{"title":"普适计算中的概率信任管理","authors":"M. Denko, Tao Sun","doi":"10.1109/EUC.2008.149","DOIUrl":null,"url":null,"abstract":"In this paper, we propose a probabilistic trust management approach for pervasive computing environment. The approach considers trust value as a probability that a device provides satisfactory interactions with its neighbors. A distributed trust management using recommendation was constructed. An iterative filtering method is employed to eliminate the effect of false recommendations while the weighting method is employed to capture the effect of time on the current behavior of devices. We have carried out performance evaluations using simulation experiments. The comparison made with a deterministic trust management scheme demonstrated that the probabilistic trust management approach performs better, than the deterministic approach while also ensuring the security of interactions, and quickly adapting to changes in the environment.","PeriodicalId":430277,"journal":{"name":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"44","resultStr":"{\"title\":\"Probabilistic Trust Management in Pervasive Computing\",\"authors\":\"M. Denko, Tao Sun\",\"doi\":\"10.1109/EUC.2008.149\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we propose a probabilistic trust management approach for pervasive computing environment. The approach considers trust value as a probability that a device provides satisfactory interactions with its neighbors. A distributed trust management using recommendation was constructed. An iterative filtering method is employed to eliminate the effect of false recommendations while the weighting method is employed to capture the effect of time on the current behavior of devices. We have carried out performance evaluations using simulation experiments. The comparison made with a deterministic trust management scheme demonstrated that the probabilistic trust management approach performs better, than the deterministic approach while also ensuring the security of interactions, and quickly adapting to changes in the environment.\",\"PeriodicalId\":430277,\"journal\":{\"name\":\"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing\",\"volume\":\"37 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-12-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"44\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EUC.2008.149\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EUC.2008.149","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Probabilistic Trust Management in Pervasive Computing
In this paper, we propose a probabilistic trust management approach for pervasive computing environment. The approach considers trust value as a probability that a device provides satisfactory interactions with its neighbors. A distributed trust management using recommendation was constructed. An iterative filtering method is employed to eliminate the effect of false recommendations while the weighting method is employed to capture the effect of time on the current behavior of devices. We have carried out performance evaluations using simulation experiments. The comparison made with a deterministic trust management scheme demonstrated that the probabilistic trust management approach performs better, than the deterministic approach while also ensuring the security of interactions, and quickly adapting to changes in the environment.