Abstract
It is necessary to solve the inaccurate data arising from data reliability ignored by most data fusion algorithms drawing upon collaborative filtering and fuzzy network theory. Therefore, a model is constructed based on the collaborative filtering algorithm and fuzzy network theory to calculate the node trust value as the weight of weighted data fusion. First, a FTWDF (Feedback Trust Weighted for Data Fusion) is proposed. Second, EEFA (Efficiency unequal Fuzzy clustering Algorithm) is introduced into FTWDF considering the defects of the clustering structure caused by ignoring the randomness of node energy consumption and cluster head selection in the practical application of the existing data fusion algorithm. Besides, the fuzzy logic is applied to cluster head selection and node clustering. Finally, an FTWDF-EEFA clustering algorithm is constructed for generating candidate cluster head nodes, which is verified by simulation experiments. The comparative analysis reveals that the accuracy of the FTWDF-EEFA clustering algorithm is 4.1% higher than that of the TMDF (Trust Multiple attributes Decision-making-based data Fusion) algorithm, and 8.3% higher than that of LDTS (Larger Data fusion based on node Trust evaluation in wireless Sensor networks) algorithm. It performs better in accuracy and recommendation results during the processing of ML100M dataset and NF5M dataset. Besides, the new clustering algorithm increases the survival time of nodes when analyzing the number of death nodes to prolong networks’ lifespan. It improves the survival period of nodes, balances the network load, and prolongs networks’ lifespan. Furthermore, the FTWDF-EEFA clustering algorithm can balance nodes’ energy consumption and effectively save nodes’ overall energy through analysis. Therefore, the optimized algorithm can increase the lifespan of network and improve the trust mechanism effectively. The performance of the algorithm has reached the expected effect, providing a reference for the practical application of the trust mechanism in networks.
- [1] . 2021. A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm [J]. Cluster Computing 24, 1 (2021), 1–15.
DOI: DOI: 10.1007/s10586-021-03235-1Google ScholarDigital Library
- [2] Bojanova. 2016. IEEE transactions on cloud computing: Entering its fourth year with confidence [J]. IEEE Computer Architecture Letters 4, 01 (2016), 1–2.
DOI: DOI: 10.1109/TCC.2016.2521459 Google ScholarDigital Library
- [3] . 2020. New method of traffic flow forecasting based on quantum particle swarm optimization strategy for intelligent transportation system[J]. International Journal of Communication Systems 33, 10 (2020), 1–13.
DOI: DOI: 10.1002/dac.4647Google Scholar - [4] 2012. A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the Internet of Things (IoT) [J]. Computers & Mathematics with Applications 64, 5 (2012), 1044–1055.
DOI: DOI: 0.1016/j.camwa.2012.03.023 Google ScholarCross Ref
- [5] 2020. Adaptive repair algorithm for TORA routing protocol based on flood control strategy [J]. Computer Communications 151, 1 (2020), 437–448.
DOI: DOI: 10.1016/j.comcom.2020.01.024Google ScholarDigital Library
- [6] 2017. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education[J]. Journal of Network and Computer Applications 88, 15 (2017), 1–9.
DOI: DOI: 10.1016/j.jnca.2017.03.025 Google ScholarDigital Library
- [7] . 2019. Novel self-adaptive routing service algorithm for application in VANET [J]. Applied Intelligence 49, 5 (2019), 1866–1879.
DOI: DOI: 10.1007/s10489-018-1368-y Google ScholarDigital Library
- [8] . 2021. Novel best path selection approach based on hybrid improved A* algorithm and reinforcement learning [J]. Applied Intelligence 51, 9 (2021), 1–15.
DOI: DOI: 10.1007/s10489-021-02303-8Google ScholarDigital Library
- [9] 2019. Optimal base station antenna downtilt in downlink cellular networks [J]. IEEE Transactions on Wireless Communications 18, 3 (2019), 1779–1791.
DOI: DOI: 10.1109/TWC.2019.2897296 Google ScholarDigital Library
- [10] 2018. Multimedia big data analytics: A survey [J]. ACM Computing Surveys (CSUR) 51, 1 (2018), 1–34.
DOI: DOI: 10.1145/3150226 Google ScholarDigital Library
- [11] . 2018. A domain partition-based trust model for unreliable clouds [J]. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2167–2178.
DOI: DOI: 10.1109/TIFS.2018.2812166Google ScholarCross Ref
- [12] 2020. Human-swarm-teaming transparency and trust architecture [J]. IEEE/CAA Journal of Automatica Sinica (2020), 1–15.
DOI: DOI: 10.1109/JAS.2020.1003545Google Scholar - [13] 2018. GTSO: Global trace synchronization and ordering mechanism for wireless sensor network monitoring platforms [J]. Sensors 18, 1 (2018) 28.
DOI: DOI: 10.3390/s18010028Google Scholar - [14] 2020. Novel method of mobile edge computation offloading based on evolutionary game strategy for IoT devices [J]. AEU-International Journal of Electronics and Communications 118, 5 (2020), 1–13.
DOI: DOI: 10.1016/j.aeue.2020.153134Google Scholar - [15] 2018. Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning [J]. Journal of Network and Computer Applications 2018, 122: 37–49.
DOI: DOI: 10.1016/j.jnca.2018.07.018Google ScholarCross Ref
- [16] 2019. A topological approach to secure message dissemination in vehicular networks [J]. IEEE Transactions on Intelligent Transportation Systems 21, 1 (2019), 135–148.
DOI: DOI: 10.1109/TITS.2018.2889746Google ScholarCross Ref
- [17] 2019. Consensus reaching in social network DeGroot model: The roles of the Self-confidence and node degree [J]. Information Sciences 486, (2019), 62–72.
DOI: DOI: 10.1016/j.ins.2019.02.028Google ScholarDigital Library
- [18] . 2018. A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy [J]. Mobile Networks & Applications 23, 4 (2018), 828–839.
DOI: DOI: 10.1007/s11036-017-0878-xGoogle ScholarDigital Library
- [19] 2020. A multi-path routing protocol based on link lifetime and energy consumption prediction for mobile edge computing [J]. IEEE Access 8, 1 (2020), 69058–69071.
DOI: DOI: 10.1109/ACCESS.2020.2986078Google ScholarCross Ref
- [20] 2019. Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios [J]. IEEE Access 7, (2019) 21343–21358.
DOI: DOI: 10.1109/ACCESS.2019.2896699Google ScholarCross Ref
- [21] 2019. A kind of novel method of power allocation with limited cross-tier interference for CRN [J]. IEEE Access 7, 1 (2019), 82571–82583.
DOI: DOI: 10.1109/ACCESS.2019.2921310Google ScholarCross Ref
- [22] 2021. Nonsingular terminal sliding mode control with ultra-local model and single input interval type-2 fuzzy logic control for pitch control of wind turbines [J]. IEEE/CAA Journal of Automatica Sinica 8, 3 (2021), 690–700.
DOI: DOI: 10.1109/JAS.2021.1003889Google ScholarCross Ref
- [23] 2020. New approach of multi-path reliable transmission for marginal wireless sensor network [J]. Wireless Networks 26, 2 (2020), 1503–1517.
DOI: DOI: 10.1007/s11276-019-02216-yGoogle ScholarDigital Library
- [24] 2020. New algorithm of multi-strategy channel allocation for edge computing [J]. AEU-International Journal of Electronics and Communications 126, 11 (2020), 1–15.
DOI: DOI: 10.1016/j.aeue.2020.153372Google ScholarCross Ref
- [25] 2017. Adaptive and dual data-communication trust scheme for clustered wireless sensor networks [J]. Telecommunication Systems 65, 4 (2017), 605–619.
DOI: DOI: 10.1007/s11235-016-0254-3 Google ScholarDigital Library
- [26] . 2017. Novel PEECR-based clustering routing approach [J]. Soft Computing 21, 24 (2017), 7313–7323.
DOI: DOI: 10.1007/s00500-016-2270-3 Google ScholarDigital Library
- [27] . 2017. Communication and data trust for wireless sensor networks using D–S theory [J]. IEEE Sensors Journal 17, 12 (2017), 3921–3929.
DOI: DOI: 10.1109/JSEN.2017.2699561Google ScholarCross Ref
- [28] 2021. A new method of data missing estimation with FNN-based tensor heterogeneous ensemble learning for internet of vehicle [J]. Neurocomputing 420, 1 (2021), 98–110.
DOI: DOI: 10.1016/j.neucom.2020.09.042.Google ScholarCross Ref
- [29] . 2013. Video search and indexing with reinforcement agent for interactive multimedia services. ACM Transactions on Embedded Computing Systems (TECS). 12, 2 (2013), 1–6.
DOI: DOI: 10.1145/2423636.2423643 Google ScholarDigital Library
- [30] . 2018. A kind of effective data aggregating method based on compressive sensing for wireless sensor network [J]. EURASIP Journal on Wireless Communications and Networking 2018 (159):1–15.
DOI: DOI: 10.1186/s13638-018-1176-4Google Scholar - [31] . 2018. New method of energy efficient subcarrier allocation based on evolutionary game theory [J]. Mobile Networks and Applications 2018, 9:1–15.
DOI: DOI: 10.1007/s11036-018-1123-yGoogle ScholarDigital Library
- [32] . 2012. A new approach and system for attentive mobile learning based on seamless migration [J]. Applied Intelligence 36, 1 (2012), 75–89. Google Scholar
Digital Library
- [33] 2015. A novel multicast routing method with minimum transmission for WSN of cloud computing service [J]. Soft Computing 19, 7 (2015), 1817–1827. Google Scholar
Digital Library
- [34] 2019. A new algorithm of the best path selection based on machine learning [J]. IEEE Access 7, 1 (2019), 126913–126928.
DOI: DOI: 10.1109/ACCESS.2019.2939423Google ScholarCross Ref
- [35] . 2019. A double-blind anonymous evaluation-based trust model in cloud computing environments [J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems 51, 3 (2019), 1805–1816.
DOI: DOI: 10.1109/TSMC.2019.2906310Google ScholarCross Ref
- [36] 2020. Mixing patterns in social trust networks: A social identity theory perspective [J]. IEEE Transactions on Computational Social Systems 2020, 1–13.
DOI: 10.1109/TCSS.2020.3021179Google Scholar - [37] . 2020. Security and trust in blockchains: Architecture, key technologies, and open issues [J]. IEEE Transactions on Computational Social Systems 7, 3 (2020), 790–801.
DOI: DOI: 10.1109/TCSS.2020.2990103Google ScholarCross Ref
- [38] 2019. A new method of mobile ad hoc network routing based on greed forwarding improvement strategy [J]. IEEE Access 7, 1 (2019), 158514–158524.
DOI: DOI: 10.1109/ACCESS.2019.2950266Google ScholarCross Ref
- [1] . 2019. Inferring trust using personality aspects extracted from texts. In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) 3840–3846. IEEE.Google Scholar
Digital Library
- [2] 2016. Hybrid computing using a neural network with dynamic external memory[J]. Nature 2016, 538 (7626), 471.
DOI: DOI: 10.1038/nature20101Google ScholarCross Ref
- [3] . 2017. DDos Defense: Enhanced flooding detection and confidence-based filtering method[J]. Advances in Computational Sciences and Technology 10, 8 (2017), 2257–2272.Google Scholar
- [4] . 2018. A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion[J]. IEEE Access 2018, 6. 23626–23638.
DOI: DOI: 10.1109/ACCESS.2018.2831898Google ScholarCross Ref
- [5] . 2019. An attack-resistant reputation management system for mobile ad hoc networks[J]. Procedia Computer Science 2019, 147. 473–479.
DOI: DOI: 10.1016/j.procs.2019.01.275Google ScholarDigital Library
- [6] . 2020. Shaping library's social media authority through trust-creating activities: A case of selected academic libraries in Nigeria[J]. Malaysian Journal of Library & Information Science 25, 1 (2020), 83.
DOI: DOI: 10.22452/mjlis.vol25no1.5Google Scholar - [7] . 2017. Monitoring climatic conditions using wireless sensor networks[J]. Monitoring Climatic Conditions Using Wireless Sensor Networks (January 25, 2017). A Multidisciplinary Journal of Scientific Research & Education 3, 1 (2017) 27.Google Scholar
- [8] 2017. A trust cloud model for underwater wireless sensor networks[J]. IEEE Communications Magazine 55, 3 (2017), 110–116.
DOI: DOI: 10.1109/MCOM.2017.1600502CMGoogle ScholarDigital Library
- [9] 2018. Confident information coverage hole detection in sensor networks for uranium tailing monitoring[J]. Journal of Parallel and Distributed Computing 2018, 118: 57–66.
DOI: DOI: 10.1016/j.jpdc.2017.03.005Google ScholarDigital Library
- [10] 2020. Examining help requests on social networking sites: Integrating privacy perception and privacy calculus perspectives[J]. Electronic Commerce Research and Applications 2020, 39, 100828.
DOI: DOI: 10.1016/j.elerap.2019.100828Google ScholarDigital Library
- [11] 2020. FTM-IoMT: Fuzzy-based trust management for preventing Sybil attacks in Internet of Medical Things[J]. IEEE Internet of Things Journal 2020, 4485–4497.
DOI: DOI: 10.1109/JIOT.2020.3027440Google Scholar - [12] . 2017. A comprehensive study of the trust evaluation mechanisms in the cloud computing[J]. Journal of Service Science Research 9, 1 (2017), 1–30.
DOI: DOI: 10.1007/s12927-017-0001-7Google ScholarCross Ref
- [13] . 2018. An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks[J]. EURASIP Journal on Wireless Communications and Networking (2018) 1, 1–10.
DOI: DOI: 10.1186/s13638-018-1174-6Google Scholar - [14] . 2019. Research on trust mechanism of cooperation innovation with big data processing based on blockchain[J]. EURASIP Journal on Wireless Communications and Networking (2019) 1, 1–11.
DOI: DOI: 10.1186/s13638-019-1340-5Google Scholar - [15] 2020. A hybridized semantic trust-based framework for personalized web page recommendation[J]. International Journal of Computers and Applications 42, 8 (2020), 729–739.
DOI: DOI: 10.1080/1206212X.2018.1480472Google ScholarCross Ref
- [16] . 2017. Active trust and fuzzy logic-based energy aware routing algorithm for wireless sensor networks[J]. Journal of Computational and Theoretical Nanoscience 14, 11 (2017), 5427–5434.
DOI: DOI: 10.1166/jctn.2017.6966Google ScholarCross Ref
- [17] . 2017. Using input delay approach for synthesizing an anti-windup compensator to AQM in TCP/IP networks. In 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP) (1–6). IEEE.Google Scholar
Cross Ref
- [18] . 2018. A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks[J]. International Journal of Communication Systems 31, 4 (2018), e3487.
DOI: DOI: 10.1002/dac.3487Google ScholarCross Ref
- [19] 2019. Estimating virtual trust of cognitive agents using multi layered socio-fuzzy inference system[J]. Journal of Intelligent & Fuzzy Systems 37, 2 (2019) 2769–2784.
DOI: DOI: 10.3233/JIFS-18760Google ScholarCross Ref
- [20] . 2020. An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN)[J]. Journal of Ambient Intelligence and Humanized Computing (2020), 1–15.
DOI: DOI: 10.1007/s12652-020-01834-1Google Scholar
Index Terms
Trust Mechanism of Feedback Trust Weight in Multimedia Network
Recommendations
Benevolence trust: a key determinant of user continuance use of online social networks
Online social networking (OSN) has attracted increased attention and growing membership in recent years. In this paper, we propose and test an extended and unified theory of acceptance and use of technology (UTAUT) model, including the additional areas ...
The Evolutionary Analysis of Trust Mechanism in the Industrial Cluster Based on Social Network
ICIII '09: Proceedings of the 2009 International Conference on Information Management, Innovation Management and Industrial Engineering - Volume 02Trust as a special kind of social relationship for firms has an important effect on the formation of industrial cluster and its cultivation of competitive advantage. Trust in the industrial cluster is different from it in the general organization, it is ...
Does Technology Trust Substitute Interpersonal Trust?: Examining Technology Trust's Influence on Individual Decision-Making
While an increasing number of trust studies examine technological artifacts as trust recipients, there is still a lack of basic understanding of how technology trust relates to traditional trust and its role within the broader nomological net ...






Comments