期刊文献+
共找到3,875篇文章
< 1 2 194 >
每页显示 20 50 100
Blockchain-Assisted Unsupervised Learning Method for Crowdsourcing Reputation Management
1
作者 Tianyu Wang Kongyang Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2297-2314,共18页
Crowdsourcing holds broad applications in information acquisition and dissemination,yet encounters challenges pertaining to data quality assessment and user reputation management.Reputation mechanisms stand as crucial... Crowdsourcing holds broad applications in information acquisition and dissemination,yet encounters challenges pertaining to data quality assessment and user reputation management.Reputation mechanisms stand as crucial solutions for appraising and updating participant reputation scores,thereby elevating the quality and dependability of crowdsourced data.However,these mechanisms face several challenges in traditional crowdsourcing systems:1)platform security lacks robust guarantees and may be susceptible to attacks;2)there exists a potential for large-scale privacy breaches;and 3)incentive mechanisms relying on reputation scores may encounter issues as reputation updates hinge on task demander evaluations,occasionally lacking a dedicated reputation update module.This paper introduces a reputation update scheme tailored for crowdsourcing,with a focus on proficiently overseeing participant reputations and alleviating the impact of malicious activities on the sensing system.Here,the reputation update scheme is determined by an Empirical Cumulative distribution-based Outlier Detection method(ECOD).Our scheme embraces a blockchain-based crowdsourcing framework utilizing a homomorphic encryption method to ensure data transparency and tamper-resistance.Computation of user reputation scores relies on their behavioral history,actively discouraging undesirable conduct.Additionally,we introduce a dynamic weight incentive mechanism that mirrors alterations in participant reputation,enabling the system to allocate incentives based on user behavior and reputation.Our scheme undergoes evaluation on 11 datasets,revealing substantial enhancements in data credibility for crowdsourcing systems and a reduction in the influence of malicious behavior.This research not only presents a practical solution for crowdsourcing reputation management but also offers valuable insights for future research and applications,holding promise for fostering more reliable and high-quality data collection in crowdsourcing across diverse domains. 展开更多
关键词 Crowdsourcing reputation management blockchain
下载PDF
On Designs of Decentralized Reputation Management for Permissioned Blockchain Networks
2
作者 Jinyu Chen Long Shi +2 位作者 Qisheng Huang Taotao Wang Daojing He 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1755-1773,共19页
In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughp... In permissioned blockchain networks,the Proof of Authority(PoA)consensus,which uses the election of authorized nodes to validate transactions and blocks,has beenwidely advocated thanks to its high transaction throughput and fault tolerance.However,PoA suffers from the drawback of centralization dominated by a limited number of authorized nodes and the lack of anonymity due to the round-robin block proposal mechanism.As a result,traditional PoA is vulnerable to a single point of failure that compromises the security of the blockchain network.To address these issues,we propose a novel decentralized reputation management mechanism for permissioned blockchain networks to enhance security,promote liveness,and mitigate centralization while retaining the same throughput as traditional PoA.This paper aims to design an off-chain reputation evaluation and an on-chain reputation-aided consensus.First,we evaluate the nodes’reputation in the context of the blockchain networks and make the reputation globally verifiable through smart contracts.Second,building upon traditional PoA,we propose a reputation-aided PoA(rPoA)consensus to enhance securitywithout sacrificing throughput.In particular,rPoA can incentivize nodes to autonomously form committees based on reputation authority,which prevents block generation from being tracked through the randomness of reputation variation.Moreover,we develop a reputation-aided fork-choice rule for rPoA to promote the network’s liveness.Finally,experimental results show that the proposed rPoA achieves higher security performance while retaining transaction throughput compared to traditional PoA. 展开更多
关键词 Blockchain reputation management POA THROUGHPUT SECURITY DECENTRALIZATION
下载PDF
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
3
作者 Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah 《Computers, Materials & Continua》 SCIE EI 2024年第8期1867-1888,共22页
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applic... Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applications.This paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering packets.The proposed version employs a network-based reputation system to select the best and most secure path to a destination.To achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation system.To minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation tables.Moreover,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast approaches.The proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other protocols.Using the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing path.The paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different zones.Furthermore,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability. 展开更多
关键词 AODV blackhole malfunction nodes pathrater reputation system wireless sensor networks(WSNs) watchdogs
下载PDF
Blockchain-Empowered Token-Based Access Control System with User Reputation Evaluation 被引量:1
4
作者 Yuzheng Yang Zhe Tu +1 位作者 Ying Liu Huachun Zhou 《Computers, Materials & Continua》 SCIE EI 2023年第12期3163-3184,共22页
Currently,data security and privacy protection are becoming more and more important.Access control is a method of authorization for users through predefined policies.Token-based access control(TBAC)enhances the manage... Currently,data security and privacy protection are becoming more and more important.Access control is a method of authorization for users through predefined policies.Token-based access control(TBAC)enhances the manageability of authorization through the token.However,traditional access control policies lack the ability to dynamically adjust based on user access behavior.Incorporating user reputation evaluation into access control can provide valuable feedback to enhance system security and flexibility.As a result,this paper proposes a blockchain-empowered TBAC system and introduces a user reputation evaluation module to provide feedback on access control.The TBAC system divides the access control process into three stages:policy upload,token request,and resource request.The user reputation evaluation module evaluates the user’s token reputation and resource reputation for the token request and resource request stages of the TBAC system.The proposed system is implemented using the Hyperledger Fabric blockchain.The TBAC system is evaluated to prove that it has high processing performance.The user reputation evaluation model is proved to be more conservative and sensitive by comparative study with other methods.In addition,the security analysis shows that the TBAC system has a certain anti-attack ability and can maintain stable operation under the Distributed Denial of Service(DDoS)attack environment. 展开更多
关键词 Access control reputation evaluation feedback blockchain
下载PDF
P2P transaction method for distributed energy prosumers based on reputation value 被引量:1
5
作者 Tao Jiang Ting Hua +3 位作者 Hao Xiao Linbo Fu Wei Pei Tengfei Ma 《Global Energy Interconnection》 EI CSCD 2023年第3期308-323,共16页
Adding a reputation incentive system to peer-to-peer(P2P)energy transactions can encourage prosumers to regulate their trading behavior,which is important for ensuring the efficiency and reliability of P2P transaction... Adding a reputation incentive system to peer-to-peer(P2P)energy transactions can encourage prosumers to regulate their trading behavior,which is important for ensuring the efficiency and reliability of P2P transactions.This study proposed a P2P transaction mechanism and game optimization model for prosumers involved in distributed energy sources considering reputation-value incentives.First,the deviation of P2P transactions and the non-consumption rate of distributed renewable energy in P2P transactions were established as indicators to quantify the influencing factors of the reputation value,and a reputation incentive model of P2P transactions for prosumers was constructed.Then,the penalty coefficient was applied to the cost function of the prosumers,and a non-cooperative game model of P2P transactions based on the complete information of multi-prosumers was established.Furthermore,the Nash equilibrium problem was transformed into a nonlinear optimization problem by constructing the modified optimal reaction function,and the Nash equilibrium solution of the game was obtained via a relaxation algorithm.Finally,the modified IEEE 33-node test system based on electricity market P2P and an IEEE 123-node test system were used to analyze and verify the cost and P2P participation of prosumers considering the reputation value.The results show that the addition of the reputation incentive system can encourage prosumers to standardize their interactive transaction behavior and actively participate in P2P transactions.It can also improve the operation efficiency of the power grid and promote the perfection of the P2P transaction mechanism. 展开更多
关键词 P2P Prosumer Non-cooperative game reputation value Multi-agent of interest Operation optimization
下载PDF
Hybrid Trust Based Reputation Mechanism for Discovering Malevolent Node in MANET 被引量:1
6
作者 S.Neelavathy Pari K.Sudharson 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2775-2789,共15页
A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,... A self-contained connection of wireless links that functions without any infrastructure is known as Mobile Ad Hoc Network(MANET).A MANET’s nodes could engage actively and dynamically with one another.However,MAN-ETs,from the other side,are exposed to severe potential threats that are difficult to counter with present security methods.As a result,several safe communication protocols designed to enhance the secure interaction among MANET nodes.In this research,we offer a reputed optimal routing value among network nodes,secure computations,and misbehavior detection predicated on node’s trust levels with a Hybrid Trust based Reputation Mechanism(HTRM).In addition,the study designs a robust Public Key Infrastructure(PKI)system using the suggested trust evaluation method in terms of“key”generation,which is a crucial component of a PKI cryptosystem.We also concentrate on the solid node authenticating process that relies on pre-authentication.To ensure edge-to-edge security,we assess safe,trustworthy routes to secure computations and authenticate mobile nodes,incorporating uncertainty into the trust management solution.When compared to other protocols,our recommended approach performs better.Finally,we use simulations data and performance evaluation metrics to verify our suggested approach’s validity Our approach outperformed the competing systems in terms of overall end-to-end delay,packet delivery ratio,performance,power consumption,and key-computing time by 3.47%,3.152%,2.169%,and 3.527%,3.762%,significantly. 展开更多
关键词 Mobile ad-hoc network trust management secure authentication reputation mechanism secure routing
下载PDF
A dynamic incentive and reputation mechanism for energy-efficient federated learning in 6G
7
作者 Ye Zhu Zhiqiang Liu +1 位作者 Peng Wang Chenglie Du 《Digital Communications and Networks》 SCIE CSCD 2023年第4期817-826,共10页
As 5G becomes commercial,researchers have turned attention toward the Sixth-Generation(6G)network with the vision of connecting intelligence in a green energy-efficient manner.Federated learning triggers an upsurge of... As 5G becomes commercial,researchers have turned attention toward the Sixth-Generation(6G)network with the vision of connecting intelligence in a green energy-efficient manner.Federated learning triggers an upsurge of green intelligent services such as resources orchestration of communication infrastructures while preserving privacy and increasing communication efficiency.However,designing effective incentives in federated learning is challenging due to the dynamic available clients and the correlation between clients'contributions during the learning process.In this paper,we propose a dynamic incentive and reputation mechanism to improve energy efficiency and training performance of federated learning.The proposed incentive based on the Stackelberg game can timely adjust optimal energy consumption with changes in available clients during federated learning.Meanwhile,clients’contributions in reputation management are formulated based on the cooperative game to capture the correlation between tasks,which satisfies availability,fairness,and additivity.The simulation results show that the proposed scheme can significantly motivate high-performance clients to participate in federated learning and improve the accuracy and energy efficiency of the federated learning model. 展开更多
关键词 Federated learning Incentive mechanism reputation management Cooperative game Stackelberg game Green communication
下载PDF
How Do Young Children Manage Their Reputation among Peers?
8
作者 Jingmiao Zhang Yuning Zhu Xiuli Liu 《International Journal of Mental Health Promotion》 2023年第7期847-854,共8页
Young children’s reputation management is closely related to their social development.The purpose of our study is to examine the interaction between theory of mind and partner choice on children’s reputation managem... Young children’s reputation management is closely related to their social development.The purpose of our study is to examine the interaction between theory of mind and partner choice on children’s reputation management.Participants consisted of 270 children who were 3 to 5 years old.First,we measured participants’theory of mind capabilities using the unexpected location task and unexpected content task and then randomly divided the participants into the control group,non-partner–choice group,and partner-choice group.We measured reputation management by comparing children’s willingness to share and sharing behavior between these groups.Thefindings are as follows:(1)Children from ages 3 to 5 demonstrated reputation management,and their reputation management followed a significant developmental trend.The reputation management of 4-to 5-year-old children was significantly better than that of 3-year-old children.(2)Scores on the theory of mind tasks positively predicted children’s reputation management.(3)Partner choice affected children’s reputation management.In the partner-choice group,children’s reputation management was more apparent.(4)Partner choice did moderate the relationship between theory of mind and children’s reputation management.In the partner-choice group,theory of mind had a stronger predictive effect on children’s reputation management. 展开更多
关键词 Theory of mind partner choice reputation management CHILDREN
下载PDF
Roles of Corporate Reputation and Service Recovery in Food Safety Crises:A Case Study of Food Hygiene Incidents in Hot Pot Restaurants
9
作者 Fang CHEN Haiming CHEN +2 位作者 Shuying HUANG Yunyao LIANG Yingyin LIU 《Asian Agricultural Research》 2023年第12期24-27,38,共5页
Food hygiene incidents in hot pot restaurants were studied,and a relationship model between corporate reputation and consumers behavioral intention was established.Hot pot consumers of hot pot restaurants were surveye... Food hygiene incidents in hot pot restaurants were studied,and a relationship model between corporate reputation and consumers behavioral intention was established.Hot pot consumers of hot pot restaurants were surveyed through questionnaires.The results show that corporate reputation positively affects service recovery and repurchase intention,and service recovery positively influences repurchase intention,while corporate reputation affects repurchase intention through service recovery.In other words,under the situation of enterprise crises,the service recovery of an enterprise can restore its image and reputation.Therefore,when an enterprise has a crisis,it should positively respond to the crisis incident,and take timely crisis recovery to maintain its positive image. 展开更多
关键词 CORPORATE reputation Service recovery REPURCHASE INTENTION
下载PDF
The Reputation Model of Multi-Stage Dynamic Game
10
作者 侯光明 金军 甘仞初 《Journal of Beijing Institute of Technology》 EI CAS 1999年第1期2-7,共6页
Aim To study the implicit restriction mechanism for hidden action in multi stage dynamic game. Methods A reputation model for restriction on repeated principal agent relationship was established by using the theor... Aim To study the implicit restriction mechanism for hidden action in multi stage dynamic game. Methods A reputation model for restriction on repeated principal agent relationship was established by using the theory on principal agent problem in information economics and the method of game theory to study the implicit restriction mechanism for hidden action. Results and Conclusion It is proved that there exists implicit restriction mechanism for the multi stage principal agent relationship, some conditions for effective restriction are derived, the design methods of implicit restriction mechanism are presented. 展开更多
关键词 INCENTIVE RESTRICTION hidden action implicit restriction mechanism reputation model probability of discovery
下载PDF
SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 被引量:6
11
作者 Lin Hui Ma Jianfeng Hu Jia 《China Communications》 SCIE CSCD 2012年第10期40-48,共9页
Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this proble... Wireless Mesh Networks (WMNs) are vulnerable to various security threats because of their special infrastructure and communication mode, wherein insider attacks are the most challenging issue. To address this problem and protect innocent users from malicious attacks, it is important to encourage cooperation and deter malicious behaviors. Reputation systems constitute a major category of techniques used for managing trust in distributed networks, and they are effective in characterizing and quantifying a node's behavior for WMNs. However, conventional layered reputation mechanisms ignore several key factors of reputation in other layers; therefore, they cannot provide optimal performance and accurate malicious node identification and isolation for WMNs. In this paper, we propose a novel dynamic reputation mechanism, SLCRM, which couples reputation systems with a cross-layer design and node-security-rating classification techniques to dynamically detect and restrict insider attacks. Simulation results show that in terms of network throughput, packet delivery ratio, malicious nodes' identification, and success rates, SI_CRM imple- ments security protection against insider attacks in a more dynamic, effective, and efficient manner than the subjective logic and uncertainty-based reputation model and the familiarity-based reputation model. 展开更多
关键词 wireless mesh networks reputation mechanism cross-layer design network security
下载PDF
SemTrust: A Semantic Reputation System in P2P-Based Semantic Web 被引量:1
12
作者 WANG Wei ZENG Guosun YUAN Lulai 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1137-1140,共4页
A reputation mechanism is introduced in P2P- based Semantic Web to solve the problem of lacking trust. It enables Semantic Web to utilize reputation information based on semantic similarity of peers in the network. Th... A reputation mechanism is introduced in P2P- based Semantic Web to solve the problem of lacking trust. It enables Semantic Web to utilize reputation information based on semantic similarity of peers in the network. This approach is evaluated in a simulation of a content sharing system and the experiments show that the system with reputation mechanism outperforms the system without it. 展开更多
关键词 semantic Web reputation system semantic similarity trustworthiness
下载PDF
A Formal Reputation System for Trusting Wireless Sensor Network 被引量:1
13
作者 XIAO Deqin FENG Jianzhao ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2008年第2期173-179,共7页
In this paper, a formal system is proposed based on beta reputation for the development of trustworthy wireless sensor networks (FRS-TWSN). Following this approach, key concepts related to reputation are formal desc... In this paper, a formal system is proposed based on beta reputation for the development of trustworthy wireless sensor networks (FRS-TWSN). Following this approach, key concepts related to reputation are formal described step by step for wireless sensor networks where sensor nodes maintain reputation for other sensors and use it to evaluate their trustworthiness. By proving some properties of beta reputation system, the beta distribution is founded to fit well to describe reputation system. Also, a case system is developed within this framework for reputation representation, updates and integration. Simulation results show this scheme not only can keep stable reputation but also can prevent the system from some attacks as bad mouthing and reputation cheating. 展开更多
关键词 wireless sensor networks formal method reputation Beta distribution
下载PDF
Reputation-Based Cooperative Spectrum Sensing Algorithm for Mobile Cognitive Radio Networks 被引量:1
14
作者 Xinyu Wang Min Jia +2 位作者 Qing Guo Xuemai Gu Guangyu Zhang 《China Communications》 SCIE CSCD 2017年第1期124-134,共11页
Identifying malicious users accurately in cognitive radio networks(CRNs) is the guarantee for excellent detection performance. However, existing algorithms fail to take the mobility of secondary users into considerati... Identifying malicious users accurately in cognitive radio networks(CRNs) is the guarantee for excellent detection performance. However, existing algorithms fail to take the mobility of secondary users into consideration. If applied directly in mobile CRNs, those conventional algorithms would overly punish reliable users at extremely bad or good locations, leading to an obvious decrease in detection performance. To overcome this problem, we divide the whole area of interest into several cells to consider the location diversity of the network. Each user's reputation score is updated after each sensing slot and is used for identifying whether it is malicious or not. If so, it would be removed away. And then our algorithm assigns users in cells with better channel conditions, i.e. larger signal-to-noise ratios(SNRs), with larger weighting coefficients, without requiring the prior information of SNR. Detailed analysis about the validity of our algorithm is presented. The simulation results show that in a CRN with 60 mobile secondary users, among which, 18 are malicious, our solution has an improvement of detection probability by 0.97-d B and 3.57-d B when false alarm probability is 0.1, compared with a conventional trust-value-based algorithm and a trusted collaborative spectrum sensing for mobile CRNs, respectively. 展开更多
关键词 cognitive radio cooperative spectrum sensing mobility malicious users reputation score
下载PDF
A Novel Negative Multinomial Distribution Based Energy-Efficient Reputation Modeling for Wireless Sensor Networks(WSNs) 被引量:1
15
作者 魏哲 王芳 《Journal of Donghua University(English Edition)》 EI CAS 2012年第2期153-156,共4页
In wireless sensor networks(WSNs),nodes are usually powered by batteries.Since the energy consumption directly impacts the network lifespan,energy saving is a vital issue in WSNs,especially in the designing phase of c... In wireless sensor networks(WSNs),nodes are usually powered by batteries.Since the energy consumption directly impacts the network lifespan,energy saving is a vital issue in WSNs,especially in the designing phase of cryptographic algorithms.As a complementary mechanism,reputation has been applied to WSNs.Different from most reputation schemes that were based on beta distribution,negative multinomial distribution was deduced and its feasibility in the reputation modeling was proved.Through comparison tests with beta distribution based reputation in terms of the update computation,results show that the proposed method in this research is more energy-efficient for the reputation update and thus can better prolong the lifespan of WSNs. 展开更多
关键词 WIRELESS sensor networks(WSNs) NEGATIVE MULTINOMIAL distribution reputation ENERGY-EFFICIENT
下载PDF
The Effect of Reputation to the Moral Hazard in C2C E-Market with Game Theory 被引量:3
16
作者 Fangjun Mu 《American Journal of Operations Research》 2015年第5期367-372,共6页
It is well known that the reputation is the basis of a seller to survive and gain trust from customers in a competitive business environment. But as the existence of information asymmetry between buyer and seller, the... It is well known that the reputation is the basis of a seller to survive and gain trust from customers in a competitive business environment. But as the existence of information asymmetry between buyer and seller, the moral hazard problem is the key obstacle that impedes the benefits of related shareholders and reduces the efficiency of total market. It is crucial to design a control mechanism to avoid the negative impact of moral hazard. This paper studies the principal and agent relationship between buyer and seller in C2C e-market;because of the influence of information asymmetry, many customers suffered from being cheated by sellers with defective products in practice. These frequent cases will deteriorate long term relationship between sellers and buyers. Here we focus on the analysis of the causes of moral risks and the effect of reputation on oral risk with repeated game theory. The purpose of this paper is to help both firms and customers effectively avoid morality risk and realize a win-win situation. 展开更多
关键词 C2C E-COMMERCE MORAL HAZARD reputation Model Game Theory
下载PDF
Reputation-Based Hierarchically Cooperative Spectrum Sensing Scheme in Cognitive Radio Networks 被引量:3
17
作者 CHEN Huifang XIE Lei NI Xiong 《China Communications》 SCIE CSCD 2014年第1期12-25,共14页
Cooperative spectrum sensing in cog- nitive radio is investigated to improve the det- ection performance of Primary User (PU). Meanwhile, cluster-based hierarchical coop- eration is introduced for reducing the overh... Cooperative spectrum sensing in cog- nitive radio is investigated to improve the det- ection performance of Primary User (PU). Meanwhile, cluster-based hierarchical coop- eration is introduced for reducing the overhead as well as maintaining a certain level of sens- ing performance. However, in existing hierar- chically cooperative spectrum sensing algo- rithms, the robustness problem of the system is seldom considered. In this paper, we pro- pose a reputation-based hierarchically coop- erative spectrum sensing scheme in Cognitive Radio Networks (CRNs). Before spectrum sensing, clusters are grouped based on the location correlation coefficients of Secondary Users (SUs). In the proposed scheme, there are two levels of cooperation, the first one is performed within a cluster and the second one is carried out among clusters. With the reputa- tion mechanism and modified MAJORITY rule in the second level cooperation, the pro- posed scheme can not only relieve the influ- ence of the shadowing, but also eliminate the impact of the PU emulation attack on a rela- tively large scale. Simulation results show that, in the scenarios with deep-shadowing or mul- tiple attacked SUs, our proposed scheme ach- ieves a better tradeoff between the system robustness and the energy saving compared with those conventionally cooperative sensing schemes. 展开更多
关键词 cognitive radio networks coop- erative spectrum sensing cluster location cor- relation reputation
下载PDF
A Reputation-Based Multi-Agent Model for Network Resource Selection 被引量:1
18
作者 Junfeng TIAN Juan LI Lidan YANG 《International Journal of Communications, Network and System Sciences》 2009年第8期764-774,共11页
Because of the anonymity and openness of online transactions and the richness of network resources, the problems of the credibility of the online trading and the exact selection of network resources have become acute.... Because of the anonymity and openness of online transactions and the richness of network resources, the problems of the credibility of the online trading and the exact selection of network resources have become acute. For this reason, a reputation-based multi-agent model for network resource selection (RMNRS) is presented. The model divides the network into numbers of trust domains. Each domain has one domain-agent and several entity-agents. The model prevents the inconsistency of information that is maintained by differ-ent agents through the periodically communication between the agents. The model enables the consumers to receive responses from agents significantly quicker than that of traditional models, because the global reputation values of service providers and consumers are evaluated and updated dynamically after each transaction. And the model allocates two global reputation values to each entity and takes the recognition value that how much the service provider knows the service into account. In order to make users choose the best matching services and give users with trusted services, the model also takes the similarity between services into account and uses the similarity degree to amend the integration reputation value with harmonic-mean. Finally, the effectiveness and feasibility of this model is illustrated by the experiment. 展开更多
关键词 TRUST reputation Trust-Domain MULTI-AGENT SIMILARITY
下载PDF
A Dynamic Reputation–based Consensus Mechanism for Blockchain 被引量:1
19
作者 Xiaofang Qiu Zhi Qin +4 位作者 Wunan Wan Jinquan Zhang Jinliang Guo Shibin Zhang Jinyue Xia 《Computers, Materials & Continua》 SCIE EI 2022年第11期2577-2589,共13页
In recent years,Blockchain is gaining prominence as a hot topic in academic research.However,the consensus mechanism of blockchain has been criticized in terms of energy consumption and performance.Although Proof-of-A... In recent years,Blockchain is gaining prominence as a hot topic in academic research.However,the consensus mechanism of blockchain has been criticized in terms of energy consumption and performance.Although Proof-of-Authority(PoA)consensus mechanism,as a lightweight consensus mechanism,is more efficient than traditional Proof-of-Work(PoW)and Proof-of-Stake(PoS),it suffers from the problem of centralization.To this end,on account of analyzing the shortcomings of existing consensus mechanisms,this paper proposes a dynamic reputation-based consensus mechanism for blockchain.This scheme allows nodes with reputation value higher than a threshold apply to become a monitoring node,which can monitor the behavior of validators in case that validators with excessive power cause harm to the blockchain network.At the same time,the reputation evaluation algorithm is also introduced to select nodes with high reputation to become validators in the network,thus increasing the cost of malicious behavior.In each consensus cycle,validators and monitoring nodes are dynamically updated according to the reputation value.Through security analysis,it is demonstrated that the scheme can resist the attacks of malicious nodes in the blockchain network.By simulation experiments and analysis of the scheme,the result verifies that the mechanism can effectively improve the fault tolerance of the consensus mechanism,reduce the time of consensus to guarantee the security of the system. 展开更多
关键词 Blockchain consensus mechanism proof-of-authority reputation evaluation
下载PDF
基于Reputation与Credit的混合激励算法
20
作者 李泽民 《信息技术》 2016年第3期139-143,147,共6页
针对Reputation机制中缺乏对高信誉值节点的奖励,以及Credit机制中静止的虚拟银行(VB:Virtual Bank)部署困难,同时交易价格无区分性等导致的激励效果不佳的问题,文中提出了一种新的基于Reputation和Credit的混合激励算法RCH(Reputation ... 针对Reputation机制中缺乏对高信誉值节点的奖励,以及Credit机制中静止的虚拟银行(VB:Virtual Bank)部署困难,同时交易价格无区分性等导致的激励效果不佳的问题,文中提出了一种新的基于Reputation和Credit的混合激励算法RCH(Reputation and Credit based Hybrid incentive algorism)。RCH主要是采取一种P2P的模式(无需VB),根据提供转发服务节点与消息目的节点的亲密度以及接受转发服务节点的自私度来完成对不同服务质量,不同服务对象的区别定价,从而鼓励理性地自私节点更多的去帮助其他节点转发消息。通过理论分析和仿真实验得出:该算法与Reputation机制和Credit机制相比,在激励效果方面得到了较大的改善,最终都体现在交付率,平均延迟等指标的优化上。 展开更多
关键词 激励机制 CREDIT reputation 虚拟银行 RCH
下载PDF
上一页 1 2 194 下一页 到第
使用帮助 返回顶部