Computer Science ›› 2016, Vol. 43 ›› Issue (9): 169-174.doi: 10.11896/j.issn.1002-137X.2016.09.033

Previous Articles     Next Articles

Military Aeronautical Communication Spectrum Sharing Trust Mechanism Based on Cloud Model

XU Xue-fei, LI Jian-hua, YANG Ying-hui and GUO Rong   

  • Online:2018-12-01 Published:2018-12-01

Abstract: In response to the particularity of military aeronautical communication spectum sharing,a spectrum sharing trust mechanism based on cloud model was proposed.By the use of trust relevant theories and the introduction of the cloud model theory,a system framework of spectrum sharing based on the cloud model theory was constructed,and the mutual relationship of spectrum sharing system was confirmed.The clear idea and concrete method of trust evaluation based on the cloud model was proposed at last.The trust evaluation approach can implement the conversion from the fuzzy qualitative trust attributes to the precise quantification trust levels,which could resolve the series problems effectively during the establishment of spectrum sharing trust relationships.The trust evaluation experimentation was designed.The result show that the trust evaluation model is of validity and practicability,which provide the effective support of spectrum sharing strategy based on the trust mechanism.

Key words: Spectrum sharing,Cloud model,Trust mechanism,Trust evaluation,Trust attribute,Trust level

[1] Luo Li-ping,Qiu Huan-xin,Zhang Guang-chi,et al.Optimal Pricing Function with Spectrum Constraint in Cognitive Radio Networks[J].Acat Electronica Sinica,2011,39(3):562-566(in Chinese) 罗丽平,邱唤新,张广驰,等.具有约束条件的认知无线电网络最优频谱价格函数[J].电子学报,2011,39(3):562-566
[2] Tan Xue-song,Lin Chao,Guo Wei.Spectrum Sharing Schemes in Cognitive Radio Networks based Collusion Formation[J].Journal on Communications,2014,35(3):58-68(in Chinese) 谭雪松,林超,郭伟.基于合作形成的认知无线网络频谱共享策略[J].通信学报,2014,35(3):58-68
[3] Tang Hai-bing,Hu Zhi-gang.Competitive and Cooperative Pricing for Idle Spectrum Sharing in Cognitive Radio Networks[J].Systems Engineering and Electronics,2013,35(1):173-178(in Chinese) 汤海冰,胡志刚.认知无线网络空闲频谱共享的竞争与合作定价[J].系统工程与电子技术,2013,35(1):173-178
[4] Deutsch M.Trust and Suspicion[J].Journal of Conflict Resolution,1958,2(4):265-279
[5] Deutsch M.Trust,Trustworthiness and the F-Scale[J].Journal of Abnormal and Social Psychology,1960,61(61):138-140
[6] Rotter J B.A New Scale for the Measurement of Interpersonal Trust[J].Journal of Personality,1967,35(4):651-665
[7] Schlenker B R,Helm B,Tedeschi J T.The Effects of Personality and Situational Variables on Behavioral Trust[J].Journal of Personality and Social Psychology,1973,25(3):419-427
[8] Wrigntsman L S.Interpersonal Trust and Attitudes toward Human Nature[M].San Diego:Academic Press,1974
[9] Li Yong-jun,Dai Ya-fei.Research on Trust Mechanism for Peer-to-Peer Network[J].Chinese Journal of Computers,2010,33(3):390-405(in Chinese) 李勇军,代亚非.对等网络信任机制研究[J].计算机学报,2010,33(3):390-405
[10] Liu Wen-mao,Yin Li-hua,Fang Bin-xing,et al.A HierarchicalTrust Model for the Internet of Things[J].Chinese Journal of Computers,2012,35(5):846-855(in Chinese) 刘文懋,殷丽华,方滨兴,等.物联网环境下的信任机制研究[J].计算机学报,2012,35(5):846-855
[11] Jiang Shou-xu,Li Jian-zhong.A Reputation-Based Trust Mechanism for P2P E-Commerce Systems[J].Journal of Software,2007,18(10):2551-2563(in Chinese) 姜守旭,李建中.一种P2P电子商务系统中给予声誉的信任机制[J].软件学报,2007,18(10):2551-2563
[12] Peng Dong-sheng, Lin Chuang, Liu Wei-dong.A DistributedTrust Mechanism Directly Evaluating Reputation of Nodes[J].Journal of Software,2008,19(4):946-955(in Chinese) 彭冬生,林闯,刘卫东.一种直接评价节点诚信度的分布式信任机制[J].软件学报,2008,19(4):946-955
[13] Zhang Shi-bin,Xu Chun-xiang.Study on the Trust Evalution Approach Based on Cloud Model[J].Chinese Journal of Computers,2013,36(2):422-431(in Chinese) 张仕斌,许春香.基于云模型的信任评估方法研究[J].计算机学报,2013,36(2):422-431
[14] Wang Shou-xin,Zhang Li,Li He-song.Evaluation Approach ofSubjective Trust Based on Cloud Model[J].Journal of Software,2010,21(6):1341-1352(in Chinese) 王守信,张莉,李鹤松.一种基于云模型的主观信任评价方法[J].软件学报,2010,21(6):1341-1352
[15] Gu Xin,Xu Zheng-quan,Liu Jin.Review of Cloud Based Trust Model[J].Journal on Communications,2011,32(7):176-181(in Chinese) 顾鑫,徐正全,刘进.基于云理论的可信研究及展望[J].通信学报,2011,32(7):176-181
[16] Zhang Xian-feng.Research on Online Consumer Trust Mecha-nism Based on Transaction Chain[D].Xi’an:Xi’an Jiaotong University,2006(in Chinese) 张仙峰.基于交易链面向网上消费者的信任机制研究[D].西安:西安交通大学,2006
[17] Qu Xiang-li.Research on Key Techniques for Mutual Trust Me-chanism in Grid[D].Changsha:National University of Defence Technology,2006(in Chinese) 曲向丽.网格环境下互信机制关键技术研究[D].长沙:国防科技大学,2006
[18] 李德毅,杜鷁.不确定性人工智能[M].北京:国防工业出版社,2005
[19] Huang Hai-sheng,Wang Ru-chuan.Subjective trust evaluationmodel based on membership cloud theory[J].Journal on Communications,2008,29(4):13-19(in Chinese) 黄海生,王汝传.基于隶属云理论的主观信任评估模型研究[J].通信学报,2008,29(4):13-19

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .