Method for trust evaluation of nodes in network

A node and network technology, applied in the field of node trust evaluation in the network, can solve the problems of lack of adaptive adjustment ability to adapt to environmental factors, etc., and achieve the goals of enhancing system availability and effectiveness, resisting damage from malicious nodes, good adaptability and efficiency Effect

Active Publication Date: 2011-11-16
HANGZHOU SUNYARD DIGITAL SCI
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These methods all have strong subjectivity and lack the adaptive adjustment ability to adapt to environmental factors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for trust evaluation of nodes in network
  • Method for trust evaluation of nodes in network
  • Method for trust evaluation of nodes in network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0026] The node trust evaluation method in the network of the present invention, the method is, for any node P in the network i and node P j , node P i Maintain a node P with j Interactive time-window-based list of records, node P i and node P j The interaction time contains at least one history record; save the interaction information of each node, and update the corresponding information after the interaction;

[0027] Node P i According to the expression Γ(P i , P j ) = ω 1 ·Γ D (P i , P j )+ω 2 ·ΓI (P i , P j ) to determine the node P j The overall trust degree Γ(P i , P j );

[0028] The calculation process of the corresponding parameters in the above formula is as follows,

[0029] Determining the direct trust degree Γ D (P i , P j ) and feedback trust degree Γ I (P i , P j ),

[0030] where f 1 , f 2 ,..., f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for trust evaluation of nodes in a network. According to the method disclosed the invention, the feedback reliability of the nodes with the same type in a terminal can be increased; simultaneously a time granularity factor is introduced to ensure that a trust value dynamically changes along with the time; and a given trust value is more consistent with a node historical behavior so that the destruction of a malicious node can be effectively resisted, the usability and validity of a system are enhanced and the adaptability and efficiency of the system are better. The method comprises the following steps: for a random node Pi and a random node Pj in the network, the node Pi maintains a record list which interacts with the node Pj and is based on a time window, and the interaction time of the node Pi and node Pj at least contains a historical record; interaction information of each node is saved and the corresponding information is updated after the interaction; and the node Pi determines the overall trust degree gamma(Pi, Pj) according to an expression of gamma(Pi, Pj)=omega1*gammaD(Pi, Pj)+omega2*gammaI(Pi, Pj).

Description

technical field [0001] The invention relates to the technical field of trust management for nodes in the network, in particular to a node trust evaluation method in the network. Background technique [0002] In recent years, a lot of research has been done on the trust mechanism at home and abroad, and a variety of trust models have been proposed, which can be roughly classified into PKI-based trust models, data signature-based, local recommendation-based, and global trust models. PKI-based trust models are often centrally dependent, with scalability and single-point failure issues; data signatures are aimed at data sharing applications (such as file sharing), and cannot prevent collective fraud; trust models based on partial recommendations, nodes only pass Ask limited other nodes to obtain the credibility of a certain node; the global trust model obtains the global credibility of nodes through the iteration of mutual satisfaction between neighbor nodes, which does not sati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 吴基成颜炎
Owner HANGZHOU SUNYARD DIGITAL SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products