普适计算环境下的信任模型及相关应用研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
普适计算的网络环境具有动态和不可预知的特点,交互可能发生在熟知的实体之间也可能发生在完全陌生的实体之间。普适计算倡导以人为中心,因此如同人类社会网络的存在的安全与信任问题一样,普适计算技术的发展必然也伴随着安全与信任问题,然而传统的安全技术PKI, CA等静态信任安全机制已经不能适应这种动态变化环境的需求,如果缺乏有效的安全信任机制保障,普适计算将难以真正实现。因此如何设计有效的动态信任机制来适应普适计算中的各种动态变化的环境已经逐渐成为研究的一个热点。但是目前为止所提出的一些普适计算网络环境下的信任模型尚未完善,主要存在以下几个问题,一、绝大多数信任模型,缺乏上下文感知能力,缺乏足够的能够对时间,地点,交互内容等上下文感知的信任计算模型。二、大部分信任模型在计算信任度的时候没有考虑信任关系之间的语义关系,也未能考虑不同实体之间天然存在的语义关系,使得这些模型的效率和精细度都不够。三、大部分信任模型设计的比较复杂,不合适资源受限的普适计算环境。本文针对上述问题进行了深入研究并提出了新的信任模型以部分地解决这些问题,在此基础上,本文对信任模型在普适计算环境中的WSN和P2P网络下的一些应用做了研究,在普适计算环境中信任模型的应用主要集中在两个方面。第一个方面是是用于促进实体间的信任水平进而提高实体间的合作水平,本文在这个方面的研究分别在第五章和第六章针对不同的应用环境提出了两种方法来促进实体间的合作水平。第二个方面的应用是为普适计算条件下的一些具体应用提供安全保障机制,本文第七章在这方面的研究针对具体的WSN网络路由应用提出了一种基于可信路由树的数据路由机制。主要工作如下:
     (1)针对普适计算网络环境的特点,提出了一种适合于普适计算网络环境的上下文感知的自适应信任模型CASATM,该信任模型能够自适应的对不同的服务提供不同层次的安全保障,能有效地对时间,地点,服务内容等上下文感知。同时提出了一种简单高效的风险评估模型来完成对一些陌生实体的信任度初始化。通过仿真实验分析,该信任模型能有效的感知上下文并抵抗恶意客体的周期性欺骗行为。
     (2)借助本体论提出了一种基于语义距离的信任模型。该信任模型利用实体之间的语义距离和信任关系之间的语义距离来更加精确的计算信任度。同时在本文的信任模型中区分了实体的行为信任和能力信任,所有的实体在基于自身利益最大化的思想下利用该信任模型来做出决策。仿真实验证实了该模型的有效性,能有效提高普适计算网络环境中实体间交互的成功率与交互效率。
     (3)对分布式信任模型在普适计算环境下对于提高节点合作水平的应用进行了研究。在分布式信任模型的基础上借助博弈论理论研究了激励节点合作行为的机制,让节点迅速学习适宜的合作行为,与传统的分布式模型不同的是适应度高的行为策略的传播效率更高,这样可以加速整体合作水平提高的收敛过程。与此同时扩展了收益函数,使得实体在低能量状态下可以采用相对保守的行为从而延长整个网络的寿命。
     (4)在普适计算环境的P2P网络下,研究了信任模型在多agent系统合作模型中的应用。提出了一种基于兴趣信任的多agent合作模型,利用Bayesian方法对agent的信任度按兴趣领域进行了分类评估,通过agent间基于兴趣信任的链接更新形成稳定的多agent合作系统。最后的仿真实验显示,本文提出的基于兴趣信任的合作系统演化方案不仅能有效提高任务的执行成功率,而且能有效改善网络拓扑结构,使所有的agent在不同的兴趣领域内聚集在该领域内服务能力较强的信任agent周围,保证了合作对象选取的可靠性。经过多轮演化后,本方案能使agent在不同的兴趣领域形成“兴趣分类聚集”,减小了网络同化现象,突出了agent的个性。
     (5)在普适计算环境的无线传感器网络下,研究了信任模型在数据路由中的应用,提出了一种基于信任核心树的数据路由算法。该算法在局部范围内选取具有相对较高剩余能量和信任度的节点作为簇首节点,从而对整个网络进行分簇。然后通过一个最小能耗生成树算法将所有簇首节点组织成以Sink节点为根的信任核心树,进而对该树进行扩展构建成覆盖全网的信任路由树。所有的数据沿着信任路由树上唯一的路径向Sink节点汇报。同时该算法引入了信任模型,该模型通过对网络中有数据包篡改,丢包,谎报等行为的恶意节点进行检测来评估节点的信任度。仿真结果证明该TCTR算法能有效减小能耗、平衡负载从而延长网络生存时间,同时也能有效识别与隔离恶意节点从而提高路径安全度。
The network environment for pervasive computing has the characters of dynamic and unpredictable, interactions could be launched between familiar entities or totally unknown entities. As the security and trust problem existed in human society, these problems also exist in the development of pervasive computing technology, however, traditional static security mechanisms like PKI and CA are not appropriate for such open and dynamic environments. Pervasive computing can not be realized without the quarantee of efficient security and trust mechanism. A hot spot research in recent years is how to design an effective dynamic trust mechanism to deal with the dynamic and unpredictable pervasive environments. However, most trust models proposed for pervasive environments is not yet perfect, some disadvantages are. existed as described following:1:Most trust models lack of the ability of context awareness and adaptiveness, contexts like time,location and interaction service can not be awared and distinguished by trust models.2:The semantic relations between different trust categories and between different interact entities are not considered in these trust models, while it may lead to low efficiency and low accuracy.3:Most existed trust models are too complicated, and are not appropriate for resource constrained environments. These above problems are deeply studied and partly solved by new trust models proposed in this paper, based on this, we also list some research work on applying trust models under the pervasive environments. The applications of trust models for pervasive environments are concentrated on two aspects. The first research aspect is to take use of trust model to enhance trust levels between entities and increase the cooperation level between entities, related to this, two methods are studied in chapter5and chapter6to increase the cooperation level under different networks in pervasive environments. The second research aspect is to afford security guarantees for the applications in pervasive environments, related to this, a routing algorithm based on trust routing tree for WSN is proposed in chapter7. The main work and contributions are presented in the following aspects:
     (1) A Context-Aware and Self-Adaptive Trust Model(CASATM) for pervasive environments is proposed, our trust model provide security protection based on service content adaptively at various level, and be sensitive to contexts such as time, location and service content. A simple and efficient risk evaluation model was presented to initialize trust value to unknown entities which is a common phenomenon in pervasive environments. Simulation results testify to the contexts Awareness of our model, as well as resistance of periodically cheating behaviour from malicious entity.
     (2) A semantic distance based trust model is proposed in this paper. The semantic distance between entities and between trust categories is borrowed to calculate trustworthiness more precisely. In our model, the behavior trust and capability trust is distinguished, all entities in pervasive environments make independent decisions which can maximize their own profit with our trust model. The simulation experiment results proved the effectiveness of our model in increasing the interaction success ratio between entities as well as the interaction efficiency.
     (3) The application of distributed trust model in cooperation evolution under pervasive environments is researched. Game theory is borrowed and integrated in trust models to stimulate nodes'cooperation behavior. A distributed trust model based on a non-cooperative game that uses a genetic algorithm to let the nodes quickly learn the appropriate cooperation behavior is proposed in this paper, unlike traditional distributed model, a good behavior strategy with high fitness owns a higher transmitting efficiency to accelerate the convergence process. Further more, to prolong the network life, we expand the payoff table to encourage node's selfish behavior in case of low energy level.
     (4) The application of trust model in cooperation evolution under multi-agents system of P2P networks is studied. An interest-trust based cooperation model is proposed, the interest-trustworthiness of agents is evaluated in different interest fields by utilizing Bayesian method. By updating the interest-trust based connection between agents, a robust multi-agent cooperative system is formed. Simulation results prove that the proposed interest-trust based cooperation model can not only increase the ratio of successful execution of tasks, but also improve network topology to cluster nodes around the trustworthy nodes in different interest fields. The advantage of our model include following features:a kind of interest-trust based clustering is formed, network assimilation is avoided and agent's personality is embodied.
     (5) The application of trust model in the data packets routing under WSN networks is studied in chapter7. A novel routing algorithm base on trustworthy core tree (TCTR) is proposed aims to prolong network lifetime as well as increase network security in a hierarchical-cluster sensornet. Cluster heads with higher residual energy and trust level are elected from underlying sensor nodes. A minimum pathloss tree algorithm is borrowed to organize all cluster heads as a trustworthy core tree with sink node as tree root. Expand the Trustworthy core tree to cover all nodes so that each node report to sink node with a certain route. A trust model is integrated in TCTR to evaluate node's trust level and detect evil nodes. Simulation results testify to the effectiveness of the algorithm in producing a longer network lifetime and a safer network.
引文
[1]Weiser M. T he computer for the twenty-first century. Scientific American,1991, 265(3):94-104
    [2]徐光祐,史元春,谢伟凯。普适计算[J]。计算机学报,2003,26(9):1042-1050。
    [3]Dertouzos M. The future of computing. Scientific American,1999,282(3):52-63.
    [4]S. Marsh, Formalising trust as a computational concept [PhD Thesis], Scotland: University of Stirling,1994.
    [5]A. Abdul-Rahman, S. Halles. A distributed trust model. In new Security Paradigms Workshop,1997.48-60.
    [6]A. Abdul-Rahman, S. Hailes. Using recommendations for managing trust in distributed systems. In Proceedings of the IEEE Malaysia International Conference on Communication'97 (MICC'97), Kuala Lumpur, IEEE PRESS,1997.
    [7]T. Beth, M. Borcherding, B. Klein. Valuation of trust in open networks. In Proceedings of the European Symposium on Research in Computer Security. Springer-Verlag,Brighton UK,1994.3-18.
    [8]T. Grandison, M. Sloman. A Survey of Trust in Internet Applications. IEEE Communications Survey and Tutorials,3,2000.
    [9]D.Gambetta. Can We Trust Trust? In D. Gambetta (ed.), Trust:Making and Breaking Cooperative Relations, Basil Blackwell. Oxford,1990.213-238.
    [10]Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In:Proc. of the 1996 IEEE Symp. On Security and Privacy. Washington:IEEE Computer Society Press,1996.164-173.
    [11]Ruohomaa S, Kutvonen L. Trust management survey. LNCS 3477. Berlin: Springer-Verlag,2005.77-92.
    [12]Song S, Hwang K, Zhou R, Kwok YK. Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing,2005,9(6):24-34.
    [13]Jordi Sabater i Mir, Trust and reputation for agent societies[PhD Thesis], Campus UAB, Barcelona, Spain,2002.
    [14]Josang, Audun, Ismail, Roslan, Boyd, A. Colin. A survey of trust and reputation systems for online service provision. Decision Support Systems,2007. 43(2):618-644.
    [15]P. Resnick, R. Zeckhauser, E. Friedman, K. Kuwabara. Reputation Systems. Communications of the ACM, December 2000,43(12):45-48.
    [16]Y.Wang, J.Vassileva. Bayesian Network-Based Trust Model in P2P Networks. In Proceedings of AP2PC 2003, IEEE Computer Society.2003.372-378.
    [17]A. Josang. A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, June 2001,9(3):279-311.
    [18]B.Yu, M.P. Singh. An Evidential Model of Distributed Reputation Management. In Proceedings of the First Int. Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS). ACM, Bologna, Italy, July 2002.294-301.
    [19]唐文.基于模糊集合理论的信任管理研究[博士学位论文].北京大学,2003.
    [20]S.D. Kamvar, M.T. Schlosser. EigenRep:Reputation Management in P2P Networks. In Proceedings of the twelfth International World Wide Web Conference, Budapest, Hungary, ACM Press. May 2003.123-134.
    [21]Q.Zhang,T.Yu. A Classification Scheme for Trust Functions in Reputation-Based Trust Management. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan,2004.
    [22]Z.Despotovic, K.Aberer,Maximum Likelihood Estimation of Peers' Performances in P2P Networks, in:2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, MA, USA,2004.1-9.
    [23]D.W.Manchala:Trust metrics, models and protocols for electronic commerce transactions. In The 18th International Conference on Distributed Computing Systems,1998.3-12.
    [24]L.Zadeh:Fuzzy sets as a basis for a theory of possibility. Fuzzy Sets and Systems,1978.1:3-28.
    [25]T.Chiueh:Optimization of fuzzy logic inference architecture. IEEE Computer, 1992.67-71.
    [26]S.Song,K.Hwang, R.Zhou.Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing,2005.9(6):24-34.
    [27]L.Page, S.Brin, R.Motwani, and T.Winograd. The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford Digital Library Technologies Project,1998.
    [28]C.N.Ziegler, G.Lausen. Spreading Activation Models for Trust Propagation. In Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE'04), Taipei, March 2004.83-97.
    [29]R. Levien. Attack Resistant Trust Metrics. PhD thesis, University of California, Berkeley,2004.
    [30]M.Blaze, J.Feigenbaum, J.Lacy:Decentralized trust management. In;J.Dale,G.Dinolt, eds., in Poreeedings of the 17th SymPosium on Security and Privacy. Oakland, CA:IEEE Computer Society Press,164-173,1996.
    [31]A.Abdul-Rahman, s.Hailes:A distributed trust model. In new Security Paradigms Workshop'97,48-60,1997.
    [32]A.Abdul-Rahman, s.Hailes:Using recommendations for managing trust in distributed systems, in Proceedings of the IEEE Malaysia International Conference on Communication'97(MICC'97), Kuala LumPur, IEEE PRESS,1997.
    [33]TBeth, M.Borcherding, B.Klein:Valuation of trust in open networks. In Proceedings of the European Symposium on Research in Computer Security. Springer-Verlag, Brighton UK,3-18,1994.
    [34]Shafer.G.:A Mathematical Theory of Evidence.Princeton. NJ:Princeton University Press,1976.
    [35]Y.Teng, V.Phoha, B.Choi:Design of trust metrics based on dempstershafer theory. http://citeseer.nj.nec.com/461538.html.
    [36]M.Ginsberg:Non-monotonic reasoning using dempster's rule. In Proc.of the AAAI-84,125-129,1984.
    [37]D.W.Manchala:Trust metrics, models and Protocols of electronic commerce transactions.In The 18th International Conference on Distributed Computing Systems,3-12,1998.
    [38]A.Josang:Prospectives for modeling trust in information security. In Australasian Conference on Information Security and privacy.2-13,1997.
    [39]A.Josang:A subjective metric of authentication. In ESORICS:European Symposium on Research in Computer Security. Lecture Notes in Computer Science, Springer-Verlag,1998
    [40]K.Aberer and Z.DesPotovie:Managing turst in a Peer to Peer information system.In 2001 ACMCIKM International Conference on Information and Knowledge Management,2001.
    [41]Li Xiong and L.Liu:A reputation-based trust model for P2P ecommerce communities.In IEEE Conference on E-Commerce (CEC'03).Newport Beach, California,275-284,2003.
    [42]Li Xiong, Ling Liu:PeerTrust:Supporting Reputation-Based Trust for P2P Electronic Communities. IEEE Trans.Knowl.Data Eng.16(7):843-857,2004.
    [43]Yao Wang,Julita Vassileva:Bayesian Network-Based Trust Model in P2P Networks. In Web Intelligence. IEEE Computer Society,372-378,2003.
    [44]F.Comelli,E.Damiani,S.D.C. Vimercati, S.Paraboschi,and P.samarati:A reputation-based approach for choosing reliable resources in P2P networks. In CCS'02,Washington DC,USA.2002.
    [45]F.Comelli,E.Damiani,S.D.C. Vimercati, S.Paraboschi,and P.samarati:Choosing Reputable Servents in a P2P Network, Proc.11th Int'l World Wide Web Conf. 2002.
    [46]Bin Yu, Munindar P.Singh:A Social Mechanism of Reputation Management in Electronic Communities. CIA 2000:154-165,2000.
    [47]S.D.Kamvar, M.T.Schlosser, and H.Garcia-Molina:The EigenTrust Algorithm for Reputation Management in P2P Networks. The Twelfth International World Wide Web Conference(www2003). Budapest. Hungary. ACM Press.5.640-651.2003.
    [48]C.English, P.Nixon, S.Terzis, A.McGettick, and H.Lowe:Dynamic Trust Models for Ubiquitous Computing Environments. First Workshop on Security in Ubiquitous Computing at the Fourth Annual Conference on Ubiquitous Computing,2002.
    [49]J.Kong, P.Zerfos, H.Luo, S.Lu, and L.Zhang:Providing robust and ubiquitous security support for mobile ad-hoc networks. In IEEE ICNP,2001.
    [50]Tim Kindberg, Abigail Sellen, and Erik Geelhoed:Security and Trust in Mobile Interactions:A Strdy of Users'Perceptions and Reasoning. In Proceedings of the Sixth International Conference on Ubiquitous Computing(UbiComp 2004),2004.
    [51]J.Liu and V.Issarny:Enhanced Reputation Mechanism for mobile Ad-Hoc Networks. In Proceedings of the 2nd International Conference on Trust Management, LNCS 2995,48-62,March 2004.
    [52]George Theodorakopoulos, John S.Baras:Trust Evaluation in Ad-hoc Networks, the 2004 ACM Workshop on Wireless Security(WISE'04),Oct,2004.
    [53]徐峰,吕建:Web安全中的信任管理研究与进展.软件学报,2002,11(13):2057-2064.
    [54]Yin Gang,Wang Huaimin,Shi Dianxi:Towards more Controllable and Practical Delegation. Mathematical Methods, Models and Architectures for Computer Networks Security Workshop(MMM-ACNS'05), St.Pertersburg, Russia, LNCS 3685, Springer Verlag,2005.
    [55]窦文等:构造基于推荐的Peer-to-Peer环境下的Trust模型.软件学报,2004,15(4):571-583.
    [56]A.Josang, R.Ismail, and C.Boyd:A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems,2005.
    [57]Z.Q.Liang and W.S.Shi,PET:A Personalized trust model with reputation and risk evaluation for p2p resource sharing[C], the 38th Hawii International Conference on System Science,2005.
    [58]Kevin Xuhua Ouyang, Binod Vaidya, Dimitrios Makrakis. A Trust Evaluation Model using Controlled Markov Process for MANET[C]. Second International Workshop on Network Assurance and Security Services in Ubiquitous Environments,IEEE,630-638,2010.
    [59]Renu Dalal, Manju Khari, and Yudhvir Singh. Survey of Trust Schemes on Ad-Hoc Network. Institute for Computer Sciences[J], Social Informatics and Telecommunications Engineering,170-180,2012.
    [60]Xue Wang,Liang Ding, and Sheng Wang, Trust Evaluation Sensing for Wireless Sensor Networks[J]. IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT,2088-2096,2011.
    [61]李景涛,荆一楠,肖晓春,王雪平,张根度,基于相似度加权推荐的P2P环境下的信任模型[J].软件学报,18(1):157-167,2007.
    [62]Zhou RF, Hwang K. Power Trust:A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing[J]. IEEE Transactions on parallel and distributed systems,18(4):460-473,2009.
    [63]常俊胜,王怀民,尹刚,DyTrust:一种P2P系统中基于时间帧的动态信任模型.计算机学报[J],29(8):1301-1307,2006.
    [64]G. Liu, Y. Wang, M. A. Orgun, E.-P. Lim, A heuristic algorithm for trust-oriented service provider selection in complex social networks [C], in:Proceedings of the 2010 IEEE International Conference on Services Computing, SCC i10, IEEE Computer Society, Washington, DC, USA, pp.130-137,2010.
    [65]Karl K,Mogens N. From Simulations to Theorems:A Position Paper on Research in the Field of Computational Trust[A].In:Gerhard G, Juris H, Jan van L eds. Formal Aspects in Security and Trust, LNCS 4691,97-111,2007.
    [66]Gyarmati, L. and T. Tuan Anh, Measuring user behavior in online social networks. Network[J], IEEE.24(5):p.26-31,2010.
    [67]Punam Bedi and Pooja Vashisth. A Fuzzy Trust Model for Argumentation-Based Recommender Systems[J]. Proceedings of the International Conference on SocProS 2011, pp.493-502,2011.
    [68]Andersen, R., Borgs, C., Chayes, J., Feige, U., Flaxman, A., Kalai, A., Mirrokni, V.,Tennenholtz, M.:Trust-Based Recommendation Systems:an Axiomatic Approach[A], WWW 2008, Refereed Track:Internet Monetization-Recommendation & Security,21-25,2008.
    [69]Aringhieri R, Damiani E, De Capitani Di Vimercati S, Paraboschi S, Samarati P. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems[J].Journal of the American Society for Information Science and Technology,2006,57(4):528-537.
    [70]Bedi, P., Vashisth, P.:Interest Based Recommendations with Argumentation[J]. Journalof Artificial Intelligence, ANSI,119-142,2011.
    [71]Schmidt S, Steele R, Dillon TS, Chang E. Fuzzy trust evaluation and credibility development in multi-agent systems[]J. Applied Soft Computing Journal,2007, 7(2):492-505.
    [72]唐文,胡建斌,陈钟,基于模糊逻辑的主观信任管理模型研究[J].计算机研究与发展,2005,42(10):1654-1659.
    [73]徐兰芳,胡怀飞,桑子夏等,基于灰色系统理论的信誉报告机制[J].软件学报,2007,18(7):1730-1737.
    [74]Binu Thomas, G. Raju. A fuzzy threshold based unsupervised clustering algorithm for natural data exploration [A].2010 International Conference on Networking and Information Technology[C]:473-477,2010.
    [75]Kun Qin, Min Xu, Yi Du, et al. Cloud model and hierarchical clustering based on spatial data mining method and application[A]. The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences[C],2009: 241-245
    [76]Mohammad Gias Uddin,Mohammad Zulkernine, Sheikh Iqbal Ahamed. Collaboration through computation:incorporating trust model into service-based software systems[A].Spriger SOCA(2009) 3:47-63
    [77]AHAMED S I, SHARMIN M. A trust-based secure service discovery (TSSD) model for pervasive computing"[J]. Journal of Computer Communications, Dec 2008,31(18),4281-4293.
    [78]ALMENAREZ F, MARIN A, DIAZ D, et al. Developing a model for trust management in pervasive devices[C]. In Proc of the 3rd IEEE Int'1 Workshop on Pervasive Computing and Communication Security (PerSec 2006). Washington: IEEE Computer Society Press,2006.267-272.
    [79]ALMENAREZ F, MARIN A, CAMPO C, et al. TrustAC:Trust-based access control for pervasive devices. LNCS 450. Berlin:Springer-Verlag,2005.225-238.
    [80]L.Kagal, T.Finin, and A.Joshi, "Trust-based security in pervasive computing environments," IEEE Computer, vol.34, no.12, pp.154-157,2001.
    [81]L.Kagal, T.Finin, and A.Joshi, "Moving from security to distributed trust in ubiquitous computing environments," IEEE Computer,2001.
    [82]AHAMED S I, HAQUE M M. Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments [J]. Journal of Systems and Software,83(2),253-270,2010.
    [83]TAHERIAN M,JALILI R, ABOLHASSANI H, et al. PTO:A Trust Ontology for Pervasive environments[A].IEEE AINA-2008 International Conference [C]. GinoWan,Okinawa,Japan, March 25-28,301-306,2008.
    [84]Jameel H, Hung LX, Kalim U, Asjjad A, Lee SY, Lee YK. A trust model for ubiquitous systems based on vectors of trust values. In:Proc. of the 7th IEEE Int'1 Symp. On Multimedia. Washington:IEEE Computer Society Press,2005. 674-679.
    [85]He R, Niu JW, Zhang GW. CBTM:A trust model with uncertainty quantification and reasoning for pervasive computing. LNCS 3758. Berlin:Springer-Verlag,2005. 541-552.
    [86]Song SS, Hwang K. Fuzzy trust integration for security enforcement in grid computing. In:Proc. of the Int'1 Symp. On Network and Parallel Computing (NPC 2004). LNCS 3222, Berlin:Springer-Verlag,2005.9-21.
    [87]Kaelbling LP, Littman ML, Moore AW. Reinforcement learning:A survey. Journal of Artificial Intelligence Research,1996,4:237-285.
    [88]G. A. Golbeck, "Computing and applying trust in web-based social networks," Ph.D. dissertation, University of Maryland,2005.
    [89]G. A. Golbeck and J. Hendler, "Inferring binary trust relationships in web-based social networks," ACM Transactions on Internet Technology,vol.6, no.4, pp. 497-529,2005.
    [90]A. Josang, R. Hayward, and S. Pope, "Trust network analysis with subjective logic," in Australasian Computer Science Conference (ACSC2006), Hobart, Australia,2006, pp.85-94.
    [91]N. Griffiths, K. M. Chao, and M. Younas, "Fuzzy trust for peer-to-peer systems," in P2P Data and Knowledge Sharing Workshop (P2P/DAKS 2006), at the 26th International Conference on Distributed Computing Systems (ICDCS 2006). Lisbon, Portugal:IEEE Computer Society,2006, pp.73-73.
    [92]Y. Wang and J. Vassileva, "Trust and reputation model in peer-to-peer networks," in 3rd International Conference on Peer-to-Peer Computing(P2P 2003). IEEE Computer Society,2003, pp.150-157.
    [93]N. Griffiths, K. M. Chao, and M. Younas, "Fuzzy trust for peer-to-peer systems," in P2P Data and Knowledge Sharing Workshop (P2P/DAKS 2006), at the 26th International Conference on Distributed Computing Systems (ICDCS 2006). Lisbon, Portugal:IEEE Computer Society,2006, pp.73-73.
    [94]Levente Buttyan, Jean-Pierre Hubaux, Enforcing service availability in mobile ad-hoc WANs, Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing, November 20,2000, Boston, Massachusetts
    [95]Yale SZ, Zhong S. Sprite:A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In:Proceedings of IEEE INFOCOM,2002. p.1987-1997.
    [96]Buchegger, S., Le Boudec, J.-Y,2002. Performance analysis of the confidant protocol. In:MobiHoc'02:Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. ACM Press, New York, NY, USA, pp. 226-236.
    [97]Rob Sherwood, Seungjoon Lee, Bobby Bhattacharjee, Cooperative peer groups in NICE, Computer Networks:The International Journal of Computer and Telecommunications Networking, v.50 n.4, p.523-544,15 March 2006.
    [98]Mark Felegyhazi, Jean-Pierre Hubaux, Levente Buttyan, Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks, IEEE Transactions on Mobile Computing, v.5 n.5, p.463-476, May 2006
    [99]Marcin Seredynski, Pascal Bouvry, Evolutionary game theoretical analysis of reputation-based packet forwarding in civilian mobile Ad Hoc networks, Proceedings of the 2009 IEEE International Symposium on Parallel&Distributed Processing, p.1-8, May 23-29,2009
    [100]Fabio Milan, Juan Jose Jaramillo, R. Srikant, Achieving cooperation in multihop wireless networks of selfish nodes, Proceeding from the 2006 workshop on Game theory for communications and networks, October 14-14,2006, Pisa, Italy
    [101]K. Komathy, P. Narayanasamy, Trust-based evolutionary game model assisting AODV routing against selfishness, Journal of Network and Computer Applications, v.31 n.4, p.446-471, November,2008
    [102]Wang, K., Wu, M., Ding, C., Lu, W.,2010. Game-based modeling of node cooperation in ad hoc networks. In:19th Annual Wireless and Optical Communications Conference (WOCC), Shanghai, China, pp 1-5,May 2010.
    [103]Zhu Ji, Wei Yu, K. J. Ray Liu, A Belief Evaluation Framework in Autonomous MANETs under Noisy and Imperfect Observation:Vulnerability Analysis and Cooperation Enforcement, IEEE Transactions on Mobile Computing, v.9 n.9, p.1242-1254, September 2010.
    [104]Juan Jose Jaramillo, R. Srikant, A game theory based reputation mechanism to incentivize cooperation in wireless ad hoc networks, Ad Hoc Networks, v.8 n.4, p.416-429, June,2010
    [105]Seredynski, M., Bouvry, P., Klopotek, M., April 2007. Modeling the evolution of cooperative behavior in ad hoc networks using a game based model. IEEE Symposium on Computational Intelligence and Games CIG,96-103.
    [106]Marcela mejia et al, A Game Theoretic Trust Model for On-Line Distributed Evolution of Cooperation in MANETs. Journal of Network and Computer Applications,39-51, Jan 2011.
    [107]Holland, J. H.,1975. Adaptation in natural and artificial systems:an introductory analysis with applications to biology, control, and artificial intelligence. University of Michigan Press, Ann Arbor.
    [108]Nowostawski M, Poli R. Parallel genetic algorithm taxonomy. In:Third international conference on knowledge-based intelligent information engineering systems,1999. p.88-92.
    [109]Enrique Alba, Jose M. Troya, A survey of parallel distributed genetic algorithms, Complexity, v.4 n.4, p.31-52, Mar./Apr.1999
    [110]Atsushi Terauchi,Osamu Akashi.Trust-Based Cooperative Action control in Multi-agent Systems for Network Management[A], Proceedings of the 2009 International Conference on Advanced Information Networking and Applications Workshops [C],Washington,DC,USA,2009.
    [111]Michael J.Smith,Marie Desjardins. Learning to trust in the competence and commitment of agents [J], Autonomous Agents and Multi-Agent Systems,2009,18(1):36-82.
    [112]ARCOS J L,ESTEVA M,NORIEGA P,et al.Enrironment engineering for multiagent system [J], Journal on Engineering Applications of Artificial Intelligence,2005,18(2):191-204.
    [113]HU Y J.Some Thoughts on agent trust and delegation[A],Proceedings of the Fifth International Conference on Autonomous Agents(AGENTS'01)[C], Montreal,Quebec,Canada,2001.
    [114]GRANDISON T,SLOMAN M.Trust management tools for Internet applications[A].Proceedings of the First International Conference on Trust Management[C].Greece,2003.
    [115]贺利坚,黄厚宽等人.多Agent系统中信任和信誉系统研究综述[J].计算机研究与发展,2008 45(7),1151:1160.
    [116]李小勇,周锋等人.多Agent系统中信任预测的SRL模型[J].北京邮电大学学报,vol 33 No 6,2010.
    [117]林新建,胡山立,郑盛福.一种基于3APL的多agent合作系统[J].计算机应用研究,vol 25 No 3,2008.
    [118]Resnick, P. and Zeckhauser, R.2000. Trust among strangers in Internet transactions:Empirical.analysis of eBays Reputation System. In Working paper for the NBER workshop on empirical studies of electronic commerce.
    [119]王伟,曾国荪,刘涛.基于信任机制的协作系统形成与演化机制[J].通信学报,2007,27(11).
    [120]HECHERMAN N A Tutorial on Learning with Bayesian Networks[R].Technical Report MSR-TR-95-06,Microsoft Research Advanced Technology Division, Microsoft Corporation,1995.
    [121]张书钦,李山林,杨永田.基于信任的对等网络构造[J].小型微型计算机系统,2006,27(2):246-249.
    [122]Qi Jing,LiYong Tan,Zhong Chen. Trust management in WSN[J]. Journal of Software,2008,7(19):1716-1730.
    [123]Zhong Chen,Peng Liu. Trust Computing[J]. China. Information Security.2003,11:17-20.
    [124]Hongjun Dai, Zhiping Jia, Xiaona Dong. An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks [C]//Proceedings of the 2008 International Conference on Embedded Software and Systems-Volume 00. Washington, DC, USA.2008:27-34.
    [125]Xiong Fei, Xu Qi Jian. Active Trust Transmission Mechanism for Wireless Sensor Network [C]//Proceedings of the 2008 Second International Symposium on Intelligent Information Technology Application-Volume 01. Washington, DC, USA.2008:626-632.
    [126]GANER IWAL S, SR IVASTAVA M B. Reputation-based Frameworkfor High Integrity Sensor Networks [C]//SASN'04. WashingtonUSA,2004.
    [127]TANACHA IW IWAT S, DAVE P, BH INDWALE R, et al. Secure Locations: Routing on Trust and Isolating Comp romised Sensors in Location-Aware Sensor Networks. [C]//SenSys'03. California USA,2003:324-325.
    [128]LIXiaoqi, LYU M R, LIU Jiangchuan. A TrustModel Based Routing Protocol for Secure Ad Hoc Networks[EB/OL]. http//www.cse.cuhk.edu.hk/~lyu/paper_pdf /Aero04_TAODV.pdf.
    [129]Kannan R, Ray L, and Iyengar S S, et al. Max-min length-energy-constrained routing in wireless sensor networks.Proceedings of 1st European Conference Workshop on Wireless Sensor Networks, Berlin, Germany, January 18-21,2004: 234-249.
    [130]Kannan R and Iyengar S S. Game-theoretic models for reliable path-length and energy-constrained routing with data aggregation in wireless sensor networks. IEEE Trans. On Selected Areas of Communications,2004,22(6):1141-1150.
    [131]Wu Xiaoping and Lin Hong. An Improved Routing Algorithm Based on LEACH Protocol[C]. In Proceedings of the 2010 Ninth Internatialal Symposium on Distributed Computing and Applications to Business,Engineering and Science. HongKong,China,Aug 10-12,2010,Pages 259-262.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700