期刊文献+

一种改进的社会网络动态信任模型 被引量:2

An Improved Dynamic Trust Model in Social Network
下载PDF
导出
摘要 社会网络中,针对信任计算过程中出现的恶意节点通过提供低质量服务和节点的动态摇摆的攻击从而达到某种利益而导致网络中恶意服务的增多,导致节点之间的信任不可信或者不可靠,给节点的交互带来一定的不安全性等问题进行了研究。通过分析节点的信任评估行为,节点共谋产生不信任的推荐,提出了一种改进的信任形成和计算方法。通过引入节点的主观评价和客观评价,结合GTFT和TFT博弈激励策略对推荐过程中不诚实的信任推荐给予相应的惩罚策略。仿真结果表明,根据节点主观评价与客观评价所形成的直接信任和通过博弈计算的推荐信任在一定程度上能够促进节点理性地参与网络行为,改善网络中信任计算的不可信和不可靠问题,使得网络中攻击节点逐渐减少。 In social network,the problem of large number of malicious services and the trust value unlikelihood or unreliable with the malicious nodes and the dynamic nodes which provide low quality service and network attack in trust calculating is researched. By analyzing the trust evaluation behavior of the node and the recommendation from the conspiracy node, an improved method to calculate and form trust value is proposed. Through introducing the subjective and objective evaluation of the node,combined with the GTFF and TFT,a re- lated punishment strategy is given for dishonest trust recommendation in recommending process. The simulation shows that the direct trust and recommendation trust based on the subjective evaluation and objective evaluation can promote the rational participation of the nodes, improving the unlikelihood or unreliable problem in trust calculation, and decrease the attack node in the network.
出处 《计算机技术与发展》 2016年第6期51-55,共5页 Computer Technology and Development
基金 甘肃省高等学校特色专业(080901) 甘肃省科技支撑计划(2014GS03891)
关键词 博弈论 反馈值 激励策略 信任推荐 game theory feedback value incentive strategy trust recommendation
  • 相关文献

参考文献12

二级参考文献56

  • 1李万,田盛丰,黄厚宽.进化博弈论及Agent自组织动力学[J].计算机研究与发展,2006,43(z1):46-50. 被引量:5
  • 2童向荣,张伟.基于信任和声誉的Agent组织信誉模型[J].计算机科学与探索,2007,1(3):325-330. 被引量:4
  • 3童向荣,张伟.基于模糊盟友关系的多主体系统长期联盟[J].计算机研究与发展,2006,43(8):1445-1449. 被引量:8
  • 4张仕斌,李奇琳.基于主观信任协作的信任评估模型[J].计算机工程,2007,33(12):144-147. 被引量:4
  • 5斯科特(2007).社会网络分析法[M].刘军译.重庆:重庆大学出版社.
  • 6姜守旭,李建中.一种P2P电子商务系统中基于声誉的信任机制[J].软件学报,2007,18(10):2551-2563. 被引量:103
  • 7Weng J, Lim E, Jiang J, et al. TwitterRank: finding topicsensitive influential twitterers[C]//Proceedings of the 3rd ACM International Conference on Web Search and Data Mining (WSDM '10). New York, NY, USA: ACM, 2010: 261-270.
  • 8Cha M, Haddadi H, Benevenuto F, et al. Measuring user influence in Twitter: the million follower fallacy[C]//Proceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM 2010), 2010: 10-17.
  • 9Qazvinian v, Rosengren E, Radev D, et al. Rumor has it:identifying misinformation in microblogs[C]//Proceedings of the Conference on Empirical Methods in Natural Language Processing (EMNLP ' 11). Stroudsburg, PA, USA: Association for Computational Linguistics, 2011: 1589-1599.
  • 10Grove F, Sen S. TwitAg: a multi-agent feature selection and recommendation framework for Twitter[C]//LNCS 7057: Proceedings of the 13th International Conference on Principles and Practice of Multi-Agent Systems (PRIMA '10). Berlin, Heidelberg: Springer-Verlag, 2012: 394-397.

共引文献45

同被引文献8

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部