期刊文献+

CERep:一种可信度增强的信誉机制 被引量:1

CERep: A credibility enhanced reputation mechanism
下载PDF
导出
摘要 增强信誉机制对信誉信息的有效聚合能力是信誉系统成功的基础。已有的基于局部信誉信息的信誉系统难以有效处理节点的复杂策略不诚实推荐行为,并且可能把提供诚实推荐的节点错误划分为不诚实节点。对此,提出了一种可信度增强的信誉机制CERep。该机制中,节点基于自身的经验产生的直接信任评价,包含直接信任评价值和关于此评价值的信心因子两个部分。在此基础上,提出了新的基于信誉的信任评价算法和推荐可信度计算模型,并给出了信誉机制的分布式实现策略。分析和模拟实验表明,CERep信誉机制能够有效应对复杂策略的不诚实推荐行为,提高信任评价的准确性,实现对节点推荐可信度更公平的评价。 Enhancing reputation mechanism's capability of aggregating reputation information effectively is the foundation of a successful reputation system. Current reputation systems based on localized reputation information cannot process such strategic recommendations as correlative and collusive ratings. Furthermore there exists unfairness to blameless peers in these models. Therefore,a Credibility Enhanced Reputation mechanism CERep is presented. In CERep,a peer uses its experiences to compute the direct trust valuation which contains direct trust value and level of confidence about this value,then a reputation-based trust valuation scheme and recommendation credibility computation model is proposed. Moreover,the strategies used for implementing the reputation mechanism are also discussed. Theoretical analysis and simulation show that CERep reputation mechanism proposed can help peers effectively detect dishonest recommendations in a variety of scenarios where more complex malicious strategies are introduced,and achieve a more accurate trust valuation and fair evaluation of recommendations.
出处 《国防科技大学学报》 EI CAS CSCD 北大核心 2014年第2期105-112,共8页 Journal of National University of Defense Technology
基金 国家自然科学基金资助项目(61202119) 863高科技计划发展项目(2012AA01A301 2013AA014301 2013AA01A208)
关键词 信誉机制 推荐 信任 信誉 reputation mechanism recommendation trust reputation
  • 相关文献

参考文献23

  • 1Dellazocas C. Reputation mechanism design in online trading environments with pure moral hazard [ J]. Information Systems Research, 2005, 16 (2) : 209 -230.
  • 2Walch K, Sirer E G. Experience with an object reputation system for peer-to-peer file sharing [ C ]//Proceedings of the 3rd Conference on Networked Systems Design & Implementation, 2006,3 : 1 - 14.
  • 3Resnick P, Kuwabara K, Zeckhauser R, et al. Reputation systems [J]. Communications of the ACM, 2000, 43 (12) : 45 - 48.
  • 4Jcsang A, Ismail R, Boyd C. A survey of trust and reputation systems for online service provision [ J ]. Decision Support Systems, 2007, 43(2): 618 -644.
  • 5Zhang Q, Yu T, Irwin K. A classification scheme for trust functions in reputation-based trust management [ C ]//ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan, 2004.
  • 6赵环宇,李晓林.H-Trust:A Group Trust Management System for Peer-to-Peer Desktop Grid[J].Journal of Computer Science & Technology,2009,24(5):833-843. 被引量:2
  • 7Aberer K. P-Grid: A self-organizing access structure for P2P information systems[ C ]//Proceeding of the Sixth International Conference on Cooperative Information Systems, 2001, LNCS 2172:179 - 194.
  • 8Ratnasamy S, Francis P, Handley M, et al. A scalable content- addressable network[ C ]// ACM SIGCOMM Computer Communication Review,2001,31 (4) : 161 - 172.
  • 9Sabater-Mir J. Trust and reputation for agent societies [ D ]. Barcelona:University Autibnoma de Barcelona, 2002.
  • 10Withby A, Josang A, Indulska J. Filtering out unfair ratings in Bayesian reputation systems [ J ]. The Icfaian Journal of Management Research, 2005, 4(2) :48 -64.

二级参考文献52

  • 1Stoica I, Morris R, Karger D, Kaashoek M F, Balakrishnan H. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proc. ACM SIGCOMM2001, San Diego, USA, August 2931, 2001, pp.149-160.
  • 2Ratnasamy S, Francis P, Handley M, Karp R, Shenker S. A scalable content-addressable network. In Proc. ACM SIGCOMM2001, San Diego, USA, August 27-31, 2001, pp.161- 172.
  • 3Kubiatowicz J, Bindel D, Chen Y, Eaton P, Geels D, Gummadi R, Rhea S, Weatherspoon H, Weimer W, Wells C, Zhao B. OceanStore: An extremely wide-area storage system. Technical Report, U.C. Berkeley UCB//CSD-00-1102, 1999.
  • 4Resnick P, Zeckhauser R, Kuwabara K, Friedman E. Reputation systems. Communications of the A CM, December 2000, 43(12): 45- 48.
  • 5Zhao H, Li X. H-Trust: A robust and lightweight group reputation system for peer-to-peer desktop grid. In Proc. the 28th International Conference on Distributed Computing Systems Workshops (ICDCS2008), Beijing, China, June 17-20, 2008, pp.235- 240.
  • 6Hirsch J E. An index to quantify an individual's scientific research output. Proc. Nat. Acad. Sci., doi:10.1073/pnas. 0507655102, 2005, 102(46): 16569-16572.
  • 7eBay. Aug. 2009, http;//www.ebay.com.
  • 8Xiong L, Liu L. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, July 2004, 16(7): 843- 857.
  • 9Kamvar S D, Schlosser M T, Molina H G. The eigentrust algorithm for reputation management in P2P networks. In Proe. the 12th International Conference on World Wide Web (WWW2003), Budapest, Hungary, May 20-24, 2003, pp.640- 651.
  • 10Zhou R, Hwang K. PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, May 2007, 18(4): 460-473.

共引文献101

同被引文献16

  • 1洪亮,洪帆,彭冰,陈晶.一种基于邻居信任评估的虫洞防御机制[J].计算机科学,2006,33(8):130-133. 被引量:18
  • 2Yang Hao, Luo Haiyun, Ye Fan, et al. Security in mobile ad hoc networks:challenges and solutions [ J ]. IEEE Wireless Communications ,2004,11 ( 1 ) :38-47.
  • 3Hu Y, Perrig A, Johnson D B. Wormhole attacks in wireless networks [ J ]. Selected Areas in Communications, 2006, 24 (2) :370-380.
  • 4Mahajan V, Natu M, Sethi A. Analysis of wormhole intrusion attacks in MANETS [ C ]//Proc of military communications conference. [ s. l. ] : IEEE ,2008 : 1-7.
  • 5Brad K, Kung H T. GPSR: greedy perimeter stateless muting for wireless networks [ C ]//Proceedings of the 6th annual in- ternational conference on mobile computing and networking. Boston, Massachusetts, USA : [ s. n. ] ,2000:243 -254.
  • 6Hu Yih-Chun,Perrig A,Johnson D B. Packet leashes:a de- fense against wormhole attacks in wireless networks [ C ]// Proc of twenty- second annual joint conference of the IEEE computer and communications. [ s. l. ] : IEEE, 2003 : 1976 - 1986.
  • 7Khan Z A, Islam M H. Wormhole attack : a new detection tech- nique [ C ]//Proc of international conference on emerging technologies. Islamabad : IEEE ,2012 : 1-6.
  • 8Hayajneh T, Krishnamurthy P, Tipper D. DeWorm:a simple protocol to detect wormhole attacks in wireless ad hoc net- works[ C ]//Proc of 2009 third international conference on network and system security. [ s. l. ] : IEEE Computer Society, 2009:73-80.
  • 9Marmol F G,Perez G M. TRMSim-WSN, trust and reputation models simulator for wireless sensor networks [ C ]//Proc of IEEE international conference on communications. [ s. l. ] : IEEE ,2009 : 1-5.
  • 10Al-Karaki J N, Kamal A E. Routing techniques in wireless sensor networks : a survey [ J ]. IEEE Wireless Communica- tions,2004,11 (6) :6-28.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部