Fuzzy Amendments of Trust Model with Intrusion Tolerance

Article Preview

Abstract:

When the topology of data network in power grid was destroy, the system still need to provide intrusion tolerance service. The trust values relationship of the nodes in data network need be calculated. The trust value of the upper and lower limit can be deduced and adjusted to eliminate the problem of over-reliance on threshold. And the introduction of confidence values to assess the quality of the trust value. A recursive algorithm is used to obtain the average of the trust data to compute confidence values. The experimental result proves the veracity and validity of the method.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2753-2756

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Lin Huaqing, Wu Xuezhi, and Lin Hai-tao. Hierarchical fuzzy trust management for peer-to-peer network[C]. Proc of CCCM2009, Sanya. August 2009: 377-380.

Google Scholar

[2] Dong Y, Yin G, Teng X. A dynamic trust measurement based on characteristics of evaluation indexes[C]∥Proceedings of the Fifth International Conference on Internet Computing for Science and Engineering. Harbin: IEEE, 2010: 182-187.

DOI: 10.1109/icicse.2010.42

Google Scholar

[3] Das A, Islam M M. Secured Trust : a dynamic trust computation model for secured communication in mult-agent systems[J]. IEEE Transactions on Dependable and Secure Computing, 2012, 9(2): 261-274.

DOI: 10.1109/tdsc.2011.57

Google Scholar

[4] Ma S N, He J S. A multi-dimension dynamic trust evaluation model based on GA[C]/Proceedings of the 2nd International Workshop on Intelligent Systems and Applications. Wuhan:IEEE. 2010: 1-4.

DOI: 10.1109/iwisa.2010.5473581

Google Scholar

[5] Su Jindian, Guo Heqing, Gao Ying. Recommendation mechanism based on Web of trust[J] . Journal of South China University of Technology: Natural Science Edition, 2008, 36(4): 98-103.

Google Scholar