Incentive Adaptive Trust Model Based on Integrated Intuitionistic Fuzzy Information
XU Jun①② ZHONG Yuansheng② WAN Shuping②
①(College of Modern Economics & Management, Jiangxi University of Finance and Economics, Nanchang 330013, China) ②(College of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, China)
Existing trust models can not effectively express the uncertainty of trust relationship and deal with such issues as dishonest feedbacks and strategic frauds from malicious entities in the distributed network, an adaptive trust model based on aggregating Intuitionistic Fuzzy Information (IFI) is proposed. Firstly, in order to incentivize entities providing trustworthy service and punish entities taking along malicious behavior, an approach on aggregating IFI is constructed to compute the direct trust intuitionistic fuzzy numbers which contain the latest permanence factor and the time decay factor. Then, the recommendation credibility and uniformity are defined to detect dishonest recommendation. Subsequent, an adaptive weighted approach is developed to avoid distributing the weights of direct and indirect trust subjectively. The simulation experiments demonstrate that the proposed model not only is robust on malicious attacks, but also has better adaptability and effectiveness.
XU H M, QI S Q, LU X L, et al. A novel trust model of P2P networks based on theory of probability and statistics[J]. Journal of Electronics & Information Technology, 2011, 33(6): 1314-1318. doi: 10.3724/SP.J.1146.2010.00179.
[2]
KAMVAR S D, SCHLOSSER M T, and GARCIA-MOLINA H. The eigentrust algorithm for reputation management in P2P networks[C]. Proceedings of 12th International World Wide Web Conference, Budapest, 2003: 640-651.
[3]
TEACY W T, LUCK M, ROGERS A, et al. An efficient and versatile approach to trust and reputation using hierarchical bayesian modeling[J]. Artificial Intelligence, 2012, 193: 149-185.
ZHANG S W, LIN H F, LIU X X, et al. Trust propagation based on probability[J]. Computer Science, 2014, 41(8): 90-93.
[5]
CERUTTI F, TONIOLO A, OREN N, et al. Subjective logic operators in trust assessment: an empirical study[J]. Information Systems Frontiers, 2015, 17(4): 743-762.
TIAN J F and WU L J. Multinomial subjective logic based extended trust propagation model[J]. Journal on Communications, 2013, 34(5): 12-19.
[7]
LIU G, YANG Q, WANG H, et al. Assessment of Multi-hop interpersonal trust in social networks by three-valued subjective logic[C]. IEEE Conference on Computer Communications, Shanghai, 2014: 1698-1706.
XU X B, ZHANG G W, WANG S G, et al. Representation for uncertainty trust of WSN based on lightweight-cloud[J]. Journal on Communications, 2014, 35(2): 63-69.
[10]
YU B and SINGH M P. An evidential model of distributed reputation management[C]. Proceedings of the First International Joint Conference on Autonomous Agents and Multi-agent Systems: Part 1. Bologna, 2002: 294-301.
TIAN C Q, ZOU S H, WANG W D, et al. A new trust based on advance D-S evidence theory for P2P networks[J]. Journal of Electronics & Information Technology, 2008, 30(6): 1480-1484.
JIANG L M, ZHANG H, ZHANG K, et al. An evidential trust model with fuzzy adjustment method for open systems[J]. Journal of Electronics & Information Technology, 2011, 33(8): 1930-1936. doi: 10.3724/SP.J.1146.2011.00063.
[13]
JIANG L, XU J, ZHANG K, et al. A new evidential trust model for open distributed systems[J]. Expert Systems with Applications, 2012, 39(3): 3772-3782.
[14]
XU Z and CAI X. Intuitionistic Fuzzy Information Aggregation[M]. Springer Berlin Heidelberg, 2012: 4-16.
HAN Q Y, REN M Y, and WEN H. Topological potential based recommendation trust model for P2P communities system[J]. Journal of Electronics & Information Technology, 2015, 37(6): 1279-1284. doi: 10.11999/JEIT141303.
[17]
YUE Z. Aggregating crisp values into intuitionistic fuzzy number for group decision making[J]. Applied Mathematical Modelling, 2014, 38(11): 2969-2982.
[18]
TZENG G H and HUANG J J. Multiple Attribute Decision Making: Methods and Applications[M]. Florida: CRC Press, 2011: 342-366.
WU D P, FENG Y, WANG R Y, et al. Malicious node tolerant packet forwarding mechanism for intermittently connected wireless network[J]. Journal of Electronics & Information Technology, 2015, 37(7): 1591-1597. doi: 10.11999/JEIT141198.
[20]
The stanford P2P sociology project[OL]. http://p2p.stanford. edu/www/demos.htm, 2000.