|Table of Contents|

Trust mechanism of mobile social network


Research Field:
Publishing date:


Trust mechanism of mobile social network
Zhang LinZhang JinLi Xinyu
College of Computer,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
mobile social networks trusted computing pervasive computing trust mechanism network security mutual feedback trust module service nodes user nodes malicious nodes
In order to improve the reliability of the trust evaluation in mobile social network,the trust mechanism is conducted and a new mechanism of mutual feedback trust module(MFTM)is presented in mobile social network.The mechanism divides the trust object into two parts:service nodes and user nodes.Trust value of the service nodes is computed by refurbishing cumulative trust weight and evaluating trust weight.As for the user node,the user trust conversion rate is used to make objective feedback and to evaluate its credibility.The active degree is also given to keep users active in a social network.Simulation results show that the MFTM mechanism can provide stable and accurate trust accumulation and can make the effective punishment to malicious nodes.


[1] Yaich R,Boissier O,Jaillon P,et al.An adaptive and socially-compliant trust management system for virtual communities[A].Proceedings of the 27th Annual ACM Symposium on Applied Computing[C].Trento,Italy:ACM,2012:2022-2028.
[2]Moghaddam S,Jamali M,Ester M,et al.Feedback-trust:using feedback effects in trust-based recommendation systems[A].Proceedings of The Third ACM Conference on Recommender Systems[C].New York,USA:ACM,2009:269-272.
[3]Ahamed S I,Sharmin M.A trust-based secure service discovery(TSSD)model for pervasive computing[J].Computer Communications,2008,31(18):4281-4293.
[4]Ma S,He J,Gao F,et al.A trust quantification method based on grey fuzzy theory[A].Proceedings of the 3rd International Conference on Security of Information and Networks[C].Taganrog Russian:ACM,2010:27-31.
Wang Jiangtao,Chen Zhigang,Deng Xiaoheng.Context-aware and self-adaptive trust model for pervasive computting[J].Journal on Communications,2012,33(11):42-48.
[6]Chung Weihang,Singh M P.Trustworthy service selection and composition[J].ACM Transactions on Autonomous and Adaptive Systems(TAAS),2011,1(6):1-17.
[7]Tsesmetzis D,Roussaki I,Sykas E.Qos-aware service evaluation and selection[J].European Journal of Operational Research,2008,191(3):1101-1112.
Qiao Xiuquan,Yang Chun,Li Xiaofeng,et al.A trust calculating algorithm based on social networking service users context[J].Chinese Journal of Com puters,2011,34(12):2403-2413.
Wang Yuxiang,Qiao Xiuquan Li Xiaofeng,et al.Research on context-awareness mobile SNS service selection mechanism[J].Chinese Journal of Computers,2010,33(11):2126-2135.
Cao Huaihu,Zhu Jianming,Pan Yun,et al.Context-aware P2P mobile social network structure and discovery algorithm[J].Chinese Journal of Computers,2012,35(6):1224-1234.
Zhu Xuetong,Wang Yongli.Automatic identification and sharing of user's context in mobile social network[J].Journal of Nanjing University of Science and Technology,2013,37(4):500-505.
Gu Junzhong.Context awareness computing[J].Journal of East China Normal University(Natural Science),2009(5):1-20.
Li Yongjun,Dai Yafei.Research on trust mechanism for peer-to-peer network[J].Chinese Journal of Computers,2010.33(3):390-405.
Zuo Bin,Gao Qian.The effects of familiarity and similarity on the interpersonal attraction[J].Chinese Journal of Clinical Psychology,2008,16(6):634-636.


Last Update: 2015-02-28