CN103812696A - Shuffled frog leaping algorithm based internet of things node reputation evaluation method - Google Patents

Shuffled frog leaping algorithm based internet of things node reputation evaluation method Download PDF

Info

Publication number
CN103812696A
CN103812696A CN201410040848.7A CN201410040848A CN103812696A CN 103812696 A CN103812696 A CN 103812696A CN 201410040848 A CN201410040848 A CN 201410040848A CN 103812696 A CN103812696 A CN 103812696A
Authority
CN
China
Prior art keywords
node
frog
nodes
group
neighbor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410040848.7A
Other languages
Chinese (zh)
Other versions
CN103812696B (en
Inventor
张明川
郑瑞娟
吴庆涛
魏汪洋
马正朝
李腾昊
汪兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan gunz Information Technology Co., Ltd
Original Assignee
Henan University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan University of Science and Technology filed Critical Henan University of Science and Technology
Priority to CN201410040848.7A priority Critical patent/CN103812696B/en
Publication of CN103812696A publication Critical patent/CN103812696A/en
Application granted granted Critical
Publication of CN103812696B publication Critical patent/CN103812696B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Disclosed is a shuffled frog leaping algorithm based internet of things node reputation evaluation method. The shuffled frog leaping algorithm based internet of things node reputation evaluation method includes analyzing local features of nodes in the internet of things, calculating importance of the nodes in internet of things autonomous domains, using the calculated node importance as a basis for node screen, using a shuffled frog leaping algorithm for clustering the nodes, selecting a kind of nodes with higher importance as neighbor nodes of reputation evaluation, using the neighbor nodes to perform reputation evaluation on nodes to be evaluated according to a reputation evaluation algorithm, calculating a more accurate node reputation value according to current reputation and history reputation of the nodes, setting a threshold value, comparing the node reputation value with the threshold value to judge whether the nodes are credible, judging the nodes are incredible nodes when the reputation value is lower than the set threshold hold, and otherwise, judging the nodes are credible nodes. According to the shuffled frog leaping algorithm based internet of things node reputation evaluation method, the problem that incredible nodes interfere evaluation results in traditional reputation evaluation systems can be effectively avoided.

Description

A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm
Technical field
The present invention relates to communication technical field, relate to specifically a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm.
Background technology
At present, mainly concentrate on credible management and credible evaluation two aspects for the credibility research of distributed system, the essence of credible management is the access control model based on authentication and authorization and method in.Method for evaluating trust is that to close with the recommendation trust of inter-entity be basis, in conjunction with self experience, entity confidence level is made to evaluation, then carries out decision-making according to confidence level.Classical Prestige Management technology asks prestige mean value scheme, Bayesian network and cluster to filter.Between node, between territory, break the wall of mistrust very importantly, in general, the information that level of trust can generate corresponding event by the behavior of neighbor node and they be assessed.But node is very easily under attack, and then provide feedback insecure or malice, affect real node credit value.
Existing methodical defect has:
1, credit rating assessment lacks indirect prestige recommendation
Common credit rating assessment need to be considered the factor of subjective and objective two aspects, and the direct credit worthiness of the evaluation of user's credibility not only being obtained by this locality as resource determines, also should consider to calculate the indirect prestige recommendation (reputation) that Agency obtains; Determined by the user who uses this node and the evaluation of the node degree of reliability is not single yet, need to consider that equally the user in other self-control territories recommends the prestige of this node.Consider the subjective objective factor in prestige and the credit assessment process of user, node.
2, the interference of unreliable node to credit assessment
The high isomery and the height that have due to Internet of Things self mix feature, and the node in Autonomous Domain is probably subjected to illegal invasion and attacks, thereby does the degrees of comparison evaluation making mistake, and final assessment result is disturbed to the accuracy of impact evaluation result.
Summary of the invention
The present invention is directed to the insincere node that may occur in traditional credit standing evaluation system and assessment result is produced to the problem of disturbing, propose a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm.
The technical solution adopted in the present invention is: a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm, and described method comprises the following steps:
The Local Features of node in step 1, analyte networking, the importance of the node in calculating Internet of Things Autonomous Domain;
The foundation of step 2, the screening using the node importance after calculating as node, utilizes shuffled frog leaping algorithm to carry out cluster to node;
The higher category node of the node importance that obtains in step 3, selecting step 2 is as the neighbor node of credit assessment;
Step 4, according to credit assessment algorithm, use the neighbor node that obtains of step 3 to carry out credit assessment to the node of needs assessment;
Step 5, calculate node credit value more accurately according to the current prestige of node and historical prestige;
Whether credible step 6, setting threshold, compare predicate node by the node credit value obtaining in step 5 and this threshold value; When credit value is during lower than setting threshold, predicate node is insincere node, and no person is trusted node.
The computational methods of the node importance in described step 1 comprise the following steps:
Step 201, net list is shown to two tuple YK, EY, node set is expressed as
Figure 996031DEST_PATH_IMAGE001
, the set expression on the limit of connected node is
Figure 2014100408487100002DEST_PATH_IMAGE002
, wherein, n and m represent nodes and the limit number of network, the more important node in limit of connected node is just more important;
Step 202, utilize formula
Figure 197205DEST_PATH_IMAGE003
calculate the weight on limit, wherein
Figure 2014100408487100002DEST_PATH_IMAGE004
represent the limit number being connected with node i;
Step 203, the weights on limit that node i connects are sued for peace
Figure 515054DEST_PATH_IMAGE005
represent the weight of node i;
Step 204, utilize formula
Figure 2014100408487100002DEST_PATH_IMAGE006
the importance of computing node i
Figure 843399DEST_PATH_IMAGE007
, wherein
Figure 2014100408487100002DEST_PATH_IMAGE008
.
The hybrid algorithm that leapfrogs in described step 2 comprises the following steps:
Step 301, take node importance as screening foundation, utilize shuffled frog leaping algorithm to screen neighbor node, each frog individuality
Figure 890989DEST_PATH_IMAGE009
can represent the importance of a node
Figure 2014100408487100002DEST_PATH_IMAGE010
and utilize formula calculate the fitness of frog;
The frog colony of step 302, a random initializtion P frog composition
Figure 818942DEST_PATH_IMAGE009
, i=1,2 ... P;
Step 303, carry out descending according to the fitness of every the frog calculating, the frog individuality of functional value optimum is made as ;
Step 304, whole frog colony is divided into F group, each group comprises G frog, therefore , first frog enters the 1st group, and second frog enters the 2nd group, and F frog enters F group, and F+1 frog enters again the 1st group afterwards, and F+2 frog enters the 2nd group, by that analogy, until all frog is divided complete;
Step 305, group carry out partial-depth search to each group after dividing, and has individuality optimum and the poorest fitness to be in each group
Figure 2014100408487100002DEST_PATH_IMAGE014
with
Figure 584565DEST_PATH_IMAGE015
, iteration is for the poorest fitness each time
Figure 65225DEST_PATH_IMAGE015
carry out, update strategy is: frog displacement
Figure 2014100408487100002DEST_PATH_IMAGE016
, upgrade the poorest frog position (
Figure DEST_PATH_IMAGE018
) wherein,
Figure 277081DEST_PATH_IMAGE019
be
Figure DEST_PATH_IMAGE020
between random number,
Figure 236946DEST_PATH_IMAGE021
be the ultimate range that allows frog to move, by above formula, group's the poorest frog individuality of endoadaptation degree upgraded, each group carries out the Local Search number of times of setting;
Step 306, the group that will search for through partial-depth merge a new group of composition, and judge whether to meet the end condition of algorithm, complete the reliable neighbor node of screening.
Credit assessment in described step 4 specifically comprises the following steps:
According to the node obtaining after screening, using them as neighbor node, at T pin cycle, have multiple neighbor nodes and observe evaluated node, each node has and safeguards the neighbor node list of self, in list, comprise the information such as No. ID, neighbor node and credit value, in the time that node i sends packet to node n, need intermediate node j to forward, node calculates node point reliability by existing monitoring condition
Figure DEST_PATH_IMAGE022
,
Figure 701557DEST_PATH_IMAGE023
computing formula as follows:
Figure DEST_PATH_IMAGE024
, wherein
Figure 543611DEST_PATH_IMAGE025
represent the quantity of node i requesting node j forwarding data bag; represent that j is the quantity of i forwarding data bag, in the cycle in, the more reliabilitys of packet that j forwards are higher.
Provide too high right to speak for fear of the high node of credit value, cause subjective deviation, introduce overall prestige R as parameter, be used for reducing risk, reduce the concrete formula of subjective deviation as follows:
Figure DEST_PATH_IMAGE028
Wherein, i is the neighbor node of N, S nthe set of the neighbor node of N,
Figure 566242DEST_PATH_IMAGE029
be to provide the credit value of monitoring node, T is reliability threshold value, can be considered to bad node, the parameter of introducing lower than the nodes ' behavior of threshold value , wherein
Figure 451021DEST_PATH_IMAGE031
for adjustment function,
Figure DEST_PATH_IMAGE032
, M ikifor the total transaction amount of node i,
Figure 531104DEST_PATH_IMAGE033
to expect with respect to the local prestige of its neighbor node according to node i, and
Figure DEST_PATH_IMAGE034
.
Beneficial effect of the present invention: the present invention filters the node in network before node is carried out to credit assessment, filtration show that node importance is higher as neighbours, avoid preferably the interference of unreliable neighbours to credit assessment result, improved the accuracy of credit assessment; The present invention utilizes shuffled frog leaping algorithm, local and the overall situation is searched for, and then node is screened, and has convergence and stronger robustness faster.
Accompanying drawing explanation
Fig. 1 is structured flowchart of the present invention.
Embodiment
As shown in the figure, a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm, described method comprises the following steps:
The Local Features of node in step 1, analyte networking, the importance of the node in calculating Internet of Things Autonomous Domain;
The foundation of step 2, the screening using the node importance after calculating as node, utilizes shuffled frog leaping algorithm to carry out cluster to node;
The higher category node of the node importance that obtains in step 3, selecting step 2 is as the neighbor node of credit assessment;
Step 4, according to credit assessment algorithm, use the neighbor node that obtains of step 3 to carry out credit assessment to the node of needs assessment;
Step 5, calculate node credit value more accurately according to the current prestige of node and historical prestige;
Whether credible step 6, setting threshold, compare predicate node by the node credit value obtaining in step 5 and this threshold value; When credit value is during lower than setting threshold, predicate node is insincere node, and no person is trusted node.
The computational methods of the node importance in described step 1 comprise the following steps:
Step 201, net list is shown to two tuple YK, EY, node set is expressed as
Figure 792321DEST_PATH_IMAGE001
, the set expression on the limit of connected node is
Figure 461199DEST_PATH_IMAGE002
, wherein, n and m represent nodes and the limit number of network, the more important node in limit of connected node is just more important;
Step 202, utilize formula
Figure 454563DEST_PATH_IMAGE003
calculate the weight on limit, wherein
Figure 42450DEST_PATH_IMAGE004
represent the limit number being connected with node i;
Step 203, the weights on limit that node i connects are sued for peace
Figure 45041DEST_PATH_IMAGE005
represent the weight of node i;
Step 204, utilize formula
Figure 568426DEST_PATH_IMAGE006
the importance of computing node i , wherein
Figure 36634DEST_PATH_IMAGE008
.
The hybrid algorithm that leapfrogs in described step 2 comprises the following steps:
Step 301, take node importance as screening foundation, utilize shuffled frog leaping algorithm to screen neighbor node, each frog individuality
Figure 577336DEST_PATH_IMAGE009
can represent the importance of a node and utilize formula calculate the fitness of frog;
The frog colony of step 302, a random initializtion P frog composition
Figure 832365DEST_PATH_IMAGE009
, i=1,2 ... P;
Step 303, carry out descending according to the fitness of every the frog calculating, the frog individuality of functional value optimum is made as
Figure 239076DEST_PATH_IMAGE012
;
Step 304, whole frog colony is divided into F group, each group comprises G frog, therefore
Figure 471474DEST_PATH_IMAGE013
, first frog enters the 1st group, and second frog enters the 2nd group, and F frog enters F group, and F+1 frog enters again the 1st group afterwards, and F+2 frog enters the 2nd group, by that analogy, until all frog is divided complete;
Step 305, group carry out partial-depth search to each group after dividing, and has individuality optimum and the poorest fitness to be in each group
Figure 243121DEST_PATH_IMAGE014
with
Figure 6809DEST_PATH_IMAGE015
, iteration is for the poorest fitness each time
Figure 889314DEST_PATH_IMAGE015
carry out, update strategy is: frog displacement
Figure 241798DEST_PATH_IMAGE016
, upgrade the poorest frog position
Figure 246663DEST_PATH_IMAGE017
( ) wherein,
Figure 370794DEST_PATH_IMAGE019
be between random number, be the ultimate range that allows frog to move, by above formula, group's the poorest frog individuality of endoadaptation degree upgraded, each group carries out the Local Search number of times of setting;
Step 306, the group that will search for through partial-depth merge a new group of composition, and judge whether to meet the end condition of algorithm, complete the reliable neighbor node of screening.
Credit assessment in described step 4 specifically comprises the following steps:
According to the node obtaining after screening, using them as neighbor node, at T pin cycle, have multiple neighbor nodes and observe evaluated node, each node has and safeguards the neighbor node list of self, in list, comprise the information such as No. ID, neighbor node and credit value, in the time that node i sends packet to node n, need intermediate node j to forward, node calculates node point reliability by existing monitoring condition ,
Figure 653822DEST_PATH_IMAGE023
computing formula as follows:
Figure 43215DEST_PATH_IMAGE024
, wherein
Figure 872106DEST_PATH_IMAGE025
represent the quantity of node i requesting node j forwarding data bag;
Figure 284633DEST_PATH_IMAGE026
represent that j is the quantity of i forwarding data bag, in the cycle
Figure 312632DEST_PATH_IMAGE027
in, the more reliabilitys of packet that j forwards are higher.
?provide too high right to speak for fear of the high node of credit value, cause subjective deviation, introduce overall prestige R as parameter, be used for reducing risk, reduce the concrete formula of subjective deviation as follows:
Figure 494214DEST_PATH_IMAGE028
Wherein, i is the neighbor node of N, S nthe set of the neighbor node of N,
Figure 11783DEST_PATH_IMAGE029
be to provide the credit value of monitoring node, T is reliability threshold value, can be considered to bad node, the parameter of introducing lower than the nodes ' behavior of threshold value , wherein for adjustment function,
Figure 326855DEST_PATH_IMAGE032
, M ikifor the total transaction amount of node i,
Figure 953009DEST_PATH_IMAGE033
to expect with respect to the local prestige of its neighbor node according to node i, and
Figure 136865DEST_PATH_IMAGE034
.
Participate in that the neighbor node number of credit rating is more and volume of transmitted data is larger, the expectation of overall prestige is just more accurate.
Node in Internet of Things is because have the feature of mobility, and relatively inexpensive.If be identified as the unreliable node of passive forwarding data bag just seems and is unfair because of accidental cause.Therefore we also need historical credit value to take into account in the time calculating current credit value, form new credit value.Concrete formula is as follows:
Figure 2014100408487100002DEST_PATH_IMAGE001
therefore,, according to different Autonomous Domain environment, we can be by regulating the α factor to weigh the proportion of historical credit value to present node prestige.
The present invention filters the node in network before node is carried out to credit assessment, filters and show that node importance is higher as neighbours, has avoided preferably the interference of unreliable neighbours to credit assessment result, has improved the accuracy of credit assessment; The present invention utilizes shuffled frog leaping algorithm, local and the overall situation is searched for, and then node is screened, and has convergence and stronger robustness faster.

Claims (5)

1. the Internet of things node credit assessment method based on shuffled frog leaping algorithm, is characterized in that: described method comprises the following steps:
The Local Features of node in step 1, analyte networking, the importance of the node in calculating Internet of Things Autonomous Domain;
The foundation of step 2, the screening using the node importance after calculating as node, utilizes shuffled frog leaping algorithm to carry out cluster to node;
The higher category node of the node importance that obtains in step 3, selecting step 2 is as the neighbor node of credit assessment;
Step 4, according to credit assessment algorithm, use the neighbor node that obtains of step 3 to carry out credit assessment to the node of needs assessment;
Step 5, calculate node credit value more accurately according to the current prestige of node and historical prestige;
Whether credible step 6, setting threshold, compare predicate node by the node credit value obtaining in step 5 and this threshold value; When credit value is during lower than setting threshold, predicate node is insincere node, and no person is trusted node.
2. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 1, is characterized in that: the computational methods of the node importance in described step 1 comprise the following steps:
Step 201, net list is shown to two tuple YK, EY, node set is expressed as
Figure 832947DEST_PATH_IMAGE001
, the set expression on the limit of connected node is
Figure 441783DEST_PATH_IMAGE002
, wherein, n and m represent nodes and the limit number of network, the more important node in limit of connected node is just more important;
Step 202, utilize formula
Figure 615275DEST_PATH_IMAGE003
calculate the weight on limit, wherein
Figure 311443DEST_PATH_IMAGE004
represent the limit number being connected with node i;
Step 203, the weights on limit that node i connects are sued for peace
Figure 279399DEST_PATH_IMAGE005
represent the weight of node i;
Step 204, utilize formula
Figure 375531DEST_PATH_IMAGE006
the importance of computing node i
Figure 87135DEST_PATH_IMAGE007
, wherein
Figure 952322DEST_PATH_IMAGE008
.
3. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 1, is characterized in that: the hybrid algorithm that leapfrogs in described step 2 comprises the following steps:
Step 301, take node importance as screening foundation, utilize shuffled frog leaping algorithm to screen neighbor node, each frog individuality
Figure DEST_PATH_IMAGE009
can represent the importance of a node
Figure 28863DEST_PATH_IMAGE010
and utilize formula
Figure DEST_PATH_IMAGE011
calculate the fitness of frog;
The frog colony of step 302, a random initializtion P frog composition
Figure 612291DEST_PATH_IMAGE009
, i=1,2 ... P;
Step 303, carry out descending according to the fitness of every the frog calculating, the frog individuality of functional value optimum is made as
Figure 48957DEST_PATH_IMAGE012
;
Step 304, whole frog colony is divided into F group, each group comprises G frog, therefore
Figure 34231DEST_PATH_IMAGE013
, first frog enters the 1st group, and second frog enters the 2nd group, and F frog enters F group, and F+1 frog enters again the 1st group afterwards, and F+2 frog enters the 2nd group, by that analogy, until all frog is divided complete;
Step 305, group carry out partial-depth search to each group after dividing, and has individuality optimum and the poorest fitness to be in each group
Figure 343989DEST_PATH_IMAGE014
with
Figure DEST_PATH_IMAGE015
, iteration is for the poorest fitness each time
Figure 414714DEST_PATH_IMAGE015
carry out, update strategy is: frog displacement
Figure 405803DEST_PATH_IMAGE016
, upgrade the poorest frog position (
Figure 245583DEST_PATH_IMAGE018
) wherein, be
Figure 414659DEST_PATH_IMAGE020
between random number, be the ultimate range that allows frog to move, by above formula, group's the poorest frog individuality of endoadaptation degree upgraded, each group carries out the Local Search number of times of setting;
Step 306, the group that will search for through partial-depth merge a new group of composition, and judge whether to meet the end condition of algorithm, complete the reliable neighbor node of screening.
4. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 1, is characterized in that: the credit assessment in described step 4 specifically comprises the following steps:
According to the node obtaining after screening, using them as neighbor node, at T pin cycle, have multiple neighbor nodes and observe evaluated node, each node has and safeguards the neighbor node list of self, in list, comprise the information such as No. ID, neighbor node and credit value, in the time that node i sends packet to node n, need intermediate node j to forward, node calculates node point reliability by existing monitoring condition
Figure 707100DEST_PATH_IMAGE022
,
Figure DEST_PATH_IMAGE023
computing formula as follows:
Figure 564198DEST_PATH_IMAGE024
, wherein
Figure DEST_PATH_IMAGE025
represent the quantity of node i requesting node j forwarding data bag; represent that j is the quantity of i forwarding data bag, in the cycle
Figure DEST_PATH_IMAGE027
in, the more reliabilitys of packet that j forwards are higher.
5. a kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm as claimed in claim 4, it is characterized in that: provide too high right to speak for fear of the high node of credit value, cause subjective deviation, introduce overall prestige R as parameter, be used for reducing risk, reduce the concrete formula of subjective deviation as follows:
Figure 847728DEST_PATH_IMAGE028
Wherein, i is the neighbor node of N, S nthe set of the neighbor node of N,
Figure DEST_PATH_IMAGE029
be to provide the credit value of monitoring node, T is reliability threshold value, can be considered to bad node, the parameter of introducing lower than the nodes ' behavior of threshold value
Figure 79995DEST_PATH_IMAGE030
, wherein for adjustment function,
Figure 475205DEST_PATH_IMAGE032
, M ikifor the total transaction amount of node i,
Figure DEST_PATH_IMAGE033
to expect with respect to the local prestige of its neighbor node according to node i, and
Figure 961681DEST_PATH_IMAGE034
.
CN201410040848.7A 2014-01-28 2014-01-28 A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm Active CN103812696B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410040848.7A CN103812696B (en) 2014-01-28 2014-01-28 A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410040848.7A CN103812696B (en) 2014-01-28 2014-01-28 A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm

Publications (2)

Publication Number Publication Date
CN103812696A true CN103812696A (en) 2014-05-21
CN103812696B CN103812696B (en) 2017-07-28

Family

ID=50708938

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410040848.7A Active CN103812696B (en) 2014-01-28 2014-01-28 A kind of Internet of things node credit assessment method based on shuffled frog leaping algorithm

Country Status (1)

Country Link
CN (1) CN103812696B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104467999A (en) * 2014-11-18 2015-03-25 北京邮电大学 Spectrum sensing algorithm based on quantum leapfrog
US10785125B2 (en) 2018-12-03 2020-09-22 At&T Intellectual Property I, L.P. Method and procedure for generating reputation scores for IoT devices based on distributed analysis
CN112185419A (en) * 2020-09-30 2021-01-05 天津大学 Glass bottle crack detection method based on machine learning
CN116862021A (en) * 2023-07-31 2023-10-10 山东省计算中心(国家超级计算济南中心) anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation
CN116862021B (en) * 2023-07-31 2024-05-03 山东省计算中心(国家超级计算济南中心) Anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060042483A1 (en) * 2004-09-02 2006-03-02 Work James D Method and system for reputation evaluation of online users in a social networking scheme
CN102223627A (en) * 2011-06-17 2011-10-19 北京工业大学 Beacon node reputation-based wireless sensor network safety locating method
CN102378217A (en) * 2011-11-01 2012-03-14 北京工业大学 Beacon node credit assessment method in localization in wireless sensor networks

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060042483A1 (en) * 2004-09-02 2006-03-02 Work James D Method and system for reputation evaluation of online users in a social networking scheme
CN102223627A (en) * 2011-06-17 2011-10-19 北京工业大学 Beacon node reputation-based wireless sensor network safety locating method
CN102378217A (en) * 2011-11-01 2012-03-14 北京工业大学 Beacon node credit assessment method in localization in wireless sensor networks

Non-Patent Citations (10)

* Cited by examiner, † Cited by third party
Title
吴庆涛,张旭龙,张明川,郑瑞娟,娄颖: "一种面向云服务的自主信誉管理机制", 《武汉大学学报(理学版)》 *
吴庆涛,郑瑞娟,华彬,杨馨桐: "可信网络连接中的可信度仿真评估", 《计算机应用研究》 *
吴庆涛,郑瑞娟,张明川,魏汪洋,李冠峰: "基于自律计算的系统可信性自调节模型", 《计算机工程与应用》 *
孔凡光,何建华,唐奎: "协同多目标攻击的混合蛙跳融合蚁群算法研究", 《计算机工程与应用》 *
崔文华,刘晓冰,王伟,王介生: "混合蛙跳算法研究综述", 《控制与决策》 *
朱丽娜,吴庆涛,娄颖,郑瑞娟: "基于自律计算的系统服务可信性自优化方法", 《微电子学与计算机》 *
葛宇, 王学平, 梁静: "自适应混沌变异蛙跳算法", 《计算机应用研究》 *
赖积保,王慧强,刘效武,梁颖,郑瑞娟,赵国生: "WNN-Based Network Security Situation Quantitive Prediction Method and Its Optimization", 《COMPUTER SCIENCE AND TECHNOLOGY》 *
邹采荣,张潇丹,赵力: "混合蛙跳算法综述", 《信息化研究》 *
郑瑞娟,张明川,吴庆涛,李冠峰,魏汪洋: "基于信赖域的系统可信性自调节算法", 《河南科技大学学报:自然科学版》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104467999A (en) * 2014-11-18 2015-03-25 北京邮电大学 Spectrum sensing algorithm based on quantum leapfrog
US10785125B2 (en) 2018-12-03 2020-09-22 At&T Intellectual Property I, L.P. Method and procedure for generating reputation scores for IoT devices based on distributed analysis
CN112185419A (en) * 2020-09-30 2021-01-05 天津大学 Glass bottle crack detection method based on machine learning
CN116862021A (en) * 2023-07-31 2023-10-10 山东省计算中心(国家超级计算济南中心) anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation
CN116862021B (en) * 2023-07-31 2024-05-03 山东省计算中心(国家超级计算济南中心) Anti-Bayesian-busy attack decentralization learning method and system based on reputation evaluation

Also Published As

Publication number Publication date
CN103812696B (en) 2017-07-28

Similar Documents

Publication Publication Date Title
Kang et al. Reliable federated learning for mobile networks
CN105282160B (en) Dynamic accesses control method based on prestige
CN104009959B (en) A kind of cloud access control method that can verify that based on XACML
Chen et al. An adaptive trust model based on recommendation filtering algorithm for the Internet of Things systems
CN103414711B (en) Internet group abnormality perception method based on trust
Chen et al. Dealing with dishonest recommendation: The trials in reputation management court
CN104618908B (en) The method and apparatus that distributed cognition wireless network is attacked anti-distort perception data
Jiang et al. A new evidential trust model for open distributed systems
CN108270723A (en) A kind of acquisition methods in electric power networks Forecast attack path
Stefanova et al. Off-policy q-learning technique for intrusion response in network security
CN103812696A (en) Shuffled frog leaping algorithm based internet of things node reputation evaluation method
CN115378988A (en) Data access abnormity detection and control method and device based on knowledge graph
WO2022242181A1 (en) Method and apparatus for evaluating health degree indexes of layers of smart substation
Suryani et al. ConTrust: a trust model to enhance the privacy in internet of things
Huang et al. Using reputation measurement to defend mobile social networks against malicious feedback ratings
CN105049354A (en) Trustful routing method based on OSPF
Malladi et al. Decentralized aggregation design and study of federated learning
CN109474461A (en) Wireless sensor network trust management method and system based on prestige Poisson distribution
CN108966210A (en) A kind of design method of wireless network Trust Valuation Model
CN106332131B (en) A kind of clone's nodal test method and system of wireless sensor network
Dubey et al. Bayesian network based trust model with time window for pure P2P computing systems
CN106469346B (en) A kind of risk control method and equipment based on region
Seo et al. IoDM: A study on a IoT-based organizational deception modeling with adaptive general-sum game competition
Li et al. A hybrid trust management framework for wireless sensor and actuator networks in cyber-physical systems
Lin et al. ACO-BTM: a behavior trust model in cloud computing environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20191104

Address after: 471000 Room 202, building 3-1, science and Technology Park, Luoyang National University, Longyu Road, Jianxi District, Luoyang area, China (Henan) pilot Free Trade Zone, Luoyang City, Henan Province

Patentee after: Henan gunz Information Technology Co., Ltd

Address before: 471000 Xiyuan Road, Jianxi District, Henan, No. 48, No.

Patentee before: Henan University of Science and Technology

TR01 Transfer of patent right