The Journal of Supercomputing

, Volume 71, Issue 6, pp 2190–2203 | Cite as

Using reputation measurement to defend mobile social networks against malicious feedback ratings

  • Lin Huang
  • Shangguang Wang
  • Ching-Hsien Hsu
  • Juanjuan Zhang
  • Fangchun Yang
Article

Abstract

The reputation of a particular node/service is determined by the collective feedback ratings obtained from past users, and services’ reputation is vital to service recommendation in mobile social networks. However, existing malicious feedback ratings complicate the accurate measurement of nodes’ reputation scores. In this paper, we introduce an accurate reputation measurement approach, which uses both virgin and non-virgin reputation scores to shield services against malicious feedback ratings. We implement our approach based on the NetLogo simulation environment, and the simulation results show that our approach is capable of measuring node’s reputation more effectively when suffering from malicious feedback ratings compared with other approaches.

Keywords

Social network Smart computing Mobile computing  Reputation measurement 

References

  1. 1.
    Yichuan J, Jiang JC (2014) Understanding social networks from a multiagent perspective. IEEE Trans Parallel Distrib Syst 10(25):2743–2759Google Scholar
  2. 2.
    Eng Keong L, Ruichuan C, Zhuhua C (2011) Social trust and reputation in online social networks. In: Proceedings of IEEE 17th international conference on in parallel and distributed systems (ICPADS 2011), pp 811–816Google Scholar
  3. 3.
    Wang S, Zheng Z, Wu Z, Yang F, Lyu MR (2014) Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Trans Serv Comput PP(99):1–14Google Scholar
  4. 4.
    JooYoung L, Oh JC (2013) A model for recursive propagations of reputations in social networks. In: Proceeding of 2013 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM 2013), pp 666–670Google Scholar
  5. 5.
    Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW 2003), pp 640–651Google Scholar
  6. 6.
    Li X, Ling L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 7(16):843–857Google Scholar
  7. 7.
    Ruidong L, Jie L, Peng L, Hsiao-Hwa C (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference (VTC2007-Spring), pp 56–60Google Scholar
  8. 8.
    Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 12(43):45–48CrossRefGoogle Scholar
  9. 9.
    Buchegger S, Le Boudec JY (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of P2PEconGoogle Scholar
  10. 10.
    Zouridaki C, Mark BL, Hejmo M, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp 1–10Google Scholar
  11. 11.
    Liang Z, Shi W (2005) Enforcing cooperative resource sharing in untrusted P2P computing environments. Mobile Netw Appl 6(10):971–983CrossRefGoogle Scholar
  12. 12.
    Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv 1(42):1–31CrossRefGoogle Scholar
  13. 13.
    Wang S, Zheng Z, Wu Z, Sun Q, Zou H, Yang F (2014) Context-aware mobile service adaptation via a co-evolution extended classifier system in mobile network environments. Mobile Inf Syst 2(10):197–215CrossRefGoogle Scholar
  14. 14.
    Tran DT, Truong TTM, Le TG (2012) A routing strategy for non-cooperation wireless multi-hop ad hoc networks. Mobile Inf Syst 4(8):333–349CrossRefGoogle Scholar
  15. 15.
    Ahn J, Han R (2013) Personalized behavior pattern recognition and unusual event detection for mobile users. Mobile Inf Syst 2(9):99–122CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • Lin Huang
    • 1
  • Shangguang Wang
    • 1
  • Ching-Hsien Hsu
    • 2
  • Juanjuan Zhang
    • 1
  • Fangchun Yang
    • 1
  1. 1.State Key Laboratory of Networking and Switching TechnologyBeijing University of Posts and TelecommunicationsBeijingChina
  2. 2.Department of Computer Science and Information EngineeringChung Hua UniversityHsinchu 707Taiwan

Personalised recommendations