Skip to main content
Erschienen in: The Journal of Supercomputing 6/2015

01.06.2015

Using reputation measurement to defend mobile social networks against malicious feedback ratings

verfasst von: Lin Huang, Shangguang Wang, Ching-Hsien Hsu, Juanjuan Zhang, Fangchun Yang

Erschienen in: The Journal of Supercomputing | Ausgabe 6/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The reputation of a particular node/service is determined by the collective feedback ratings obtained from past users, and services’ reputation is vital to service recommendation in mobile social networks. However, existing malicious feedback ratings complicate the accurate measurement of nodes’ reputation scores. In this paper, we introduce an accurate reputation measurement approach, which uses both virgin and non-virgin reputation scores to shield services against malicious feedback ratings. We implement our approach based on the NetLogo simulation environment, and the simulation results show that our approach is capable of measuring node’s reputation more effectively when suffering from malicious feedback ratings compared with other approaches.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yichuan J, Jiang JC (2014) Understanding social networks from a multiagent perspective. IEEE Trans Parallel Distrib Syst 10(25):2743–2759 Yichuan J, Jiang JC (2014) Understanding social networks from a multiagent perspective. IEEE Trans Parallel Distrib Syst 10(25):2743–2759
2.
Zurück zum Zitat Eng Keong L, Ruichuan C, Zhuhua C (2011) Social trust and reputation in online social networks. In: Proceedings of IEEE 17th international conference on in parallel and distributed systems (ICPADS 2011), pp 811–816 Eng Keong L, Ruichuan C, Zhuhua C (2011) Social trust and reputation in online social networks. In: Proceedings of IEEE 17th international conference on in parallel and distributed systems (ICPADS 2011), pp 811–816
3.
Zurück zum Zitat Wang S, Zheng Z, Wu Z, Yang F, Lyu MR (2014) Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Trans Serv Comput PP(99):1–14 Wang S, Zheng Z, Wu Z, Yang F, Lyu MR (2014) Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Trans Serv Comput PP(99):1–14
4.
Zurück zum Zitat JooYoung L, Oh JC (2013) A model for recursive propagations of reputations in social networks. In: Proceeding of 2013 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM 2013), pp 666–670 JooYoung L, Oh JC (2013) A model for recursive propagations of reputations in social networks. In: Proceeding of 2013 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM 2013), pp 666–670
5.
Zurück zum Zitat Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW 2003), pp 640–651 Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW 2003), pp 640–651
6.
Zurück zum Zitat Li X, Ling L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 7(16):843–857 Li X, Ling L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 7(16):843–857
7.
Zurück zum Zitat Ruidong L, Jie L, Peng L, Hsiao-Hwa C (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference (VTC2007-Spring), pp 56–60 Ruidong L, Jie L, Peng L, Hsiao-Hwa C (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference (VTC2007-Spring), pp 56–60
8.
Zurück zum Zitat Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 12(43):45–48CrossRef Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 12(43):45–48CrossRef
9.
Zurück zum Zitat Buchegger S, Le Boudec JY (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of P2PEcon Buchegger S, Le Boudec JY (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of P2PEcon
10.
Zurück zum Zitat Zouridaki C, Mark BL, Hejmo M, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp 1–10 Zouridaki C, Mark BL, Hejmo M, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp 1–10
11.
Zurück zum Zitat Liang Z, Shi W (2005) Enforcing cooperative resource sharing in untrusted P2P computing environments. Mobile Netw Appl 6(10):971–983CrossRef Liang Z, Shi W (2005) Enforcing cooperative resource sharing in untrusted P2P computing environments. Mobile Netw Appl 6(10):971–983CrossRef
12.
Zurück zum Zitat Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv 1(42):1–31CrossRef Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv 1(42):1–31CrossRef
13.
Zurück zum Zitat Wang S, Zheng Z, Wu Z, Sun Q, Zou H, Yang F (2014) Context-aware mobile service adaptation via a co-evolution extended classifier system in mobile network environments. Mobile Inf Syst 2(10):197–215CrossRef Wang S, Zheng Z, Wu Z, Sun Q, Zou H, Yang F (2014) Context-aware mobile service adaptation via a co-evolution extended classifier system in mobile network environments. Mobile Inf Syst 2(10):197–215CrossRef
14.
Zurück zum Zitat Tran DT, Truong TTM, Le TG (2012) A routing strategy for non-cooperation wireless multi-hop ad hoc networks. Mobile Inf Syst 4(8):333–349CrossRef Tran DT, Truong TTM, Le TG (2012) A routing strategy for non-cooperation wireless multi-hop ad hoc networks. Mobile Inf Syst 4(8):333–349CrossRef
15.
Zurück zum Zitat Ahn J, Han R (2013) Personalized behavior pattern recognition and unusual event detection for mobile users. Mobile Inf Syst 2(9):99–122CrossRef Ahn J, Han R (2013) Personalized behavior pattern recognition and unusual event detection for mobile users. Mobile Inf Syst 2(9):99–122CrossRef
Metadaten
Titel
Using reputation measurement to defend mobile social networks against malicious feedback ratings
verfasst von
Lin Huang
Shangguang Wang
Ching-Hsien Hsu
Juanjuan Zhang
Fangchun Yang
Publikationsdatum
01.06.2015
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 6/2015
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-015-1432-x

Weitere Artikel der Ausgabe 6/2015

The Journal of Supercomputing 6/2015 Zur Ausgabe

Premium Partner