Skip to main content
Log in

Using reputation measurement to defend mobile social networks against malicious feedback ratings

The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The reputation of a particular node/service is determined by the collective feedback ratings obtained from past users, and services’ reputation is vital to service recommendation in mobile social networks. However, existing malicious feedback ratings complicate the accurate measurement of nodes’ reputation scores. In this paper, we introduce an accurate reputation measurement approach, which uses both virgin and non-virgin reputation scores to shield services against malicious feedback ratings. We implement our approach based on the NetLogo simulation environment, and the simulation results show that our approach is capable of measuring node’s reputation more effectively when suffering from malicious feedback ratings compared with other approaches.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Notes

  1. https://ccl.northwestern.edu/netlogo/.

  2. http://en.wikipedia.org/wiki/Six_degrees_of_separation.

References

  1. Yichuan J, Jiang JC (2014) Understanding social networks from a multiagent perspective. IEEE Trans Parallel Distrib Syst 10(25):2743–2759

    Google Scholar 

  2. Eng Keong L, Ruichuan C, Zhuhua C (2011) Social trust and reputation in online social networks. In: Proceedings of IEEE 17th international conference on in parallel and distributed systems (ICPADS 2011), pp 811–816

  3. Wang S, Zheng Z, Wu Z, Yang F, Lyu MR (2014) Reputation measurement and malicious feedback rating prevention in web service recommendation systems. IEEE Trans Serv Comput PP(99):1–14

  4. JooYoung L, Oh JC (2013) A model for recursive propagations of reputations in social networks. In: Proceeding of 2013 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM 2013), pp 666–670

  5. Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th international conference on World Wide Web (WWW 2003), pp 640–651

  6. Li X, Ling L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 7(16):843–857

    Google Scholar 

  7. Ruidong L, Jie L, Peng L, Hsiao-Hwa C (2007) An objective trust management framework for mobile ad hoc networks. In: Proceedings of IEEE 65th vehicular technology conference (VTC2007-Spring), pp 56–60

  8. Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 12(43):45–48

    Article  Google Scholar 

  9. Buchegger S, Le Boudec JY (2004) A robust reputation system for P2P and mobile ad-hoc networks. In: Proceedings of P2PEcon

  10. Zouridaki C, Mark BL, Hejmo M, Thomas RK (2005) A quantitative trust establishment framework for reliable data packet delivery in MANETs. In: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks, pp 1–10

  11. Liang Z, Shi W (2005) Enforcing cooperative resource sharing in untrusted P2P computing environments. Mobile Netw Appl 6(10):971–983

    Article  Google Scholar 

  12. Hoffman K, Zage D, Nita-Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv 1(42):1–31

    Article  Google Scholar 

  13. Wang S, Zheng Z, Wu Z, Sun Q, Zou H, Yang F (2014) Context-aware mobile service adaptation via a co-evolution extended classifier system in mobile network environments. Mobile Inf Syst 2(10):197–215

    Article  Google Scholar 

  14. Tran DT, Truong TTM, Le TG (2012) A routing strategy for non-cooperation wireless multi-hop ad hoc networks. Mobile Inf Syst 4(8):333–349

    Article  Google Scholar 

  15. Ahn J, Han R (2013) Personalized behavior pattern recognition and unusual event detection for mobile users. Mobile Inf Syst 2(9):99–122

    Article  Google Scholar 

Download references

Acknowledgments

The work presented in this study is supported by NSFC (61202435), the Natural Science Foundation of Beijing under Grant No. 4132048, and NSFC (61472047).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ching-Hsien Hsu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Huang, L., Wang, S., Hsu, CH. et al. Using reputation measurement to defend mobile social networks against malicious feedback ratings. J Supercomput 71, 2190–2203 (2015). https://doi.org/10.1007/s11227-015-1432-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-015-1432-x

Keywords

Navigation