Autosoft Journal

Online Manuscript Access

Dynamic trust evaluation in open networks



Trust has been widely used as an effective means of dealing with security issues in open networks. By taking into consideration of the requirement on dynamic adaptability and incorporating the factors of insufficient conglomerate and incentive mechanisms in trust evaluation, we propose in this paper a dynamic trust evaluation model based on multiple factors that is suitable for open networks. In the proposed model, trust evaluation takes into consideration of direct trust that includes historical information to improve accuracy and recommendation trust that includes a bonus-penalty factor and the reliability of evaluation to improve reliability and efficiency. The calculation of integrated trust relies on solving the problem of determining the weights between direct trust and recommendation trust, resulting in a balanced weight factor being introduced into trust evaluation. In the interactions between network entities, the balanced weight factor changes dynamically as the interactions continue between the entities to make trust evaluation dynamically adaptable. Experimental results show that the proposed method can resist attacks from hostile entities, lower the influence of inaccurate or false recommendations from hostile entities and improve the accuracy of trust evaluation.



Total Pages: 8
Pages: 631-638


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways

Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Volume: 22
Issue: 4
Year: 2016

Cite this document


Al-Oufi, Samah, Heung-Nam Kim, and Abdulmotaleb El Saddik. "A Group Trust Metric for Identifying People of Trust in Online Social Networks." Expert Systems with Applications 39.18 (2012): 13173-13181. Crossref. Web.

Berket, K., A. Essiari, and A. Muratas. "PKI-Based Security for Peer-to-Peer Information Sharing." Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings. n. pag. Crossref. Web.

Blaze, M., J. Feigenbaum, and J. Lacy. "Decentralized Trust Management." Proceedings 1996 IEEE Symposium on Security and Privacy n. pag. Crossref. Web.

Blaze M. Proceedings of the 6th International Workshop on Security Protocols

Chen, Hongsong, and Fu Zhongchuan. "A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks." Intelligent Automation & Soft Computing 17.8 (2011): 1063-1074. Crossref. Web.

Gao, Feng, Jingsha He, and Shunan Ma. "Modelling the Relationship Between Trust and Privacy in Network Environments." International Journal of Computational Science and Engineering 9.4 (2014): 347. Crossref. Web.

Han, Guangjie et al. "Management and Applications of Trust in Wireless Sensor Networks: A Survey." Journal of Computer and System Sciences 80.3 (2014): 602-617. Crossref. Web.

Huang, Longtao et al. "A Trust Evaluation Mechanism for Collaboration of Data-Intensive Services in Cloud." Applied Mathematics & Information Sciences 7.1L (2013): 121-129. Crossref. Web.

Iltaf, Naima, Abdul Ghafoor, and Uzman Zia. "A Mechanism for Detecting Dishonest Recommendation in Indirect Trust Computation." EURASIP Journal on Wireless Communications and Networking 2013.1 (2013): n. pag. Crossref. Web.

Jiang, Wenjun, and Guojun Wang. "SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks." 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (2011): n. pag. Crossref. Web.

Josang, Audun, and Jochen Haller. "Dirichlet Reputation Systems." The Second International Conference on Availability, Reliability and Security (ARES”07) (2007): n. pag. Crossref. Web.

Kamvar, Sepandar D., Mario T. Schlosser, and Hector Garcia-Molina. "The Eigentrust Algorithm for Reputation Management in P2P Networks." Proceedings of the twelfth international conference on World Wide Web - WWW ”03 (2003): n. pag. Crossref. Web.

Kim, Woongsup. "A Trustworthy Service Computing Framework through a Semantic Messaging Model." Applied Mathematics & Information Sciences 7.2L (2013): 729-739. Crossref. Web.

Kim, Young Ae, and Rasik Phalak. "A Trust Prediction Framework in Rating-Based Experience Sharing Social Networks Without a Web of Trust." Information Sciences 191 (2012): 128-145. Crossref. Web.

Li Q. Chinese Journal of Computers

Ma S.N. Research of trust based access control models and methods in network environments

Ma, Shunan, Jingsha He, and Xunbo Shuai. "An Access Control Method Based on Scenario Trust." International Journal of Computational Intelligence Systems 5.5 (2012): 942-952. Crossref. Web.

Mármol, Félix Gómez, Gregorio Martínez Pírez, and Javier G Marín-Blázquez. "Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm." Intelligent Automation & Soft Computing 17.1 (2011): 41-59. Crossref. Web.

Sabater, Jordi, and Carles Sierra. "REGRET." Proceedings of the fifth international conference on Autonomous agents - AGENTS ”01 (2001): n. pag. Crossref. Web.

Wang, Guojun, and Jie Wu. "Multi-Dimensional Evidence-Based Trust Management with Multi-Trusted Paths." Future Generation Computer Systems 27.5 (2011): 529-538. Crossref. Web.

Wang, Yu, Yue-long Zhao, and Fang Hou. "A New Security Trust Model for Peer-to-Peer E-Commerce." 2008 International Conference on Management of e-Commerce and e-Government (2008): n. pag. Crossref. Web.

Wang J.P. Journal of Tsinghua University (Science & Technology)

Wang J.P. Journal of Computational Information Systems

Watanabe, Kenichi, Tomoya Enokido, and Makoto Takizawa. "Trustworthiness of Acquaintances in Peer-to-Peer Overlay Networks." International Journal of High Performance Computing and Networking 6.2 (2009): 160. Crossref. Web.

Li Xiong, and Ling Liu. "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities." IEEE Transactions on Knowledge and Data Engineering 16.07 (2004): 843-857. Crossref. Web.

Zhou, Yizheng et al. "Software-Based Failure Detection and Recovery in Programmable Network Interfaces." IEEE Transactions on Parallel and Distributed Systems 18.11 (2007): 1539-1550. Crossref. Web.

Zhang, Yu et al. "Building Trust in Electronic Communities by Mining Web Content." International Journal of Computational Science and Engineering 5.1 (2010): 58. Crossref. Web.


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048