Journal on Communications ›› 2013, Vol. 34 ›› Issue (7): 167-173.doi: 10.3969/j.issn.1000-436x.2013.07.019

• Academic communication • Previous Articles     Next Articles

Trust evaluation model based on improved D-S evidence theory

Lin ZHANG1,2,3,Jing-wen LIU1,Ru-chuan WANG1,2,3,Hai-yan WANG1,2,3   

  1. 1 College of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China;
    2 Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China;
    3 Key Lab of Broadband Wireless Communication and Sensor Network Technology, Ministry of Education Jiangsu Province,Nangjing University of Posts and Telecommunications,Nanjing 210003, China
  • Online:2013-07-25 Published:2017-06-24
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Jiangsu Province;The Natural Science Foundation of Jiangsu Province;The Natural Science Foundation of Jiangsu Province;Scientific & Technological Support Project (Industry) of Jiangsu Province;Natural Science Key Fund for Colleges and Univers ities in Jiangsu Province;The Science Foundation of NJUPT;The Science Foundation of NJUPT

Abstract:

The existing trust evidence models cannot deal with malicious attacks in the distributed net quickly and effectively, and are lack of a trust normalization method that can measure relationship described by a triple set, so a trust model based on the improved D-S evidence theory was proposed. On this basis, basic trust value function based on continuous sequences and trust evaluation method based on evaluation function were also proposed to inhibit malicious nodes in a higher speed, and to enable the prediction results to be closer to the fact. Analysis and simulation show that this model has better effectiveness and robustness to deal th the aggregating trust attack, and trust evaluation method has better reasonableness and accuracy.

Key words: D-S evidence theory, trust evaluation model, basic probability assignment function, class probability function

No Suggested Reading articles found!