Research On A Trust Model Based On the Qos and Malicious Node Deletion

被引:0
|
作者
Jing, Jiang [1 ]
Yu Yonghong [1 ]
机构
[1] Nan Jing Univ Sci & Technol, Dept Comp Sci & Technol, Nanjing, Peoples R China
关键词
option; discounting; consensus; trust model; triangular fuzzy number;
D O I
10.1109/CBD.2018.00045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud environment the nodes provide services with QoS guarantee, so how to choose a credible service is a critical problem. In this paper it is proposed that a kind of mechanism how to construct basic probability assignment based on the Qos constraints that the services provide, and in the process of building the basic probability assignment a partial relation is inducted in order to remove the worthless history information and considering the uncertain information. And based on the discounting operator and the consensus cooperator, the reputation options from different grid nodes can be integrated. In order to prevent being cheating by the malicious nodes, the method of triangular fuzzy number is used to sort the different nodes. Then the deferring operator is inducted to compute the reputation opinion. Simulation tests prove that the model can tackle the trust problem in a simple and efficient way.
引用
收藏
页码:208 / 214
页数:7
相关论文
共 50 条
  • [21] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    V. Ram Prabha
    P. Latha
    Wireless Personal Communications, 2017, 94 : 2549 - 2559
  • [22] Recommendation Trust for Improved Malicious Node Detection in Ad hoc Networks
    Ahmed, Saneeha
    Tepe, Kemal
    2017 IEEE 86TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-FALL), 2017,
  • [23] Fuzzy Trust Protocol for Malicious Node Detection in Wireless Sensor Networks
    Prabha, V. Ram
    Latha, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 94 (04) : 2549 - 2559
  • [24] Research on a P2P Supper Node Selection Mechanism Based on Trust Model
    Hongfang-Luo
    Lai-Deng
    Di-Wen
    PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013), 2013, : 851 - 854
  • [25] Trusted Opportunistic Routing Based on Node Trust Model
    Su, Bing
    Du, Chenhui
    Huan, Juan
    IEEE ACCESS, 2020, 8 (08): : 163077 - 163090
  • [26] Trust Evaluation Model based Node Behavior Character
    Tian, Junfeng
    Liu, Yuling
    Du, Ruizhong
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (10): : 3351 - 3371
  • [27] Trust Model to Minimize the Influence of Malicious Attacks in Sharding Based Blockchain Networks
    Halgamuge, Malka N.
    Hettikankanamge, Samurdika C.
    Mohammad, Azeem
    2020 IEEE THIRD INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND KNOWLEDGE ENGINEERING (AIKE 2020), 2020, : 162 - 167
  • [28] Exploring Machine Learning Algorithms for Malicious Node Detection Using Cluster-Based Trust Entropy
    Kanthimatih, S.
    IEEE ACCESS, 2024, 12 : 137913 - 137925
  • [29] Trust Based Malicious Nodes Detection in MANET
    Gong, Wei
    You, Zhiyang
    Chen, Danning
    Zhao, Xibin
    Gu, Ming
    Lam, Kwok-Yan
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 205 - +
  • [30] Collaborative QoS Prediction via Feedback-based Trust Model
    Chen, Liang
    Feng, Yipeng
    Wu, Jian
    2013 IEEE SIXTH INTERNATIONAL CONFERENCE ON SERVICE-ORIENTED COMPUTING AND APPLICATIONS (SOCA), 2013, : 206 - 213