Skip to main content
Top
Published in: The Journal of Supercomputing 6/2015

01-06-2015

Using reputation measurement to defend mobile social networks against malicious feedback ratings

Authors: Lin Huang, Shangguang Wang, Ching-Hsien Hsu, Juanjuan Zhang, Fangchun Yang

Published in: The Journal of Supercomputing | Issue 6/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The reputation of a particular node/service is determined by the collective feedback ratings obtained from past users, and services’ reputation is vital to service recommendation in mobile social networks. However, existing malicious feedback ratings complicate the accurate measurement of nodes’ reputation scores. In this paper, we introduce an accurate reputation measurement approach, which uses both virgin and non-virgin reputation scores to shield services against malicious feedback ratings. We implement our approach based on the NetLogo simulation environment, and the simulation results show that our approach is capable of measuring node’s reputation more effectively when suffering from malicious feedback ratings compared with other approaches.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Yichuan J, Jiang JC (2014) Understanding social networks from a multiagent perspective. IEEE Trans Parallel Distrib Syst 10(25):2743–2759 Yichuan J, Jiang JC (2014) Understanding social networks from a multiagent perspective. IEEE Trans Parallel Distrib Syst 10(25):2743–2759
2.
go back to reference Eng Keong L, Ruichuan C, Zhuhua C (2011) Social trust and reputation in online social networks. In: Proceedings of IEEE 17th international conference on in parallel and distributed systems (ICPADS 2011), pp 811–816 Eng Keong L, Ruichuan C, Zhuhua C (2011) Social trust and reputation in online social networks. In: Proceedings of IEEE 17th international conference on in parallel and distributed systems (ICPADS 2011), pp 811–816
3.
go back to reference Wang S, Zheng Z, Wu Z, Yang F, Lyu MR (2014) Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Trans Serv Comput PP(99):1–14 Wang S, Zheng Z, Wu Z, Yang F, Lyu MR (2014) Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Trans Serv Comput PP(99):1–14
4.
go back to reference JooYoung L, Oh JC (2013) A model for recursive propagations of reputations in social networks. In: Proceeding of 2013 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM 2013), pp 666–670 JooYoung L, Oh JC (2013) A model for recursive propagations of reputations in social networks. In: Proceeding of 2013 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM 2013), pp 666–670
5.
go back to reference Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW 2003), pp 640–651 Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW 2003), pp 640–651
6.
go back to reference Li X, Ling L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 7(16):843–857 Li X, Ling L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 7(16):843–857
7.
go back to reference Ruidong L, Jie L, Peng L, Hsiao-Hwa C (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference (VTC2007-Spring), pp 56–60 Ruidong L, Jie L, Peng L, Hsiao-Hwa C (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference (VTC2007-Spring), pp 56–60
8.
go back to reference Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 12(43):45–48CrossRef Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 12(43):45–48CrossRef
9.
go back to reference Buchegger S, Le Boudec JY (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of P2PEcon Buchegger S, Le Boudec JY (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of P2PEcon
10.
go back to reference Zouridaki C, Mark BL, Hejmo M, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp 1–10 Zouridaki C, Mark BL, Hejmo M, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp 1–10
11.
go back to reference Liang Z, Shi W (2005) Enforcing cooperative resource sharing in untrusted P2P computing environments. Mobile Netw Appl 6(10):971–983CrossRef Liang Z, Shi W (2005) Enforcing cooperative resource sharing in untrusted P2P computing environments. Mobile Netw Appl 6(10):971–983CrossRef
12.
go back to reference Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv 1(42):1–31CrossRef Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv 1(42):1–31CrossRef
13.
go back to reference Wang S, Zheng Z, Wu Z, Sun Q, Zou H, Yang F (2014) Context-aware mobile service adaptation via a co-evolution extended classifier system in mobile network environments. Mobile Inf Syst 2(10):197–215CrossRef Wang S, Zheng Z, Wu Z, Sun Q, Zou H, Yang F (2014) Context-aware mobile service adaptation via a co-evolution extended classifier system in mobile network environments. Mobile Inf Syst 2(10):197–215CrossRef
14.
go back to reference Tran DT, Truong TTM, Le TG (2012) A routing strategy for non-cooperation wireless multi-hop ad hoc networks. Mobile Inf Syst 4(8):333–349CrossRef Tran DT, Truong TTM, Le TG (2012) A routing strategy for non-cooperation wireless multi-hop ad hoc networks. Mobile Inf Syst 4(8):333–349CrossRef
15.
go back to reference Ahn J, Han R (2013) Personalized behavior pattern recognition and unusual event detection for mobile users. Mobile Inf Syst 2(9):99–122CrossRef Ahn J, Han R (2013) Personalized behavior pattern recognition and unusual event detection for mobile users. Mobile Inf Syst 2(9):99–122CrossRef
Metadata
Title
Using reputation measurement to defend mobile social networks against malicious feedback ratings
Authors
Lin Huang
Shangguang Wang
Ching-Hsien Hsu
Juanjuan Zhang
Fangchun Yang
Publication date
01-06-2015
Publisher
Springer US
Published in
The Journal of Supercomputing / Issue 6/2015
Print ISSN: 0920-8542
Electronic ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1432-x

Other articles of this Issue 6/2015

The Journal of Supercomputing 6/2015 Go to the issue

Premium Partner