{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:05:35Z","timestamp":1742385935568,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T00:00:00Z","timestamp":1615248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872111","61402137"],"award-info":[{"award-number":["61872111","61402137"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["2016QY05X1000"],"award-info":[{"award-number":["2016QY05X1000"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2021,12]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the era of the 5G network, network traffic grows rapidly. Edge computing will face the challenges of high bandwidth, low latency, high reliability and other requirements of 5G network services. Due to the limited resources of node communication, computing and storage, under the sudden, intensive and high-traffic task request, edge computing will suffer from network jitter, excessive delay, access congestion, service failure and low distribution efficiency. In order to ensure network service quality and improve service efficiency, it is necessary to construct an effective collaborative service mechanism, motivate nodes to participate in cooperation, integrate network service resources and self-adapt to manage collaborative services. Therefore, establishing an effective node and service evaluation system to identify reliable resources and nodes is an effective way to improve the overall availability and reliable services of edge computing network. In this paper, we summarize and analyze the key technologies of the current collaborative service organization incentive and trust mechanism. This paper presents an attack-resistant node and service evaluation system based on a trust network. The system includes a voting collection mechanism, a trustable node selection mechanism, a questioning response mechanism and a punishment mechanism. The experiments prove that the system has a strong ability to resist attacks and is superior to the existing reputation evaluation model in terms of its performance. It can effectively improve the collaborative efficiency of edge computing and guarantee the quality of network service.<\/jats:p>","DOI":"10.1186\/s13638-021-01937-z","type":"journal-article","created":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T11:03:46Z","timestamp":1615287826000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A collaborative service resource evaluation model based on trust network"],"prefix":"10.1186","volume":"2021","author":[{"given":"Jiantao","family":"Shi","sequence":"first","affiliation":[]},{"given":"Likun","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangzhan","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4120-7716","authenticated-orcid":false,"given":"Hui","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,9]]},"reference":[{"key":"1937_CR1","unstructured":"V. Turner, J.F. Gantz, D. Reinsel, et al, The digital universe of opportunities: rich data and the increasing value of the Internet of things. https:\/\/www.emc.com\/leadership\/digital-universe\/2014iview\/highvalue-data.htm"},{"key":"1937_CR2","unstructured":"Cisco. Cisco Visual, Networking Index: Global Mobile Data Traffic Forecast 2016\u20132021 Q&A. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/vni-forecast-qa.html."},{"issue":"99","key":"1937_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JIOT.2020.3002255","volume":"PP","author":"M Shafiq","year":"2020","unstructured":"M. Shafiq, Z. Tian, A.K. Bashir, X. Du, M. Guizani, CorrAUC: a malicious bot-IoT traffic detection method in IoT network using machine learning techniques. Internet Things J. PP(99), 1 (2020). https:\/\/doi.org\/10.1109\/JIOT.2020.3002255","journal-title":"Internet Things J."},{"issue":"6","key":"1937_CR4","doi-asserted-by":"publisher","first-page":"4682","DOI":"10.1109\/JIOT.2020.2969326","volume":"7","author":"J Qiu","year":"2020","unstructured":"J. Qiu, Z. Tian, C. Du, Q. Zuo, S. Su, B. Fang, A survey on access control in the age of internet of things. IEEE Internet Things J. 7(6), 4682\u20134696 (2020)","journal-title":"IEEE Internet Things J."},{"key":"1937_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-020-01253-w","author":"N Hu","year":"2021","unstructured":"N. Hu, Z. Tian, H. Lu, X. Du, M. Guizani, A multiple-kernel clustering based intrusion detection scheme for 5g and iot networks. Int. J. Mach. Learn. Cybern. (2021). https:\/\/doi.org\/10.1007\/s13042-020-01253-w","journal-title":"Int. J. Mach. Learn. Cybern."},{"issue":"11","key":"1937_CR6","first-page":"1","volume":"11","author":"YC Hu","year":"2015","unstructured":"Y.C. Hu, M. Patel, D. Sabella et al., Mobile edge computing\u2014a key technology towards 5G. ETSI White Pap. 11(11), 1\u201316 (2015)","journal-title":"ETSI White Pap."},{"issue":"5","key":"1937_CR7","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"W. Shi, J. Cao, Q. Zhang et al., Edge computing: vision and challenges. IEEE Internet Things J. 3(5), 637\u2013646 (2016)","journal-title":"IEEE Internet Things J."},{"issue":"99","key":"1937_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TII.2020.3044576","volume":"PP","author":"Y Sun","year":"2021","unstructured":"Y. Sun, Z. Tian, M. Li, S. Su, X. Du, M. Guizani, Honeypot identification in softwarized industrial cyber-physical systems. IEEE Trans. Ind. Inform. PP(99), 1 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3044576","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"99","key":"1937_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TII.2020.3044576","volume":"PP","author":"C Chen","year":"2020","unstructured":"C. Chen, B. Liu, S. Wan, P. Qiao, Q. Pei, An edge traffic flow detection scheme based on deep learning in an intelligent transportation system. IEEE Trans. Intell. Transp. Syst. PP(99), 1 (2020). https:\/\/doi.org\/10.1109\/TII.2020.3044576","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"99","key":"1937_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TITS.2020.3017505","volume":"PP","author":"S Wan","year":"2020","unstructured":"S. Wan, X. Xu, T. Wang, Z. Gu, An intelligent video analysis method for abnormal event detection in intelligent transportation systems. IEEE Trans. Intell. Transp. Syst. PP(99), 1\u20139 (2020). https:\/\/doi.org\/10.1109\/TITS.2020.3017505","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"1937_CR11","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1016\/j.neucom.2019.04.095","volume":"398","author":"S Ding","year":"2020","unstructured":"S. Ding, S. Qu, Y. Xi, S. Wan, Stimulus-driven and concept-driven analysis for image caption generation. Neurocomputing 398, 520\u2013530 (2020)","journal-title":"Neurocomputing"},{"issue":"4","key":"1937_CR12","doi-asserted-by":"publisher","first-page":"1363","DOI":"10.1109\/JBHI.2019.2891526","volume":"23","author":"Y Zhao","year":"2019","unstructured":"Y. Zhao, H. Li, S. Wan, A. Sekuboyina, X. Hu, G. Tetteh, M. Piraud, B. Menze, Knowledge-aided convolutional neural network for small organ segmentation. IEEE J. Biomed. Health Inform. 23(4), 1363\u20131373 (2019)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"1937_CR13","doi-asserted-by":"crossref","unstructured":"S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference On World Wide Web (WWW), New York, 2003, pp. 640\u2013651","DOI":"10.1145\/775152.775242"},{"issue":"7","key":"1937_CR14","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L Xiong","year":"2004","unstructured":"L. Xiong, L. Liu, PeerTrust: supporting reputationbased trust for Peer-to-Peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843\u2013857 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"7","key":"1937_CR15","doi-asserted-by":"publisher","first-page":"6266","DOI":"10.1109\/JIOT.2019.2962914","volume":"7","author":"M Li","year":"2020","unstructured":"M. Li, Y. Sun, H. Lu, S. Maharjan, Z. Tian, Deep reinforcement learning for partially observable data poisoning attack in crowdsensing systems. IEEE Internet Things J. 7(7), 6266\u20136278 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"99","key":"1937_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TII.2020.3038761","volume":"PP","author":"C Luo","year":"2021","unstructured":"C. Luo, Z. Tan, G. Min, J. Gan, W. Shi, Z. Tian, A novel web attack detection system for Internet of Things via ensemble classification. IEEE Trans. Ind. Inform. PP(99), 1 (2021). https:\/\/doi.org\/10.1109\/TII.2020.3038761","journal-title":"IEEE Trans. Ind. Inform."},{"issue":"5","key":"1937_CR17","doi-asserted-by":"publisher","first-page":"1371","DOI":"10.1109\/TNET.2008.2009053","volume":"17","author":"S Moritz","year":"2009","unstructured":"S. Moritz, E.N. Taoufik, E.W. Biersack, Long term study of peer behavior in the KAD DHT. IEEE\/ACM Trans. Netw. 17(5), 1371\u20131384 (2009)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"5","key":"1937_CR18","doi-asserted-by":"publisher","first-page":"3901","DOI":"10.1109\/JIOT.2019.2951620","volume":"7","author":"Z Tian","year":"2020","unstructured":"Z. Tian, X. Gao, S. Su, J. Qiu, Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles. IEEE Internet of Things J. 7(5), 3901\u20133909 (2020)","journal-title":"IEEE Internet of Things J."},{"issue":"4","key":"1937_CR19","doi-asserted-by":"publisher","first-page":"2659","DOI":"10.1109\/TII.2019.2943906","volume":"16","author":"J Qiu","year":"2020","unstructured":"J. Qiu, L. Du, D. Zhang, S. Su, Z. Tian, Nei-TTE: intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city. IEEE Trans. Ind. Inform. 16(4), 2659\u20132666 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"1937_CR20","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1016\/j.ins.2019.04.011","volume":"491","author":"Z Tian","year":"2019","unstructured":"Z. Tian, M. Li, M. Qiu, Y. Sun, S. Su, Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151\u2013165 (2019)","journal-title":"Inf. Sci."},{"key":"1937_CR21","doi-asserted-by":"publisher","unstructured":"N. Fedotova, M. Bertucci, L. Veltri, Reputation management techniques in DHT-based peer-to-peer networks. In Second International Conference on Internet and Web Applications and Services (ICIW'07), Morne, 2007, p. 4. https:\/\/doi.org\/10.1109\/ICIW.2007.53","DOI":"10.1109\/ICIW.2007.53"},{"issue":"3","key":"1937_CR22","doi-asserted-by":"publisher","first-page":"576","DOI":"10.1109\/TNET.2008.923723","volume":"16","author":"H Yu","year":"2008","unstructured":"H. Yu, M. Kaminsky, P.B. Gibbons, A.D. Flaxman, SybilGuard: defending against Sybil attacks via social networks. IEEE\/ACM Trans. Netw. 16(3), 576\u2013589 (2008)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"1937_CR23","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/TNET.2009.2034047","volume":"18","author":"H Yu","year":"2010","unstructured":"H. Yu, P.B. Gibbons, M. Kaminsky, F. Xiao, Sybillimit: a near-optimal social network defense against sybil attacks. IEEE\/ACM Trans. Netw. 18(3), 885\u2013898 (2010)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"1937_CR24","doi-asserted-by":"crossref","unstructured":"C. Lesniewski-Laas. A sybil-proof one-hop DHT. In Proceedings of the first Workshop on Social Network Systems (SocialNets\u201908), Glasgow, 2008, pp. 19\u201324","DOI":"10.1145\/1435497.1435501"},{"key":"1937_CR25","unstructured":"N. Tran, B. Min, J. Li, L. Subramanian. Sybil-resilient online content voting. In Proceedings of the 6th USENIX symposium on Networked systems design and implementation (NSDI\u201909), Berkeley, 2009, pp. 15\u201328"},{"issue":"99","key":"1937_CR26","first-page":"1","volume":"PP","author":"Z Gao","year":"2020","unstructured":"Z. Gao, Y. Li, S. Wan, Exploring deep learning for view-based 3D model retrieval. ACM Trans. Multimed. Comput. Commun. Appl. PP(99), 1\u201318 (2020)","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"1937_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-019-01507-0","author":"H Lu","year":"2020","unstructured":"H. Lu, C. Jin, X. Helu et al., Research on intelligent detection of command level stack pollution for binary program analysis. Mobile Netw. Appl. (2020). https:\/\/doi.org\/10.1007\/s11036-019-01507-0","journal-title":"Mobile Netw. Appl."},{"key":"1937_CR28","unstructured":"K. Walsh, E.G. Sirer. Experience with an object reputation system for peer-to-peer file sharing. In Proceedings of the 3rd conference on Networked Systems Design & Implementation (NSDI\u201906). Berkeley, 2006, pp. 1\u201314"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01937-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-021-01937-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-021-01937-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T11:18:53Z","timestamp":1615288733000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-021-01937-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,9]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["1937"],"URL":"https:\/\/doi.org\/10.1186\/s13638-021-01937-z","relation":{},"ISSN":["1687-1499"],"issn-type":[{"type":"electronic","value":"1687-1499"}],"subject":[],"published":{"date-parts":[[2021,3,9]]},"assertion":[{"value":"13 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"51"}}