{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,27]],"date-time":"2024-02-27T09:00:19Z","timestamp":1709024419517},"reference-count":35,"publisher":"Wiley","issue":"18","license":[{"start":{"date-parts":[[2017,1,16]],"date-time":"2017-01-16T00:00:00Z","timestamp":1484524800000},"content-version":"vor","delay-in-days":46,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373172"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,12]]},"abstract":"Abstract<\/jats:title>Trust management has become an emerging security paradigm in various areas such as ad hoc networks and cloud computing. One core element of trust management is the indirect trust model that evaluates the trustworthiness of a target based on others' recommendations. The research on indirect trust is still at an early stage, and some problems are not addressed yet. Because of the subjectivity of trust, entities would have different views on a same target. Consequently, after receiving recommendations, the evaluating entity should first measure their credibility. Existing methods often distort recommendations. We propose a more reasonable method based on the similarity between recommenders and evaluating entities. Furthermore, considering the characteristics of one\u2010hop and multi\u2010hop recommendations, the similarity calculation methods for them were developed individually. Another problem is the spoofed recommendations aiming at tarnishing someone or harboring conspirators. We design a simple but efficient algorithm to detect and remove them. The proposed methods and algorithms constitute the integrated indirect trust model. This model is not bound to any specific domain, and thus it can be widely applied. Simulation results show that the model is effective in obtaining an objective indirect trust value with the existence of personalized and dishonest recommenders. Copyright \u00a9 2017 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.1742","type":"journal-article","created":{"date-parts":[[2017,1,17]],"date-time":"2017-01-17T04:33:40Z","timestamp":1484627620000},"page":"5868-5881","source":"Crossref","is-referenced-by-count":1,"title":["A similarity\u2010based indirect trust model with anti\u2010spoofing capability"],"prefix":"10.1002","volume":"9","author":[{"given":"Shuaishuai","family":"Tan","sequence":"first","affiliation":[{"name":"School of Aerospace Science and Technology Xidian University Xi'an 710126 China"}]},{"given":"Yanming","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Aerospace Science and Technology Xidian University Xi'an 710126 China"}]},{"given":"Xiaoping","family":"Li","sequence":"additional","affiliation":[{"name":"School of Aerospace Science and Technology Xidian University Xi'an 710126 China"}]},{"given":"Qingkuan","family":"Dong","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Integrated Services Networks Xidian University Xi'an 710071 China"}]}],"member":"311","published-online":{"date-parts":[[2017,1,16]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0145"},{"issue":"2015","key":"e_1_2_9_3_1","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.adhoc.2015.03.004","article-title":"Trust based routing mechanism for securing OSLR\u2010based MANET","volume":"30","author":"Tan S","year":"2015","journal-title":"Ad Hoc Networks"},{"key":"e_1_2_9_4_1","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2015.2.1756"},{"key":"e_1_2_9_5_1","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/649392"},{"key":"e_1_2_9_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2438653.2438659"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.07.018"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.748"},{"key":"e_1_2_9_10_1","unstructured":"Y.WangandJ.Vassileva Bayesian network\u2010based trust model inProceedings IEEE\/WIC International Conference on Web Intelligence (WI 2003) 2003 372\u2013378."},{"key":"e_1_2_9_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.07.008"},{"key":"e_1_2_9_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.022"},{"key":"e_1_2_9_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2489790"},{"key":"e_1_2_9_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0140"},{"key":"e_1_2_9_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2013.04.003"},{"key":"e_1_2_9_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2313865"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2374154"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-2165-5"},{"issue":"7","key":"e_1_2_9_19_1","first-page":"1","article-title":"A credible routing based on a novel trust mechanism in ad hoc networks","volume":"2013","author":"Feng R","year":"2013","journal-title":"Int. J. Distrib. Sens. Networks"},{"key":"e_1_2_9_20_1","doi-asserted-by":"crossref","unstructured":"J.\u2010H.Cho A.Swami andI.\u2010R.Chen Modeling and analysis of trust management for cognitive mission\u2010driven group communication systems in mobile ad hoc networks in2009 International Conference on Computational Science and Engineering 2009 641\u2013650.","DOI":"10.1109\/CSE.2009.68"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.006"},{"key":"e_1_2_9_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2320505"},{"key":"e_1_2_9_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.47"},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12025"},{"key":"e_1_2_9_26_1","doi-asserted-by":"crossref","unstructured":"D. E.Denning A new paradigm for trusted systems inProceedings on the 1992\u20131993 workshop on New security paradigms\u2014NSPW '92\u201393 1993 36\u201341.","DOI":"10.1145\/283751.283772"},{"key":"e_1_2_9_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.06.015"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2012.09.002"},{"key":"e_1_2_9_29_1","first-page":"1","article-title":"Towards efficient multi\u2010keyword fuzzy search over encrypted outsourced data with accuracy improvement","author":"Fu Z","year":"2016","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"issue":"2","key":"e_1_2_9_31_1","first-page":"317","article-title":"Mutual verifiable provable data auditing in public cloud storage","volume":"16","author":"Ren Y","year":"2015","journal-title":"J. Internet Technol."},{"key":"e_1_2_9_32_1","first-page":"11","article-title":"Trust\u2010enhanced cloud service selection model based on QoS analysis","volume":"10","author":"Pan Y","year":"2015","journal-title":"PLoS One"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.11.013"},{"key":"e_1_2_9_34_1","doi-asserted-by":"crossref","unstructured":"F. S.Proto A.Detti C.Pisa andG.Bianchi A framework for packet\u2010droppers mitigation in OLSR wireless community networks in2011 IEEE International Conference on Communications (ICC) 2011 1\u20136.","DOI":"10.1109\/icc.2011.5963001"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2006.11.002"},{"key":"e_1_2_9_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.stamet.2013.08.004"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1742","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1742","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T19:47:49Z","timestamp":1693684069000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":35,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["10.1002\/sec.1742"],"URL":"https:\/\/doi.org\/10.1002\/sec.1742","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"value":"1939-0114","type":"print"},{"value":"1939-0122","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12]]}}}