• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Luo Junhai, Fan Mingyu. A Subjective Trust Management Model Based on Certainty-Factor for MANETs[J]. Journal of Computer Research and Development, 2010, 47(3): 515-523.
Citation: Luo Junhai, Fan Mingyu. A Subjective Trust Management Model Based on Certainty-Factor for MANETs[J]. Journal of Computer Research and Development, 2010, 47(3): 515-523.

A Subjective Trust Management Model Based on Certainty-Factor for MANETs

More Information
  • Published Date: March 14, 2010
  • In mobile Ad-hoc networks (MANETs), due to their anonymous and self-organization nature mobile nodes have to manage the risks involved in the transactions without prior knowledge about each others reputation. The sample space of evidence may be not integrative or reliable because of the change of network topology or the occurrence of wireless collision, so the existing trust evaluation models cant be applied. To solve the problem of trust evaluation and establish the trust relationship between nodes, CFSTrust, a subjective trust management model, is proposed to quantify and evaluate the trustworthiness of nodes. Its mathematical description and implementation are also given. The fuzzy-similarity and certainty-factor are used to model the issues of trust management. The evaluation of subjective trust is discussed, the derivation rules of recommendation trust relationships in MANETs are presented and a subjective trust management model is provided. Theoretical analyses and experimental results show the model is more effective compared with the trust model based on evidence-evaluation (TrustNet). The formal model proposed provides a new valuable way for MANETs environments.
  • Related Articles

    [1]Jiao Pengfei, Chen Shuxin, Guo Xuan, He Dongxiao, Liu Dong. Survey on Graph Neural Ordinary Differential Equations[J]. Journal of Computer Research and Development, 2024, 61(8): 2045-2066. DOI: 10.7544/issn1000-1239.202440192
    [2]Han Songshen, Guo Songhui, Xu Kaiyong, Yang Bo, Yu Miao. Perturbation Analysis of the Vital Region in Speech Adversarial Example Based on Frame Structure[J]. Journal of Computer Research and Development, 2024, 61(3): 685-700. DOI: 10.7544/issn1000-1239.202221034
    [3]Shen Yijie, Li Liangcheng, Liu Ziwei, Liu Tiantian, Luo Hao, Shen Ting, Lin Feng, Ren Kui. Stealthy Attack Towards Speaker Recognition Based on One-“Audio Pixel” Perturbation[J]. Journal of Computer Research and Development, 2021, 58(11): 2350-2363. DOI: 10.7544/issn1000-1239.2021.20210632
    [4]Meng Yinfeng, Liang Jiye. Linear Regularized Functional Logistic Model[J]. Journal of Computer Research and Development, 2020, 57(8): 1617-1626. DOI: 10.7544/issn1000-1239.2020.20200496
    [5]Feng Da, Zhou Fucai, Wang Qiang, Wu Qiyu. Efficient Verifiable Outsourcing of Solving Large-Scale Linear Equations with Low Storage Overhead[J]. Journal of Computer Research and Development, 2019, 56(5): 1123-1131. DOI: 10.7544/issn1000-1239.2019.20180191
    [6]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [7]Cui Zhen, Shan Shiguang, Chen Xilin. Structured Sparse Linear Discriminant Analysis[J]. Journal of Computer Research and Development, 2014, 51(10): 2295-2301. DOI: 10.7544/issn1000-1239.2014.20130188
    [8]Feng Lin, Liu Shenglan, Zhang Jing, and Wang Huibing. Robust Activation Function of Extreme Learning Machine and Linear Dimensionality Reduction in High-Dimensional Data[J]. Journal of Computer Research and Development, 2014, 51(6): 1331-1340.
    [9]Li Shengmei, Cheng Buqi, Gao Xingyu, Qiao Lin, Tang Zhizhong. A Method on Analyzing Performance Sensitivity of Applications Based on Partial Derivatives of Non-linear Regression Equation[J]. Journal of Computer Research and Development, 2010, 47(9): 1654-1662.
    [10]Wu Jiying and Ruan Qiuqi. A Curvature-Driven Image Inpainting Model Based on Helmholtz Vorticity Equation[J]. Journal of Computer Research and Development, 2007, 44(5): 860-866.

Catalog

    Article views (747) PDF downloads (762) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return