Node Behavior Trust Evaluation Model Based on Sliding Window

2012 ◽  
Vol 155-156 ◽  
pp. 138-142
Author(s):  
Qi Zhu

In order to improve confidence of the node behavior the credibility assessing, this paper presents the nodes behavior of the trust evaluation mechanism based on sliding window, Through the sliding window Assessment strategies to ensure the trust assessment to meet the node behavior assessment principles, Assessment strategies is good combination of confidence assessment method of the subjective and assessment content of the objectivity to ensure contacts number ofa large number of nodes (Nmin) at the same time maintaining good scalability, trust assessment reflects the importance of the recent behavior and the attenuation of long-term behavior, with a "slow rise" and "fast drop" feature, the algorithm with good against fraud and punishment of malicious nodes .

Author(s):  
Shengju Yang

In order to solve the trust problems between users and cloud computing service providers in cloud computing services, the existing trust evaluation technology and access control technology in the cloud computing service are analyzed. And the evaluation index of cloud computing is also analyzed. Users can calculate the relevant indicators of cloud computing service according to their own business goals, and choose the appropriate cloud computing services according to their own trust need. In addition, the reliability assessment method of users based on the service process is proposed. Cloud computing access control system can be used for user credibility evaluation, and it can handle user access requests according to user's creditability. In the study, a cloud computing service trust evaluation tool is designed, and the modeling and architecture designs of trust evaluation are also given. The effectiveness of the method is verified by experiments on cloud computing service evaluation methods.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 70298-70312
Author(s):  
Yang Xiao ◽  
Qingqi Pei ◽  
Xuefeng Liu ◽  
Shui Yu

2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Zhiming Zhang ◽  
Yu Yang ◽  
Wei Yang ◽  
Fuying Wu ◽  
Ping Li ◽  
...  

The current detection schemes of malicious nodes mainly focus on how to detect and locate malicious nodes in a single path; however, for the reliability of data transmission, many sensor data are transmitted by multipath in wireless sensor networks. In order to detect and locate malicious nodes in multiple paths, in this paper, we present a homomorphic fingerprinting-based detection and location of malicious nodes (HFDLMN) scheme in wireless sensor networks. In the HFDLMN scheme, using homomorphic fingerprint and coding technology, the original data is divided into n packets and sent to the base station along n paths, respectively; the base station determines whether there are malicious nodes in each path by verifying the validity of the packets; if there are malicious nodes in one or more paths, the location algorithm of the malicious node is implemented to locate the specific malicious nodes in the path; if all the packets are valid, the original data is recovered. The HFDLMN scheme does not need any complex evaluation model to evaluate and calculate the trust value of the node, nor any monitoring nodes. Theoretical analysis results show that the HFDLMN scheme is secure and effective. The simulation results demonstrate promising outcomes with respect to key parameters such as the detection probability of the malicious path and the locating probability of the malicious node.


Sign in / Sign up

Export Citation Format

Share Document