Advanced Search
Volume 33 Issue 1
Feb.  2011
Turn off MathJax
Article Contents
Yu Li, Li Jing-Ru, Liu Zu-Hao. Semiring Trust Model Based on Adaptive Forgetting Scheme[J]. Journal of Electronics & Information Technology, 2011, 33(1): 175-179. doi: 10.3724/SP.J.1146.2010.00221
Citation: Yu Li, Li Jing-Ru, Liu Zu-Hao. Semiring Trust Model Based on Adaptive Forgetting Scheme[J]. Journal of Electronics & Information Technology, 2011, 33(1): 175-179. doi: 10.3724/SP.J.1146.2010.00221

Semiring Trust Model Based on Adaptive Forgetting Scheme

doi: 10.3724/SP.J.1146.2010.00221
  • Received Date: 2010-03-11
  • Rev Recd Date: 2010-09-02
  • Publish Date: 2011-01-19
  • Semiring algebra can be used to compute the trustworthiness between nodes, for it is a good description of the trustworthiness calculation rules issues. However, the existing semiring trust model does not define dynamic issues based on time. A semiring trust model based on the adaptive forgetting scheme is proposed to describe the dynamic of trust, and improve the existing semiring trust model, making up for its shortcoming of not defining dynamic issues. Simulation results show that proposed trust model distinguishes effectively between normal nodes and malicious nodes and resists on-off attacks, which improves the security of Ad hoc networks.
  • loading
  • Sun Yan (Lindsay), Han Zhu, and Liu K J R. Defense of trust management vulnerabilities in distributed networks[J]. IEEE Communications Magazine, 2008, 46(2): 112-119.[2]Buchegger S and Le Boudec Jean-Yves. Self-policing mobile Ad hoc networks by reputation systems[J]. IEEE Communications Magazine, 2005, 43(7): 101-107.[3]Sun Yan (Lindsay), Yu Wei, Han Zhu, and Liu K J R. Information theoretic framework of trust modeling and evaluation for Ad hoc networks[J].IEEE Journal on Selected Areas in Communications.2006, 24(2):305-317[4]Liao Hong-mei, Wang Qian-ping, and Li Guo-xin. A fuzzy logic-based trust model in grid[C][J].International Conference on Networks Security, Wireless Communications and Trusted Computing(NSWCTC 09), Wuhan, China, April 25-2.2009, 1:608-614[5]Theodorakopoulos G and Baras S. On trust models and trust evaluation metrics for Ad hoc networks[J].IEEE Journal on Selected Areas in Communications.2006, 24(2):318-328[6]Zhang Ming-wu, Yang Bo, and Zhang Wen-zheng. A semiring privacy protect model[C]. IFIP International Conference on Network and Parallel Computing Workshops, Dalian, China, 2007: 255-262.[7]Zhang Yun-chang.[J].Chen Shan-shan, and Yang Geng. SFTrust: a double trust metric based trust model in unstructured P2P system[C]. Source, IPDPS archive Proceedings of the 2009 IEEE International Symposium on ParallelDistributed Processing(IPDPS 2009), Rome, Italy, May 25-2.2009,:-[8]Perrone L F and Nelson S C. A study of on-off attack models for wireless Ad hoc networks[C]. First IEEE International Workshop on Operator-Assisted (Wireless Mesh) Community Networks (OpComm 2006), Berlin, Germany, Sept. 2006: 1-10.[9]Li J, Li R, and Kato J. Future trust management framework for mobile Ad hoc networks[J]. IEEE Communications Magazine, 2008, 46(4): 108-114.[10]Zouridaki C, et al.. A quantitative trust establishment framework for reliable data packet delivery in MANETs[C]. Proc. 3rd ACM Wksp. Sec. Ad hoc and Sensor Networks, Alexandria, Virginia, USA, Nov. 7, 2005: 1-10.[11]Chang E, Thomson P, Dillon T, and Hussain F. The fuzzy and dynamic nature of trust[C]. LNCS 3592, Berlin, Springer-Verlag, 2005: 161-174.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3624) PDF downloads(843) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return