation is an effective method to detect malicious nodes and ensure security in wireless sensor networks (WSNs). In this paper, an efficient dynamic trust evaluation model (DTEM) for WSNs is proposed, which implements accurate, efficient, and dynamic trust evaluation by dynamically adjusting the weights of direct trust and indirect trust and the parameters of the update mechanism. To achieve accurate trust evaluation, the direct trust is calculated considering multitrust including communication trust, data trust, and energy trust with the punishment factor and regulating function. The indirect trust is evaluated conditionally by the trusted recommendations from a third party. Moreover, the integrated trust is measured by assigning dynamic weights for direct trust and indirect trust and combining them. Finally, we propose an update mechanism by a sliding window based on induced ordered weighted averaging operator to enhance flexibility. We can dynamically adapt the parameters and the interactive history windows number according to the actual needs of the network to realize dynamic update of direct trust value. Simulation results indicate that the proposed dynamic trust model is an efficient dynamic and attack-resistant trust evaluation model. Compared with existing approaches, the proposed dynamic trust model performs better in defending multiple malicious attacks.


2013 ◽  
Vol 397-400 ◽  
pp. 1949-1953 ◽  
Author(s):  
Feng Li ◽  
Ya Li Si

Trust mechanism has been identified as one of key areas in the field of Internet security. Our objective in this paper is to develop a dynamic trust evaluation model for Internet computing. The proposed scheme divides the recommendation trust into the direct recommendation trust and the indirect recommendation trust, and considers variety of factors to calculate the two types of recommendation trust degree. Simulation results show that, compared to the existing trust model, the model can effectively improve the accuracy of trust evaluation, and provide a better capacity of resisting malicious entities.


2013 ◽  
Vol 791-793 ◽  
pp. 1105-1108
Author(s):  
Xia Li Li ◽  
Jing Jing Xiang ◽  
Su Juan Zhang ◽  
Xiao Hua Yang

EigenTrust is a typical global trust model which presents a distributed and secure method to compute the global trust values for peer to peer network, but it cant judge the authenticity of the evaluation from the requesting service peer. To alleviate the problem, we present an improved algorithm based on EigenTrust trust model, called EnhanEigen. We use malicious percentage (mp) and feedback consistency percentage (fcp) as the new trust evaluation criterion to filter malicious peers. By changing the ways in which peers submit feedbacks and using comprehensive trust value, our trust model can distinguish false feedback to resist to malicious attack. Simulation experiments demonstrate that it has a better performance on ensuring the success rate of transactions and has the shorter algorithm execution time.


2012 ◽  
Vol 263-266 ◽  
pp. 1085-1090
Author(s):  
Yan Hao

The anonymity and dynamic characters of P2P network make it become hotbed with selfish and malicious behaviors. To improve the wholly quality and security of the network, this paper gives a new distributed trust model to evaluate the trust values of peers which introduces the concept of interaction satisfaction and concerns on both direct and indirect trust. The experiment data shows that this trust model can distinguish good peers and make them have the high ratio of successful interactions.


2019 ◽  
Vol 2019 ◽  
pp. 1-11 ◽  
Author(s):  
Yubiao Wang ◽  
Junhao Wen ◽  
Xibin Wang ◽  
Bamei Tao ◽  
Wei Zhou

Cloud services are cloud computing resources and applications deployed on the Internet or cloud computing platform, and users can access the required cloud services at any time. However, users face the diversity and complexity of quality of service (QoS) when evaluating and selecting cloud services. Therefore, it is important to study and establish an effective and objective trust model to improve user satisfaction and interaction success rate. In this paper, a model based on combining weights and gray correlation analysis is proposed. Firstly, direct trust, recommendation trust, and reputation together form a comprehensive trust, resulting in a more accurate overall trust. Second, rough set theory and analytic hierarchy process (AHP)-based method are used for the direct trust. Meanwhile, the degree of similarity recommendation trust is calculated by a gray relational analysis method. In order to ensure the accuracy of direct trust, this paper proposes a dynamic trust update mechanism. Finally, the simulation experiment is carried out to verify that the cloud services trust evaluation model (CSTEM) is more robust than the other three methods. It protects against malicious entities; at the same time, it can increase user satisfaction and interaction success rate.


2019 ◽  
Vol 13 (2) ◽  
pp. 94-100
Author(s):  
Dolly Sharma ◽  
Shailendra Singh ◽  
Mamta Mittal

Background: Grid computing relates to a pool of resources to be shared by users in Grid Environment. Security of the resources from users and vice-versa is a significant issue. This is where the notion of trust comes into existence. A number of researchers have proposed models for evaluation of trust in grid computing, but they fail to spot one or the other parameters for trust evaluation. The essence of trust models in grid computing is that they offer autonomic trust management. An autonomic trust model has been patented by Z. Yan and C. Prehofer in 2009. Another patent was published by Anna University in 2010 to evaluate the trustworthiness of a resource provider in Grid environment. Objective: This paper firstly focuses and illustrates these essential parameters. Based on these parameters, further, a comparison of some existing models for trust evaluation is shown. Finally, common parameters missed out by various models have been highlighted giving way for improvements of Trust model. Methods: A Trust evaluation model has been proposed by us previously based on a number of real-world trust evaluation parameters. This model sees trust as a three-dimensional entity. Trust is based on Dempter Shafer’s theory in which trust is calculated mathematically. Results: Software trust needs to be calculated mathematically. There are a large number of real-world parameters that need to be included for evaluating trust. Conclusion: As trust models in research are based on simulation techniques, so it is important to include real-world factors that affect trust value of one entity on other. Some of those parameters, missed by most of the models have been identified for inclusion in future trust models.


2020 ◽  
Vol 2020 ◽  
pp. 1-6
Author(s):  
Congcong Shi ◽  
Jiaxuan Fei ◽  
Xiaojian Zhang ◽  
Qigui Yao ◽  
Jie Fan

In power Internet of Things environment, the existing border-based protection system and the “one-time authentication, one-time authorization, and long-term effective” approach are difficult to deal with the threat of attacks from internal and external devices and users with legal authority. In order to solve the problem of authorized access of power equipment and users, combined with behavior risk assessment, a continuous trust evaluation scheme of power equipment and users is presented in this paper. The scheme is evaluated by the combination of direct trust, indirect trust, and comprehensive trust and adds the penalty reward factor and time attenuation function to improve the reliability of the results. In addition, this paper will quantify the risk of the behavior of power equipment and users and regard it as a factor affecting the degree of trust, so as to achieve continuous trust evaluation of equipment and users.


Sign in / Sign up

Export Citation Format

Share Document