{"title":"基于信任管理的无孔不入社交网络中的不良内容控制","authors":"Zheng Yan, R. Kantola, Gaowa Shi, Peng Zhang","doi":"10.1109/TrustCom.2013.29","DOIUrl":null,"url":null,"abstract":"MANET has a good prospect of becoming a practical platform of social networking and computing to support instant social activities and communications, now named pervasive social networking (PSN). However, at the same time as mobile users expect useful and valuable contents via PSN, they may also receive unwanted or unexpected or even malicious contents. This paper proposes an unwanted content control solution through distributed trust management. It can control unwanted contents based on trust evaluation and through traffic and behavior analysis at each MANET node. Simulation based evaluation shows that the solution is effective with regard to a number of unwanted content intrusions and system attacks raised from malicious nodes.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Unwanted Content Control via Trust Management in Pervasive Social Networking\",\"authors\":\"Zheng Yan, R. Kantola, Gaowa Shi, Peng Zhang\",\"doi\":\"10.1109/TrustCom.2013.29\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"MANET has a good prospect of becoming a practical platform of social networking and computing to support instant social activities and communications, now named pervasive social networking (PSN). However, at the same time as mobile users expect useful and valuable contents via PSN, they may also receive unwanted or unexpected or even malicious contents. This paper proposes an unwanted content control solution through distributed trust management. It can control unwanted contents based on trust evaluation and through traffic and behavior analysis at each MANET node. Simulation based evaluation shows that the solution is effective with regard to a number of unwanted content intrusions and system attacks raised from malicious nodes.\",\"PeriodicalId\":206739,\"journal\":{\"name\":\"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-07-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TrustCom.2013.29\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TrustCom.2013.29","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Unwanted Content Control via Trust Management in Pervasive Social Networking
MANET has a good prospect of becoming a practical platform of social networking and computing to support instant social activities and communications, now named pervasive social networking (PSN). However, at the same time as mobile users expect useful and valuable contents via PSN, they may also receive unwanted or unexpected or even malicious contents. This paper proposes an unwanted content control solution through distributed trust management. It can control unwanted contents based on trust evaluation and through traffic and behavior analysis at each MANET node. Simulation based evaluation shows that the solution is effective with regard to a number of unwanted content intrusions and system attacks raised from malicious nodes.