Journal on Communications ›› 2022, Vol. 43 ›› Issue (2): 118-130.doi: 10.11959/j.issn.1000-436x.2022024
• Papers • Previous Articles Next Articles
Lin ZHANG1,2, Xinyan WEI1, Xiping LIU1, Haiping HUANG1,2, Ruchuan WANG1,2
Revised:
2021-10-20
Online:
2022-02-25
Published:
2022-02-01
Supported by:
CLC Number:
Lin ZHANG, Xinyan WEI, Xiping LIU, Haiping HUANG, Ruchuan WANG. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback[J]. Journal on Communications, 2022, 43(2): 118-130.
[1] | SUN X , ANSARI N . EdgeIoT:mobile edge computing for the Internet of things[J]. IEEE Communications Magazine, 2016,54(12): 22-29. |
[2] | SKALA K , DAVIDOVI? D , AFGAN E ,et al. Scalable distributed computing hierarchy:cloud,fog and dew computing[J]. Open Journal of Cloud Computing, 2015,2(1): 16-24. |
[3] | SONEKAR S V , KSHIRSAGAR M M , MALIK L . Cluster head selection and malicious node detection in wireless ad hoc networks[C]// Next-Generation Networks. Berlin:Springer, 2018: 547-554. |
[4] | YIM H J , SON Y H , LEE K C . A data distribution service quality of services policy configuration for data/events/services in the Internet of things[J]. Advanced Science Letters, 2016,22(11): 3612-3617. |
[5] | 乐光学, 戴亚盛, 杨晓慧 ,等. 边缘计算可信协同服务策略建模[J]. 计算机研究与发展, 2020,57(5): 1080-1102. |
YUE G X , DAI Y S , YANG X H ,et al. Model of trusted cooperative service for edge computing[J]. Journal of Computer Research and Development, 2020,57(5): 1080-1102. | |
[6] | HASHEM E M , NI Q , SHI Q . Secure and privacy-aware cloud-assisted video reporting service in 5G-enabled vehicular networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(10): 7868-7881. |
[7] | CONOSCENTI M , VETRò A , DE MARTIN J C . Peer to peer for privacy and decentralization in the Internet of things[C]// Proceedings of 2017 IEEE/ACM 39th International Conference on Software Engineering Companion (ICSE-C). Piscataway:IEEE Press, 2017: 288-290. |
[8] | JIN B , JIANG D S , XIONG J B ,et al. D2D data privacy protection mechanism based on reliability and homomorphic encryption[J]. IEEE Access, 2018,6: 51140-51150. |
[9] | SCIANCALEPORE S , PIRO G , CALDAROLA D ,et al. OAuth-IoT:an access control framework for the Internet of things based on open standards[C]// Proceedings of 2017 IEEE Symposium on Computers and Communications. Piscataway:IEEE Press, 2017: 676-681. |
[10] | GUAN Z T , SI G L , WU J ,et al. Utility-privacy tradeoff based on random data obfuscation in Internet of energy[J]. IEEE Access, 2017,5: 3250-3262. |
[11] | ZHENG W T , WANG Z Y , LV T T ,et al. K-anonymity algorithm based on improved clustering[C]// Algorithms and Architectures for Parallel Processing. Berlin:Springer, 2018: 462-476. |
[12] | WANG Q , HUANG J , CHEN Y J ,et al. PROST:privacy-preserving and truthful online double auction for spectrum allocation[J]. IEEE Transactions on Information Forensics and Security, 2019,14(2): 374-386. |
[13] | WANG X , LUO T , LI J F . An efficient fully homomorphic encryption scheme for private information retrieval in the cloud[J]. International Journal of Pattern Recognition and Artificial Intelligence, 2020,34(4): 2055008. |
[14] | 张佳乐, 赵彦超, 陈兵 ,等. 边缘计算数据安全与隐私保护研究综述[J]. 通信学报, 2018,39(3): 1-21. |
ZHANG J L , ZHAO Y C , CHEN B ,et al. Survey on data security and privacy-preserving for the research of edge computing[J]. Journal on Communications, 2018,39(3): 1-21. | |
[15] | HUANG X M , YU R , KANG J W ,et al. Distributed reputation management for secure and efficient vehicular edge computing and networks[J]. IEEE Access, 2017,5: 25408-25420. |
[16] | 邓宇乔, 杨波, 唐春明 ,等. 基于密文策略的流程加密研究[J]. 计算机学报, 2019,42(5): 1063-1075. |
DENG Y Q , YANG B , TANG C M ,et al. Research of ciphertext policy process-based encryption[J]. Chinese Journal of Computers, 2019,42(5): 1063-1075. | |
[17] | 霍星, 张阳洋, 景永俊 ,等. MAS环境中一种基于反馈可信度的多维信誉计算算法[J]. 软件学报, 2020,31(2): 374-394. |
HUO X , ZHANG Y Y , JING Y J ,et al. Multidimensional reputation calculation method based on feedback reliability in MAS environment[J]. Journal of Software, 2020,31(2): 374-394. | |
[18] | 王田, 张广学, 蔡绍滨 ,等. 传感云中的信任评价机制研究进展[J]. 通信学报, 2018,39(6): 37-51. |
WANG T , ZHANG G X , CAI S B ,et al. Survey on trust evaluation mechanism in sensor-cloud[J]. Journal on Communications, 2018,39(6): 37-51. | |
[19] | NAGARAJAN R , THIRUNAVUKARASU R , SHANMUGAM S . A fuzzy-based intelligent cloud broker with MapReduce framework to evaluate the trust level of cloud services using customer feedback[J]. International Journal of Fuzzy Systems, 2018,20(1): 339-347. |
[20] | SIADAT S , RAHMANI A M , NAVID H . Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model[J]. The Journal of Supercomputing, 2017,73(6): 2682-2704. |
[21] | 邱磊, 蒋文贤, 李玉泽 ,等. 基于边缘计算与信任值的可信数据收集算法[J]. 软件学报, 2019,30(S1): 71-81. |
QIU L , JIANG W X , LI Y Z ,et al. Trustworthy data collection method based on edge computing and trust value[J]. Journal of Software, 2019,30(S1): 71-81. | |
[22] | LI X , LI J , YIU S ,et al. Privacy-preserving edge-assisted image retrieval and classification in IoT[J]. Frontiers of Computer Science, 2019,13(5): 1136-1147. |
[23] | HAN G J , HE Y , JIANG J F ,et al. A synergetic trust model based on SVM in underwater acoustic sensor networks[J]. IEEE Transactions on Vehicular Technology, 2019,68(11): 11239-11247. |
[24] | HUANG L T , DENG S G , LI Y ,et al. A trust evaluation mechanism for collaboration of data-intensive services in cloud[J]. Applied Mathematics & Information Sciences, 2013,7(1L): 121-129. |
[25] | WU Q T , ZHANG X L , ZHANG M C ,et al. Reputation revision method for selecting cloud services based on prior knowledge and a market mechanism[J]. The Scientific World Journal, 2014,2014: 1-9. |
[26] | AZIZ B , FREMANTLE P , WEI R ,et al. A utility-based reputation model for the Internet of things[C]// ICT Systems Security and Privacy Protection. Berlin:Springer, 2016: 261-275. |
[27] | REDDY V B , NEGI A , VENKATARAMAN S ,et al. A similarity based trust model to mitigate badmouthing attacks in Internet of things (IoT)[C]// Proceedings of 2019 IEEE 5th World Forum on Internet of Things. Piscataway:IEEE Press, 2019: 278-282. |
[28] | YUAN J , LI X Y . A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion[J]. IEEE Access, 2018,6: 23626-23638. |
[29] | TRUONG N B , LEE G M , UM T W ,et al. Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the Internet of things[J]. IEEE Transactions on Information Forensics and Security, 2019,14(10): 2705-2719. |
[1] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[2] | Biao JIN, Yikang LI, Zhiqiang YAO, Yulin CHEN, Jinbo XIONG. GenFedRL: a general federated reinforcement learning framework for deep reinforcement learning agents [J]. Journal on Communications, 2023, 44(6): 183-197. |
[3] | Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG. Distributed trust management scheme based on blockchain in Internet of vehicles [J]. Journal on Communications, 2023, 44(5): 148-157. |
[4] | Youliang TIAN, Shihong WU, Ta LI, Lindong WANG, Hua ZHOU. Federated learning optimization algorithm based on incentive mechanism [J]. Journal on Communications, 2023, 44(5): 169-180. |
[5] | Peixin ZHANG, Nan ZHANG, Daqing WANG, Tong WU, Zhe LI, Fengkui GONG. Joint resampling algorithm for parallel dual feedback time-frequency domain symbol timing recovery [J]. Journal on Communications, 2023, 44(4): 15-26. |
[6] | Youliang TIAN, Maoqing TIAN, Hongfeng GAO, Miao HE, Jinbo XIONG. Cooperation-based location authentication scheme for crowdsensing applications [J]. Journal on Communications, 2022, 43(9): 121-133. |
[7] | Zhenyu WANG, Yang GUO, Shaoqing LI, Shen HOU, Ding DENG. Design of efficient anonymous identity authentication protocol for lightweight IoT devices [J]. Journal on Communications, 2022, 43(7): 49-61. |
[8] | Congwei ZHOU, Bin HU, Jie GUAN. Construction de Bruijn sequence based on whole LFSR with 4 cycles [J]. Journal on Communications, 2022, 43(7): 126-133. |
[9] | Haijun LIAO, Zehan JIA, Zhenyu ZHOU, Nian LIU, Fei WANG, Zhong GAN, Xianjiong YAO. Dispatching and control information freshness guaranteed resource optimization in simplified power Internet of things [J]. Journal on Communications, 2022, 43(7): 203-214. |
[10] | Xiaodong YANG, Tian TIAN, Jiaqi WANG, Meijuan LI, Caifen WANG. Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration [J]. Journal on Communications, 2022, 43(5): 144-154. |
[11] | Yong LIAO, Shiyi WANG. CSI feedback algorithm based on RM-Net for massive MIMO systems in high-speed mobile environment [J]. Journal on Communications, 2022, 43(5): 166-176. |
[12] | Yong ZHANG, Dandan LI, Lu HAN, Xiaohong HUANG. Privacy-protected crowd-sensed data trading algorithm [J]. Journal on Communications, 2022, 43(5): 1-13. |
[13] | Haili SUN, Xiang LONG, Lansheng HAN, Yan HUANG, Qingbo LI. Overview of anomaly detection techniques for industrial Internet of things [J]. Journal on Communications, 2022, 43(3): 196-210. |
[14] | Hongyong JIA, Yunfei PAN, Wenhe LIU, Junjie ZENG, Jianhui ZHANG. Executive dynamic scheduling algorithm based on high-order heterogeneity [J]. Journal on Communications, 2022, 43(3): 233-245. |
[15] | Yong LIAO, Gang CHENG, Yujie LI. CSI feedback algorithm based on deep unfolding for massive MIMO systems [J]. Journal on Communications, 2022, 43(12): 77-88. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|