• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Ye Ayong, Ma Jianfeng. A Trust Valuation Model in MANET[J]. Journal of Computer Research and Development, 2008, 45(5): 765-771.
Citation: Ye Ayong, Ma Jianfeng. A Trust Valuation Model in MANET[J]. Journal of Computer Research and Development, 2008, 45(5): 765-771.

A Trust Valuation Model in MANET

More Information
  • Published Date: May 14, 2008
  • Being infrastructureless, node trust plays an important role in security and reliability of mobile ad hoc networks. A new trust valuation model based on the experience of node is given to evaluate trustworthiness between network nodes. To improve the accuracy and rationality of node trust evaluation in a mobile network, the evidence theory is introduced to evaluate trust and combine multilateral experience from others. In addition, observationframe is introduced to incorporate experience’s timesensitivity, which provides adequate support to cope with strategically altering behaviors of malicious nodes efficiently. A lowcost recommendation technique based on sleep mechanism is provided for neighboring nodes to share experience information, which obtains faster convergence rate and reduces the whole energy dissipation. Together, recommendation trust is quantitatively evaluated by a fuzzy similarity measure, which significantly increases the resilience against dishonest feedbacks. In comparison with the existing works, a complete trust valuation model is designed, with emphasis on its adaptability to dynamics of trust, robustness and resourcesaving. This model can be used in coordination and security decision for network services. Finally, the theoretical analysis and simulations is given to evaluate the proposed techniques.
  • Related Articles

    [1]Duan Zhuohui, Liu Haikun, Zhao Jinwei, Liu Yihang, Liao Xiaofei, Jin Hai. A Reconfigurable Cache Consistency Mechanism for Distributed Memory Pool[J]. Journal of Computer Research and Development, 2023, 60(9): 1960-1972. DOI: 10.7544/issn1000-1239.202330448
    [2]Wei Zheng, Dou Yu, Gao Yanzhen, Ma Jie, Sun Ninghui, Xing Jing. A Consistent Hash Data Placement Algorithm Based on Stripe[J]. Journal of Computer Research and Development, 2021, 58(4): 888-903. DOI: 10.7544/issn1000-1239.2021.20190732
    [3]Tian Junfeng, Wang Yanbiao. Causal-Pdh: Causal Consistency Model for NoSQL Distributed Data Storage Using HashGraph[J]. Journal of Computer Research and Development, 2020, 57(12): 2703-2716. DOI: 10.7544/issn1000-1239.2020.20190686
    [4]Wang Jieting, Qian Yuhua, Li Feijiang, Liu Guoqing. Support Vector Machine with Eliminating the Random Consistency[J]. Journal of Computer Research and Development, 2020, 57(8): 1581-1593. DOI: 10.7544/issn1000-1239.2020.20200127
    [5]Chen Bo, Lu Youyou, Cai Tao, Chen Youmin, Tu Yaofeng, Shu Jiwu. A Consistency Mechanism for Distributed Persistent Memory File System[J]. Journal of Computer Research and Development, 2020, 57(3): 660-667. DOI: 10.7544/issn1000-1239.2020.20190074
    [6]Sun Xuejiao and Liu Jinglei. On the Satisfiability and Consistency for CP-nets[J]. Journal of Computer Research and Development, 2012, 49(4): 754-762.
    [7]Lu Yan, Hao Zhongxiao, Zhang Liang. An Algorithm for Checking Absolute Consistency of DTDs[J]. Journal of Computer Research and Development, 2005, 42(11): 1977-1982.
    [8]Xiong Jin, Fan Zhihua, Ma Jie, Tang Rongfeng, Li Hui, Meng Dan. Metadata Consistency in DCFS2[J]. Journal of Computer Research and Development, 2005, 42(6): 1019-1027.
    [9]Zhang Zhongping, Wang Chao, Zhu Yangyong. Constraint-Based Normalization Algorithms for XML Documents[J]. Journal of Computer Research and Development, 2005, 42(5): 755-764.
    [10]Lu Yan, Zhang Liang, Duan Qiyang, Shi Baile. DTD-Based XML Indexing[J]. Journal of Computer Research and Development, 2005, 42(1): 30-37.

Catalog

    Article views (755) PDF downloads (621) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return