期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
1
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 Cross-domain authentication trust evaluation autoencoder
下载PDF
A Dynamic Bayesian-Based Comprehensive Trust Evaluation Model for Dispersed Computing Environment
2
作者 Hongwen Hui Zhengxia Gong +1 位作者 Jianwei An Jianzhong Qi 《China Communications》 SCIE CSCD 2023年第2期278-288,共11页
Dispersed computing is a new resourcecentric computing paradigm.Due to its high degree of openness and decentralization,it is vulnerable to attacks,and security issues have become an important challenge hindering its ... Dispersed computing is a new resourcecentric computing paradigm.Due to its high degree of openness and decentralization,it is vulnerable to attacks,and security issues have become an important challenge hindering its development.The trust evaluation technology is of great significance to the reliable operation and security assurance of dispersed computing networks.In this paper,a dynamic Bayesian-based comprehensive trust evaluation model is proposed for dispersed computing environment.Specifically,in the calculation of direct trust,a logarithmic decay function and a sliding window are introduced to improve the timeliness.In the calculation of indirect trust,a random screening method based on sine function is designed,which excludes malicious nodes providing false reports and multiple malicious nodes colluding attacks.Finally,the comprehensive trust value is dynamically updated based on historical interactions,current interactions and momentary changes.Simulation experiments are introduced to verify the performance of the model.Compared with existing model,the proposed trust evaluation model performs better in terms of the detection rate of malicious nodes,the interaction success rate,and the computational cost. 展开更多
关键词 dispersed computing trust evaluation model malicious node interaction success rate detection rate
下载PDF
Trust evaluation model of power terminal based on equipment portrait
3
作者 Erxia Li Zilong Han +2 位作者 Chaoqun Kang Tao Yu Yupeng Huang 《Global Energy Interconnection》 EI CSCD 2023年第6期758-771,共14页
As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for term... As the number of power terminals continues to increase and their usage becomes more widespread,the security of power systems is under great threat.In response to the lack of effective trust evaluation methods for terminals,we propose a trust evaluation model based on equipment portraits for power terminals.First,we propose an exception evaluation method based on the network flow order and evaluate anomalous terminals by monitoring the external characteristics of network traffic.Second,we propose an exception evaluation method based on syntax and semantics.The key fields of each message are extracted,and the frequency of keywords in the message is statistically analyzed to obtain the keyword frequency and time-slot threshold for evaluating the status of the terminal.Thus,by combining the network flow order,syntax,and semantic analysis,an equipment portrait can be constructed to guarantee security of the power network terminals.We then propose a trust evaluation method based on an equipment portrait to calculate the trust values in real time.Finally,the experimental results of terminal anomaly detection show that the proposed model has a higher detection rate and lower false detection rate,as well as a higher real-time performance,which is more suitable for power terminals. 展开更多
关键词 Power terminal Equipment portrait trust evaluation
下载PDF
Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection
4
作者 S.Soundararajan B.R.Tapas Bapu +3 位作者 C.Kotteeswaran S.Venkatasubramanian P.J.Sathish Kumar Ahmed Mudassar Ali 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1227-1240,共14页
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,abse... Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,absence of physical protectivity,and accumulated traffic,WSN is highly vulner-able to security concerns.Therefore,this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis.It is challenging to determine if packet loss is caused by a collision in the medium access path,poor channel quality,or a selective forwarding assault.Identifying misbehaving nodes at the earliest opportunity is an acceptable solution for performing secure routing in such networks.As a result,in this study effort,we present a unique Modified Ad Hoc On-Demand Distance Vector(AODV)Routing protocol depending upon the One time password(OTP)method that employs the RSA algorithm.Finally,a trust evaluation process determines which approach is the most optimal.Accord-ing to the simulationfindings of the suggested routing protocol and comparison with existing routing protocols provided in this article,the proposed work is both efficient and cost-effective. 展开更多
关键词 Wireless sensor network selective forward attack one time password trust evaluation RSA algorithm
下载PDF
Research Progress of Trust Evaluation Model
5
作者 ZHOU Guoqiang PAN Fangrui +1 位作者 ZHANG Weifeng GUO Jian 《Wuhan University Journal of Natural Sciences》 CAS 2008年第4期391-395,共5页
Software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such c... Software systems in distributed environment are changing from a close and relatively static form, whose users are familiar with each other, to an open and highly dynamic mode, which can be visited by public. In such circumstance, trust evaluation model becomes focus of intense research at current time. Trust evaluation model establishes a management framework of trust relationship between entities, involving expression and measurement of trust, comprehensive calculation of direct trust value and recommended trust value, and recognition of malicious entities and recommendations. Based on the analysis of several typical trust evaluation models, the classification of trust evaluation ideas and modes is discussed, the questions existing in current research and the directions of future research are pointed out. 展开更多
关键词 distributed environment trust trust evaluation model trust path
下载PDF
A Trust Evaluation Model for Social Commerce Based on BP Neural Network
6
作者 Lei Chen Ruimei Wang 《Journal of Data Analysis and Information Processing》 2016年第4期147-158,共12页
Recent years we have witnessed the rapid growth of social commerce in China, but many users are not willing to trust and use social commerce. So improving consumers’ trust and purchase intention has become a crucial ... Recent years we have witnessed the rapid growth of social commerce in China, but many users are not willing to trust and use social commerce. So improving consumers’ trust and purchase intention has become a crucial factor in the success of social commerce. Business factors, environment factors and social factors including twelve secondary indexes build up a social commerce trust evaluation model. Questionnaires are handed out to collect twelve secondary indexes scores as input of BP neural network and composite score of trust as output. Model simulation shows that both training samples and test samples have low level of average error and standard deviation, which certify that the model has good stability and it is a good method for evaluating social commerce trust. 展开更多
关键词 Social Commerce trust evaluation trust BP Neural Network evaluation Model
下载PDF
A Cross-Domain Trust Model of Smart City IoT Based on Self-Certification
7
作者 Yao Wang Yubo Wang +2 位作者 Zhenhu Ning Sadaqat ur Rehman Muhammad Waqas 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期981-996,共16页
Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneo... Smart city refers to the information system with Intemet of things and cloud computing as the core tec hnology and government management and industrial development as the core content,forming a large scale,heterogeneous and dynamic distributed Internet of things environment between different Internet of things.There is a wide demand for cooperation between equipment and management institutions in the smart city.Therefore,it is necessary to establish a trust mechanism to promote cooperation,and based on this,prevent data disorder caused by the interaction between honest terminals and malicious temminals.However,most of the existing research on trust mechanism is divorced from the Internet of things environment,and does not consider the characteristics of limited computing and storage capacity and large differences of Internet of hings devices,resuling in the fact that the research on abstract trust trust mechanism cannot be directly applied to the Internet of things;On the other hand,various threats to the Internet of things caused by security vulnerabilities such as collision attacks are not considered.Aiming at the security problems of cross domain trusted authentication of Intelligent City Internet of things terminals,a cross domain trust model(CDTM)based on self-authentication is proposed.Unlike most trust models,this model uses self-certified trust.The cross-domain process of internet of things(IoT)terminal can quickly establish a trust relationship with the current domain by providing its trust certificate stored in the previous domain interaction.At the same time,in order to alleviate the collision attack and improve the accuracy of trust evaluation,the overall trust value is calculated by comprehensively considering the quantity weight,time attenuation weight and similarity weight.Finally,the simulation results show that CDTM has good anti collusion attack ability.The success rate of malicious interaction will not increase significantly.Compared with other models,the resource consumption of our proposed model is significantly reduced. 展开更多
关键词 Smart city cross-domain trust model self-certification trust evaluation
下载PDF
Improved Collaborative Filtering Recommendation Based on Classification and User Trust 被引量:3
8
作者 Xiao-Lin Xu Guang-Lin Xu 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期25-31,共7页
When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes ... When dealing with the ratings from users,traditional collaborative filtering algorithms do not consider the credibility of rating data,which affects the accuracy of similarity.To address this issue,the paper proposes an improved algorithm based on classification and user trust.It firstly classifies all the ratings by the categories of items.And then,for each category,it evaluates the trustworthy degree of each user on the category and imposes the degree on the ratings of the user.Finally,the algorithm explores the similarities between users,finds the nearest neighbors,and makes recommendations within each category.Simulations show that the improved algorithm outperforms the traditional collaborative filtering algorithms and enhances the accuracy of recommendation. 展开更多
关键词 Collaborative filtering credibility of ratings evaluation on user trust item classification similarity metric
下载PDF
A Trust-Based Hierarchical Consensus Mechanism for Consortium Blockchain in Smart Grid
9
作者 Xingguo Jiang Aidong Sun +2 位作者 Yan Sun Hong Luo Mohsen Guizani 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2023年第1期69-81,共13页
As the smart grid develops rapidly,abundant connected devices offer various trading data.This raises higher requirements for secure and effective data storage.Traditional centralized data management does not meet the ... As the smart grid develops rapidly,abundant connected devices offer various trading data.This raises higher requirements for secure and effective data storage.Traditional centralized data management does not meet the above requirements.Currently,smart grid with conventional consortium blockchain can solve the above issues.However,in the face of a large number of nodes,existing consensus algorithms often perform poorly in terms of efficiency and throughput.In this paper,we propose a trust-based hierarchical consensus mechanism(THCM)to solve this problem.Firstly,we design a hierarchical mechanism to improve the efficiency and throughput.Then,intra-layer nodes use an improved Raft consensus algorithm and inter-layer nodes use the Byzantine Fault Tolerance algorithm.Thirdly,we propose a trust evaluation method to improve the election process of Raft.Finally,we implement a prototype system to evaluate the performance of THCM.The results demonstrate that the consensus efficiency is improved by 19.8%,the throughput is improved by 12.34%,and the storage is reduced by 37.9%. 展开更多
关键词 consortium blockchain consensus algorithm trust evaluation method smart grid Internet of Things(IoT)
原文传递
BCSE:Blockchain-Based Trusted Service Evaluation Model over Big Data 被引量:1
10
作者 Fengyin Li Xinying Yu +3 位作者 Rui Ge Yanli Wang Yang Cui Huiyu Zhou 《Big Data Mining and Analytics》 EI 2022年第1期1-14,共14页
The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure... The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions.Because of these characteristics,the blockchain is suitable for solving certain open problems in the service-oriented social network,where the unreliability of submitted reviews of service vendors can cause serious security problems.To solve the unreliability problems of submitted reviews,this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model.The new trusted service evaluation model consists of the blockchain-based identity authentication scheme,evaluation submission module,and evaluation publicity module.In the proposed evaluation model,only users who have successfully been authenticated can submit reviews to service vendors.The registration and authentication records of users’identity and the reviews for service vendors are all stored in the blockchain network.The security analysis shows that this model can ensure the credibility of users’reviews for service vendors,and other users can obtain credible reviews of service vendors via the review publicity module.The experimental results also show that the proposed model has a lower review submission delay than other models. 展开更多
关键词 social network trusted service evaluation model blockchain identity authentication
原文传递
A Cloud-Based Trust Model for Evaluating Quality of Web Services 被引量:2
11
作者 王守信 张莉 +1 位作者 王帅 邱翔 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第6期1130-1142,共13页
Because trust is regarded as an essential secured relationship within a distributed network environment,selecting services over the Internet from the viewpoint of trust has been a major trend.Current research about tr... Because trust is regarded as an essential secured relationship within a distributed network environment,selecting services over the Internet from the viewpoint of trust has been a major trend.Current research about trust model and evaluation in the context of Web services does not rationally and accurately reflect some essential characteristics of trust such as subjective uncertainty and dynamism.In this paper,we analyze some important characteristics of trust,and some key factors that affect the trust relation in the Web service environment.Accordingly,we propose a trust model based on Cloud Model theory to describe the subjective uncertainty of trust factors.A time-related backward cloud generation algorithm is given to express the dynamism of trust.Furthermore,according to the trust model and algorithm,a formalized calculation approach is provided to evaluate the trust degree of services requestors in providers.Our experiment shows that the evaluation of trust degree can effectively support trust-decisions and provide a helpful exploitation for selecting services based on the viewpoint of trust. 展开更多
关键词 Web service trust trust evaluation Cloud Model
原文传递
A Multi-dimensional Trust-aware Cloud Service Selection Mechanism Based on Evidential Reasoning Approach 被引量:4
12
作者 Wen-Juan Fan Shan-Lin Yang +1 位作者 Harry Perros Jun Pei 《International Journal of Automation and computing》 EI CSCD 2015年第2期208-219,共12页
In the last few years, cloud computing as a new computing paradigm has gone through significant development, but it is also facing many problems. One of them is the cloud service selection problem. As increasingly boo... In the last few years, cloud computing as a new computing paradigm has gone through significant development, but it is also facing many problems. One of them is the cloud service selection problem. As increasingly boosting cloud services are offered through the internet and some of them may be not reliable or even malicious, how to select trustworthy cloud services for cloud users is a big challenge. In this paper, we propose a multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning(ER) approach that integrates both perception-based trust value and reputation based trust value, which are derived from direct and indirect trust evidence respectively, to identify trustworthy services. Here, multi-dimensional trust evidence, which reflects the trustworthiness of cloud services from different aspects, is elicited in the form of historical users feedback ratings. Then, the ER approach is applied to aggregate the multi-dimensional trust ratings to obtain the real-time trust value and select the most trustworthy cloud service of certain type for the active users. Finally, the fresh feedback from the active users will update the trust evidence for other service users in the future. 展开更多
关键词 Cloud service selection multi-dimensional trust evidence trust and reputation evaluation evidential reasoning(ER) clond service
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部