Research On A Trust Model Based On the Qos and Malicious Node Deletion

被引:0
|
作者
Jing, Jiang [1 ]
Yu Yonghong [1 ]
机构
[1] Nan Jing Univ Sci & Technol, Dept Comp Sci & Technol, Nanjing, Peoples R China
关键词
option; discounting; consensus; trust model; triangular fuzzy number;
D O I
10.1109/CBD.2018.00045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud environment the nodes provide services with QoS guarantee, so how to choose a credible service is a critical problem. In this paper it is proposed that a kind of mechanism how to construct basic probability assignment based on the Qos constraints that the services provide, and in the process of building the basic probability assignment a partial relation is inducted in order to remove the worthless history information and considering the uncertain information. And based on the discounting operator and the consensus cooperator, the reputation options from different grid nodes can be integrated. In order to prevent being cheating by the malicious nodes, the method of triangular fuzzy number is used to sort the different nodes. Then the deferring operator is inducted to compute the reputation opinion. Simulation tests prove that the model can tackle the trust problem in a simple and efficient way.
引用
收藏
页码:208 / 214
页数:7
相关论文
共 50 条
  • [1] Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks
    She, Wei
    Liu, Qi
    Tian, Zhao
    Chen, Jian-Sen
    Wang, Bo
    Liu, Wei
    IEEE ACCESS, 2019, 7 : 38947 - 38956
  • [2] Detection and Trust Evaluation of the SGN Malicious node
    Al Yahmadi, Faisal
    Ahmed, R. Muhammad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (06): : 89 - 100
  • [3] A Malicious Node Detection Strategy Based on Fuzzy Trust Model and the ABC Algorithm in Wireless Sensor Network
    Pang, Baohe
    Teng, Zhijun
    Sun, Huiyang
    Du, Chunqiu
    Li, Meng
    Zhu, Weihua
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (08) : 1613 - 1617
  • [4] A Fair Trust-Based Malicious Node Detection and Isolation Scheme for WSNs
    Zawaideh, Firas
    Salamah, Muhammed
    Al-Bahadili, Hussein
    PROCEEDINGS OF 2017 2ND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF INFORMATION TECHNOLOGY IN DEVELOPING RENEWABLE ENERGY PROCESSES & SYSTEMS (IT-DREPS 2017), 2017,
  • [5] An Enhanced Trust-Based Secure Route Protocol for Malicious Node Detection
    Pari, S. Neelavathy
    Sudharson, K.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2023, 35 (02): : 2541 - 2554
  • [6] Identifying Malicious Node Using Trust Value in Cluster Based MANET (IMTVCM)
    Annadurai, P.
    Vijayalaksmi, S.
    2014 INTERNATIONAL CONFERENCE ON CONTROL, INSTRUMENTATION, COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICCICCT), 2014, : 1150 - 1158
  • [7] A hybrid malicious node detection approach based on fuzzy trust model and Bayesian belief in wireless sensor networks
    Shi W.
    International Journal of Wireless and Mobile Computing, 2024, 27 (01) : 56 - 63
  • [8] Trust Management Model Based on Malicious Filtered Feedback in Cloud
    Varalakshmi, P.
    Judgi, T.
    Balaji, D.
    DATA SCIENCE ANALYTICS AND APPLICATIONS, DASAA 2017, 2018, 804 : 178 - 187
  • [9] Research on node-state in QoS based networks
    Han, LN
    Ma, ZX
    Hu, HY
    International Symposium on Communications and Information Technologies 2005, Vols 1 and 2, Proceedings, 2005, : 46 - 49
  • [10] Trust evaluation model with entropy-based weight assignment for malicious node's detection in wireless sensor networks
    Yin, Xueqiang
    Li, Shining
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2019, 2019 (01)