{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:44:28Z","timestamp":1740149068855,"version":"3.37.3"},"reference-count":26,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,7,8]],"date-time":"2021-07-08T00:00:00Z","timestamp":1625702400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572260","61872196","61872194","BE2017166"],"award-info":[{"award-number":["61572260","61872196","61872194","BE2017166"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Scientific & Technological Support Project of Jiangsu Province","award":["61572260","61872196","61872194","BE2017166"],"award-info":[{"award-number":["61572260","61872196","61872194","BE2017166"]}]},{"name":"Jiangsu Government Scholarship for Overseas Studies","award":["61572260","61872196","61872194","BE2017166"],"award-info":[{"award-number":["61572260","61872196","61872194","BE2017166"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,7,8]]},"abstract":"<jats:p>Due to the lack of trusted third parties as guarantees in peer-to-peer (P2P) networks, how to ensure trusted transactions between peers has become a research hotspot. However, the open and distributed characteristics of P2P networks have brought challenges to network security, and there are problems such as node fraud and unavailability of services in the network. To solve the problem of how to select trusted transaction peers in P2P groups, a new trust model, GT-Bidding, is proposed in this paper. This model follows the bidding process of human society. First, each service peer applies for a group of guarantee peers and carries out credit mortgages for this service. Second, based on the entropy and TOPSIS method (Technology for Order Preference by Similarity to an Ideal Solution) approaching the ideal solution, a set of ideal trading sequences is selected. Then, the transaction impact function is used to assign weights to the selected guarantee peers and service nodes, respectively; thus, the comprehensive trust of each service node can be calculated. Finally, the service peer is verified using feedback based on the specific confidence level, which encourages the reputation of the service and its guarantee peers to update. Experiments show that GT-Bidding improves the successful transaction rate and resists complex attacks.<\/jats:p>","DOI":"10.1155\/2021\/8842181","type":"journal-article","created":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T20:05:11Z","timestamp":1625861111000},"page":"1-13","source":"Crossref","is-referenced-by-count":0,"title":["GT-Bidding: Group Trust Model of P2P Network Based on Bidding"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9350-5961","authenticated-orcid":true,"given":"Lin","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}]},{"given":"Xinyan","family":"Wei","sequence":"additional","affiliation":[{"name":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"}]},{"given":"Yanwen","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4392-3599","authenticated-orcid":true,"given":"Haiping","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5454-210X","authenticated-orcid":true,"given":"Xiong","family":"Fu","sequence":"additional","affiliation":[{"name":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}]},{"given":"Ruchuan","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer, Nanjing University of Posts and Telecommunications, Nanjing 210003, China"},{"name":"Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101971"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2286-9"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2016.2530705"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2021.3060484"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2378788"},{"issue":"1","key":"6","first-page":"35","article-title":"Enhancing security in cloud computing using multilevel authentication","volume":"1","author":"Y. Patel","year":"2014","journal-title":"International Journal of Electrical Electronics & Computer Science Engineering"},{"first-page":"123","article-title":"EigenRep: reputation management in P2P networks","author":"D. Kamvar","key":"7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.3724\/sp.j.1016..2010.00345"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31854-7_32"},{"issue":"10","key":"10","first-page":"2119","article-title":"A stable group-based trust management scheme for mobile P2P networks","volume":"37","author":"X. Wu","year":"2014","journal-title":"Journal of Computer"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.04.015"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.07.008"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.05.084"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2011.57"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-013-0198-2"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0577-1"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.06.011"},{"issue":"8","key":"18","first-page":"34","article-title":"Dynamic P2P trust modelbased on context factors","volume":"37","author":"Y. C. Liu","year":"2016","journal-title":"Journal on Communications"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1142\/s0219686719500094"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2016.2549019"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101898"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/tem.2019.2921736"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.02.015"},{"issue":"3","key":"24","first-page":"614","article-title":"Cloud service composition based on trust combination","volume":"46","author":"Z. Yang","year":"2018","journal-title":"Journal of Electronics"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2906310"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2904081"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8842181.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8842181.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/8842181.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,9]],"date-time":"2021-07-09T20:05:26Z","timestamp":1625861126000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/8842181\/"}},"subtitle":[],"editor":[{"given":"Shehzad Ashraf","family":"Chaudhry","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,7,8]]},"references-count":26,"alternative-id":["8842181","8842181"],"URL":"https:\/\/doi.org\/10.1155\/2021\/8842181","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,7,8]]}}}