skip to main content
research-article

Trust Mechanism of Feedback Trust Weight in Multimedia Network

Authors Info & Claims
Published:12 November 2021Publication History
Skip Abstract Section

Abstract

It is necessary to solve the inaccurate data arising from data reliability ignored by most data fusion algorithms drawing upon collaborative filtering and fuzzy network theory. Therefore, a model is constructed based on the collaborative filtering algorithm and fuzzy network theory to calculate the node trust value as the weight of weighted data fusion. First, a FTWDF (Feedback Trust Weighted for Data Fusion) is proposed. Second, EEFA (Efficiency unequal Fuzzy clustering Algorithm) is introduced into FTWDF considering the defects of the clustering structure caused by ignoring the randomness of node energy consumption and cluster head selection in the practical application of the existing data fusion algorithm. Besides, the fuzzy logic is applied to cluster head selection and node clustering. Finally, an FTWDF-EEFA clustering algorithm is constructed for generating candidate cluster head nodes, which is verified by simulation experiments. The comparative analysis reveals that the accuracy of the FTWDF-EEFA clustering algorithm is 4.1% higher than that of the TMDF (Trust Multiple attributes Decision-making-based data Fusion) algorithm, and 8.3% higher than that of LDTS (Larger Data fusion based on node Trust evaluation in wireless Sensor networks) algorithm. It performs better in accuracy and recommendation results during the processing of ML100M dataset and NF5M dataset. Besides, the new clustering algorithm increases the survival time of nodes when analyzing the number of death nodes to prolong networks’ lifespan. It improves the survival period of nodes, balances the network load, and prolongs networks’ lifespan. Furthermore, the FTWDF-EEFA clustering algorithm can balance nodes’ energy consumption and effectively save nodes’ overall energy through analysis. Therefore, the optimized algorithm can increase the lifespan of network and improve the trust mechanism effectively. The performance of the algorithm has reached the expected effect, providing a reference for the practical application of the trust mechanism in networks.

REFERENCES

  1. [1] Liu Xiaohuan. 2021. A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm [J]. Cluster Computing 24, 1 (2021), 115. DOI: DOI: 10.1007/s10586-021-03235-1Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Bojanova. 2016. IEEE transactions on cloud computing: Entering its fourth year with confidence [J]. IEEE Computer Architecture Letters 4, 01 (2016), 12. DOI: DOI: 10.1109/TCC.2016.2521459 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. [3] Wang J. X. and Fan Hong-rui. 2020. New method of traffic flow forecasting based on quantum particle swarm optimization strategy for intelligent transportation system[J]. International Journal of Communication Systems 33, 10 (2020), 113. DOI: DOI: 10.1002/dac.4647Google ScholarGoogle Scholar
  4. [4] Zhang D., Zhu Y., Zhao C., et al. 2012. A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the Internet of Things (IoT) [J]. Computers & Mathematics with Applications 64, 5 (2012), 10441055. DOI: DOI: 0.1016/j.camwa.2012.03.023 Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Liu S., Zhang D., Liu X., et al. 2020. Adaptive repair algorithm for TORA routing protocol based on flood control strategy [J]. Computer Communications 151, 1 (2020), 437448. DOI: DOI: 10.1016/j.comcom.2020.01.024Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Zhang D., Liu S., Zhang T., et al. 2017. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education[J]. Journal of Network and Computer Applications 88, 15 (2017), 19. DOI: DOI: 10.1016/j.jnca.2017.03.025 Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Zhang D., Zhang T., and Liu X.. 2019. Novel self-adaptive routing service algorithm for application in VANET [J]. Applied Intelligence 49, 5 (2019), 18661879. DOI: DOI: 10.1007/s10489-018-1368-y Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Liu Xiaohuan. 2021. Novel best path selection approach based on hybrid improved A* algorithm and reinforcement learning [J]. Applied Intelligence 51, 9 (2021), 115. DOI: DOI: 10.1007/s10489-021-02303-8Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Yang J., Ding M., Mao G., et al. 2019. Optimal base station antenna downtilt in downlink cellular networks [J]. IEEE Transactions on Wireless Communications 18, 3 (2019), 17791791. DOI: DOI: 10.1109/TWC.2019.2897296 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Pouyanfar S., Yang Y., Chen S. C., et al. 2018. Multimedia big data analytics: A survey [J]. ACM Computing Surveys (CSUR) 51, 1 (2018), 134. DOI: DOI: 10.1145/3150226 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Zhang P. Y., Kong Y., and Zhou M. C.. 2018. A domain partition-based trust model for unreliable clouds [J]. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 21672178. DOI: DOI: 10.1109/TIFS.2018.2812166Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Hepworth J., Baxter D. P., Hussein A., et al. 2020. Human-swarm-teaming transparency and trust architecture [J]. IEEE/CAA Journal of Automatica Sinica (2020), 115. DOI: DOI: 10.1109/JAS.2020.1003545Google ScholarGoogle Scholar
  13. [13] Navia M., Campelo J., Bonastre A., et al. 2018. GTSO: Global trace synchronization and ordering mechanism for wireless sensor network monitoring platforms [J]. Sensors 18, 1 (2018) 28. DOI: DOI: 10.3390/s18010028Google ScholarGoogle Scholar
  14. [14] Cui Y., Zhang D., Zhang T., et al. 2020. Novel method of mobile edge computation offloading based on evolutionary game strategy for IoT devices [J]. AEU-International Journal of Electronics and Communications 118, 5 (2020), 113. DOI: DOI: 10.1016/j.aeue.2020.153134Google ScholarGoogle Scholar
  15. [15] Zhang D., Zhang T., Dong Y., et al. 2018. Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning [J]. Journal of Network and Computer Applications 2018, 122: 3749. DOI: DOI: 10.1016/j.jnca.2018.07.018Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Chen J., Mao G., Li C., et al. 2019. A topological approach to secure message dissemination in vehicular networks [J]. IEEE Transactions on Intelligent Transportation Systems 21, 1 (2019), 135148. DOI: DOI: 10.1109/TITS.2018.2889746Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Ding Z., Chen X., Dong Y., et al. 2019. Consensus reaching in social network DeGroot model: The roles of the Self-confidence and node degree [J]. Information Sciences 486, (2019), 6272. DOI: DOI: 10.1016/j.ins.2019.02.028Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Zhou S.. 2018. A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy [J]. Mobile Networks & Applications 23, 4 (2018), 828839. DOI: DOI: 10.1007/s11036-017-0878-xGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Zhang D. G., Chen L., Zhang J., et al. 2020. A multi-path routing protocol based on link lifetime and energy consumption prediction for mobile edge computing [J]. IEEE Access 8, 1 (2020), 6905869071. DOI: DOI: 10.1109/ACCESS.2020.2986078Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Liu S., Zhang D. G., Liu X., et al. 2019. Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios [J]. IEEE Access 7, (2019) 2134321358. DOI: DOI: 10.1109/ACCESS.2019.2896699Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Zhang T., Zhang D., Qiu J., et al. 2019. A kind of novel method of power allocation with limited cross-tier interference for CRN [J]. IEEE Access 7, 1 (2019), 8257182583. DOI: DOI: 10.1109/ACCESS.2019.2921310Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Abrazeh S., Parvaresh A., Mohseni S. R., et al. 2021. Nonsingular terminal sliding mode control with ultra-local model and single input interval type-2 fuzzy logic control for pitch control of wind turbines [J]. IEEE/CAA Journal of Automatica Sinica 8, 3 (2021), 690700. DOI: DOI: 10.1109/JAS.2021.1003889Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Zhang D., Wu H., Zhao P., et al. 2020. New approach of multi-path reliable transmission for marginal wireless sensor network [J]. Wireless Networks 26, 2 (2020), 15031517. DOI: DOI: 10.1007/s11276-019-02216-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Zhang D., Piao M., Zhang T., et al. 2020. New algorithm of multi-strategy channel allocation for edge computing [J]. AEU-International Journal of Electronics and Communications 126, 11 (2020), 115. DOI: DOI: 10.1016/j.aeue.2020.153372Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Talbi S., Koudil M., Bouabdallah A., et al. 2017. Adaptive and dual data-communication trust scheme for clustered wireless sensor networks [J]. Telecommunication Systems 65, 4 (2017), 605619. DOI: DOI: 10.1007/s11235-016-0254-3 Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] NIU H. L.. 2017. Novel PEECR-based clustering routing approach [J]. Soft Computing 21, 24 (2017), 73137323. DOI: DOI: 10.1007/s00500-016-2270-3 Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Reddy V. B., Venkataraman S., and Negi A.. 2017. Communication and data trust for wireless sensor networks using D–S theory [J]. IEEE Sensors Journal 17, 12 (2017), 39213929. DOI: DOI: 10.1109/JSEN.2017.2699561Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Zhang T., Zhang D., Yan H., et al. 2021. A new method of data missing estimation with FNN-based tensor heterogeneous ensemble learning for internet of vehicle [J]. Neurocomputing 420, 1 (2021), 98110. DOI: DOI: 10.1016/j.neucom.2020.09.042.Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Paul B. W. Chen, Bharanitharan K., and Wang J. F.. 2013. Video search and indexing with reinforcement agent for interactive multimedia services. ACM Transactions on Embedded Computing Systems (TECS). 12, 2 (2013), 16. DOI: DOI: 10.1145/2423636.2423643 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Zhang T. and Zhang J.. 2018. A kind of effective data aggregating method based on compressive sensing for wireless sensor network [J]. EURASIP Journal on Wireless Communications and Networking 2018 (159):115. DOI: DOI: 10.1186/s13638-018-1176-4Google ScholarGoogle Scholar
  31. [31] Chen C. and Cui Y. Y.. 2018. New method of energy efficient subcarrier allocation based on evolutionary game theory [J]. Mobile Networks and Applications 2018, 9:115. DOI: DOI: 10.1007/s11036-018-1123-yGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  32. [32] Zhang D. G.. 2012. A new approach and system for attentive mobile learning based on seamless migration [J]. Applied Intelligence 36, 1 (2012), 7589. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Zhang D., Zheng K., Zhang T., et al. 2015. A novel multicast routing method with minimum transmission for WSN of cloud computing service [J]. Soft Computing 19, 7 (2015), 18171827. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34] Liu X. H., Zhang D. G., Yan H. R., et al. 2019. A new algorithm of the best path selection based on machine learning [J]. IEEE Access 7, 1 (2019), 126913126928. DOI: DOI: 10.1109/ACCESS.2019.2939423Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Zhang P., Zhou M. C., and Kong Y.. 2019. A double-blind anonymous evaluation-based trust model in cloud computing environments [J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems 51, 3 (2019), 18051816. DOI: DOI: 10.1109/TSMC.2019.2906310Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Liu S., Hu X., Wang S. H., et al. 2020. Mixing patterns in social trust networks: A social identity theory perspective [J]. IEEE Transactions on Computational Social Systems 2020, 113. DOI:10.1109/TCSS.2020.3021179Google ScholarGoogle Scholar
  37. [37] Zhang P. and Zhou M.. 2020. Security and trust in blockchains: Architecture, key technologies, and open issues [J]. IEEE Transactions on Computational Social Systems 7, 3 (2020), 790801. DOI: DOI: 10.1109/TCSS.2020.2990103Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Zhang D. G., Zhao P. Z., Cui Y., et al. 2019. A new method of mobile ad hoc network routing based on greed forwarding improvement strategy [J]. IEEE Access 7, 1 (2019), 158514158524. DOI: DOI: 10.1109/ACCESS.2019.2950266Google ScholarGoogle ScholarCross RefCross Ref

APPENDIXREFERENCES

  1. [1] Granatyr J., Gomes H. M., Dias J. M., Paiva A. M., Nunes M. A. S. N., Scalabrin E. E., and Spak F.. 2019. Inferring trust using personality aspects extracted from texts. In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) 38403846. IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Graves A., Wayne G., Reynolds M., et al. 2016. Hybrid computing using a neural network with dynamic external memory[J]. Nature 2016, 538 (7626), 471. DOI: DOI: 10.1038/nature20101Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Lakshmi V. N. and Begum S.. 2017. DDos Defense: Enhanced flooding detection and confidence-based filtering method[J]. Advances in Computational Sciences and Technology 10, 8 (2017), 22572272.Google ScholarGoogle Scholar
  4. [4] Yuan J. and Li X.. 2018. A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion[J]. IEEE Access 2018, 6. 2362623638. DOI: DOI: 10.1109/ACCESS.2018.2831898Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Zhang S. S., Wang S. W., Xia H., and Cheng X. G.. 2019. An attack-resistant reputation management system for mobile ad hoc networks[J]. Procedia Computer Science 2019, 147. 473479. DOI: DOI: 10.1016/j.procs.2019.01.275Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. [6] Magoi J. S., Abrizah A., and Aspura M. K. Y. I.. 2020. Shaping library's social media authority through trust-creating activities: A case of selected academic libraries in Nigeria[J]. Malaysian Journal of Library & Information Science 25, 1 (2020), 83. DOI: DOI: 10.22452/mjlis.vol25no1.5Google ScholarGoogle Scholar
  7. [7] Prabhu B., Pradeep M., and Gajendran E.. 2017. Monitoring climatic conditions using wireless sensor networks[J]. Monitoring Climatic Conditions Using Wireless Sensor Networks (January 25, 2017). A Multidisciplinary Journal of Scientific Research & Education 3, 1 (2017) 27.Google ScholarGoogle Scholar
  8. [8] Jiang J., Han G., Zhu C., et al. 2017. A trust cloud model for underwater wireless sensor networks[J]. IEEE Communications Magazine 55, 3 (2017), 110116. DOI: DOI: 10.1109/MCOM.2017.1600502CMGoogle ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Yi L., Deng X., Zou Z., et al. 2018. Confident information coverage hole detection in sensor networks for uranium tailing monitoring[J]. Journal of Parallel and Distributed Computing 2018, 118: 5766. DOI: DOI: 10.1016/j.jpdc.2017.03.005Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. [10] Guo J., Li N., Wu Y. et al. 2020. Examining help requests on social networking sites: Integrating privacy perception and privacy calculus perspectives[J]. Electronic Commerce Research and Applications 2020, 39, 100828.DOI: DOI: 10.1016/j.elerap.2019.100828Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. [11] Mohiuddin I., Almogren A., Din I. U., et al. 2020. FTM-IoMT: Fuzzy-based trust management for preventing Sybil attacks in Internet of Medical Things[J]. IEEE Internet of Things Journal 2020, 44854497. DOI: DOI: 10.1109/JIOT.2020.3027440Google ScholarGoogle Scholar
  12. [12] Chiregi M. and Navimipour N. J.. 2017. A comprehensive study of the trust evaluation mechanisms in the cloud computing[J]. Journal of Service Science Research 9, 1 (2017), 130. DOI: DOI: 10.1007/s12927-017-0001-7Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Wang Y., Zhang M., and Shu W.. 2018. An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks[J]. EURASIP Journal on Wireless Communications and Networking (2018) 1, 110. DOI: DOI: 10.1186/s13638-018-1174-6Google ScholarGoogle Scholar
  14. [14] Liu Q. and Zou X.. 2019. Research on trust mechanism of cooperation innovation with big data processing based on blockchain[J]. EURASIP Journal on Wireless Communications and Networking (2019) 1, 111. DOI: DOI: 10.1186/s13638-019-1340-5Google ScholarGoogle Scholar
  15. [15] Deepak G., Shwetha B. N., Pushpa C. N., et al. 2020. A hybridized semantic trust-based framework for personalized web page recommendation[J]. International Journal of Computers and Applications 42, 8 (2020), 729739. DOI: DOI: 10.1080/1206212X.2018.1480472Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] Asha A. and Arun C.. 2017. Active trust and fuzzy logic-based energy aware routing algorithm for wireless sensor networks[J]. Journal of Computational and Theoretical Nanoscience 14, 11 (2017), 54275434. DOI: DOI: 10.1166/jctn.2017.6966Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Lamrabet O., El Fezazi N., El Haoussi F., and Tissir E. H.. 2017. Using input delay approach for synthesizing an anti-windup compensator to AQM in TCP/IP networks. In 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP) (16). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  18. [18] Chhabra A., Vashishth V., and Sharma D. K.. 2018. A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks[J]. International Journal of Communication Systems 31, 4 (2018), e3487. DOI: DOI: 10.1002/dac.3487Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Hussain S., Abbas S., Sohail T., et al. 2019. Estimating virtual trust of cognitive agents using multi layered socio-fuzzy inference system[J]. Journal of Intelligent & Fuzzy Systems 37, 2 (2019) 27692784. DOI: DOI: 10.3233/JIFS-18760Google ScholarGoogle ScholarCross RefCross Ref
  20. [20] Sumalatha M. S. and Nandalal V.. 2020. An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN)[J]. Journal of Ambient Intelligence and Humanized Computing (2020), 115. DOI: DOI: 10.1007/s12652-020-01834-1Google ScholarGoogle Scholar

Index Terms

  1. Trust Mechanism of Feedback Trust Weight in Multimedia Network

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Multimedia Computing, Communications, and Applications
          ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 17, Issue 4
          November 2021
          529 pages
          ISSN:1551-6857
          EISSN:1551-6865
          DOI:10.1145/3492437
          Issue’s Table of Contents

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 November 2021
          • Revised: 1 July 2021
          • Accepted: 1 July 2021
          • Online AM: 7 May 2020
          • Received: 1 June 2019
          Published in tomm Volume 17, Issue 4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Full Text

        View this article in Full Text.

        View Full Text

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!