浏览全部资源
扫码关注微信
1. 南京邮电大学 计算机学院,江苏 南京 210003
2. 南京邮电大学 计算机技术研究所,江苏 南京 210003
3. 江苏省无线传感网高技术研究重点实验室,江苏 南京 210003
4. 南京邮电大学 宽带无线通信与传感网技术教育部重点实验室,江苏 南京 210003
[ "张琳(1980-),女,江苏丰县人,南京邮电大学副教授、硕士生导师,主要研究方向为分布式计算、网络安全、信任、可信计算等。" ]
[ "邢欢(1991-),男,江苏启东人,南京邮电大学硕士生,主要研究方向为分布式计算、信息安全、信任、可信计算等。" ]
[ "王汝传(1943-),男,安徽合肥人,南京邮电大学教授、博士生导师,主要研究方向为计算机软件、计算机网络和网格、信息安全、无线传感器网络、移动代理和虚拟现实技术等。" ]
[ "吴超杰(1993-),男,江苏无锡人,主要研究方向为信任计算、可信计算。" ]
网络出版日期:2015-09,
纸质出版日期:2015-09-25
移动端阅览
张琳, 邢欢, 王汝传, 等. 复杂网络环境下基于推荐链分类的动态信任模型[J]. 通信学报, 2015,36(9):55-64.
Lin ZHANG, Huan XING, Ru-chuan WANG, et al. Dynamic trust model based on recommendation chain classification in complex network environment[J]. Journal on communications, 2015, 36(9): 55-64.
张琳, 邢欢, 王汝传, 等. 复杂网络环境下基于推荐链分类的动态信任模型[J]. 通信学报, 2015,36(9):55-64. DOI: 10.11959/j.issn.1000-436x.2015137.
Lin ZHANG, Huan XING, Ru-chuan WANG, et al. Dynamic trust model based on recommendation chain classification in complex network environment[J]. Journal on communications, 2015, 36(9): 55-64. DOI: 10.11959/j.issn.1000-436x.2015137.
针对网络环境中复杂的推荐信息处理问题,提出了一种基于推荐链分类的信任模型。该分类方法基于节点间的诚实属性,在实际经验数据的基础之上能选择出有效的推荐链。针对推荐信息的传播使用了以信息增益为基础的参数,使推荐信息更精准,考虑了时间的影响并且能把交互能力与诚实属性清楚地区分开。在最终的直接信任与推荐信息的聚合计算过程中采用了信息论中熵的概念,摆脱了以往主观设定参数的模糊性。模型中主要的聚合参数能随着交互的进行而不断地修正,达到了最贴近真实值的情形。仿真实验验证了新模型分类的有效性以及参数设置的合理性。
According to the recommendation information processing problem in complex network environment
a trust model based on the recommendation chain classification was proposed.The classification method was based on honesty attribute of nodes
which could choose an effective recommendation chain on the basis of practical experience data.The recommendation information dissemination parameters were based on the information gain
which made recommendation information be more accurate.The factor of time was also considered in this model.The ability of interaction and the one of honesty were distinguished clearly.The concept of information entropy in information theory was used in the final ag-gregation calculation of direct trust and recommendation trust
which could get rid of the ambiguity of the previous sub-jective parameter settings.The main polymerization parameters could be continuously corrected with the interactions in order to achieve the situation being closest to the reality.Simulation results show the validity of recommendation chain classification and the rationality of the parameter settings in the proposed model.
KAMAL K , BHARADWAJ , MOHAMMAD YAHYA H , AL-SHAMRI . Fuzzy computational models for trust and reputation systems [J ] . Electronic Commerce Research and Applications , 2009 , 8 : 37 - 47 .
XIA H , JIA Z P , EDWIN H M S . Research of trust model based on fuzzy theory in mobile ad hoc networks [J ] . IET Inf Secur , 2014 , 8 : 88 - 103 .
MIESO K D , SUN T , ISAAC W . Trust management in ubiquitous computing:a Bayesian approach [J ] . Computer Communications , 2011 , 34 : 398 - 406 .
CARMEN F G , ISAAC A , JAVIER L . Building trust from context similarity measures [J ] . Computer Standards &Interfaces , 2014 , 36 : 792 - 800 .
王江涛 , 陈志刚 , 邓晓衡 . 普适计算中一种上下文感知的自适应可信模型 [J ] . 通信学报 , 2012 , 33 ( 11 ): 41 - 56 .
WANG J T , CHEN Z G , DENG X H . Context-aware and self-adaptive trust model for pervasive computing [J ] . Journal on Communications , 2012 , 33 ( 11 ): 41 - 56 .
秦艳琳 , 吴晓平 , 高键鑫 . 分布式环境下信任路径选择性搜索及聚合研究 [J ] . 通信学报 , 2012 , 33 ( Z1 ): 148 - 156 .
QIN Y L , WU X P , GAO J X . Research on selective trust-path search and aggregation in distributed environment [J ] . Journal on Communi-cations , 2012 , 33 ( Z1 ): 148 - 156 .
李致远 , 王汝传 . P2P 电子商务环境下的动态安全信任管理模型 [J ] . 通信学报 , 2011 , 32 ( 3 ): 50 - 59 .
LI Z Y , WANG R C . Dynamic secure trust management model for P2P e-commerce environments [J ] . Journal on Communications , 2011 , 32 ( 3 ): 50 - 59 .
顾鑫 , 徐正全 , 刘进 . 基于云理论的可信研究及展望 [J ] . 通信学报 , 2011 , 32 ( 7 ): 176 - 181 .
GU X , XU Z Q , LIU J . Review of cloud based trust model [J ] . Journal on Communications , 2011 , 32 ( 7 ): 176 - 181 .
LI X Y , DU J P . Adaptive and attribute-based trust model for servicelevel agreement guarantee in cloud computing [J ] . IET Inf Secur , 2013 , 7 : 39 - 50 .
KAWSER W N , TONNY S K , AMJAD H , et al . A fuzzy and prob-abilistic logic based representational model of certain trust model [A ] . International Conference on Informatics,Electronics &Vi-sion [C ] . 2012 . 1000 - 1005 .
LIU G F , WANG Y , MEHMET A O , et al . .Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks [J ] . Transactions on Services Computing , 2013 , 6 ( 2 ): 152 - 167 .
MARK H , SYED W J , PETER P V M , et al . Design and validation of a relative trust model [J ] . Knowledge-Based Systems , 2014 , 57 : 81 - 94 .
张琳 , 王汝传 , 王海艳 . 基于多影响因素的网格信任传播算法 [J ] . 通信学报 , 2011 , 32 ( 7 ): 161 - 168 .
ZHANG L , WANG R C , WANG H Y . Trust transitivity algorithm based on multiple influencing factors for grid environment [J ] . Journal on Communications , 2011 , 32 ( 7 ): 161 - 168 .
田俊峰 , 鲁玉臻 , 李宁 . 基于推荐的信任链管理模型 [J ] . 通信学报 , 2011 , 32 ( 10 ): 1 - 9 .
TIAN J F , LU Y Z , LI N . Trust chain management model based on recommendation [J ] . Journal on Communications , 2011 , 32 ( 10 ): 1 - 9 .
蒋黎明 , 张琨 , 徐建 , 等 . 证据信任模型中的信任传递与聚合研究 [J ] . 通信学报 , 2011 , 32 ( 8 ): 92 - 100 .
JIANG L M , ZHANG K , XU J , et al . Research on trust transitivity and aggregation in evidential trust model [J ] . Journal on Communications , 2011 , 32 ( 8 ): 92 - 100 .
MAGDALINI E , MALAMATI D L , IRAKLIS V . A trust-aware sys-tem for personalized user recommendations in social networks [J ] . IEEE Transactions on Systems,Man,and Cybernetics:System , 2014 , 44 ( 4 ): 409 - 421 .
0
浏览量
869
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构