Research Article

Research on Trust Propagation Models in Reputation Management Systems

Table 1

Simulation configuration.

Network scale1000
Number of malicious nodes13.4%
Number of pretrust nodes3%
% of spy users3.4%
% of service requests in which good user i provides unsatisfied services0%–10%
% of service requests in which malicious user i provides unsatisfied serviceVaried in threat models
% of spy users gives honest ratings10%, 30%, 50%, 70%
Decay factors0.1, 0.3, 0.5, 0.7
Threshold value of conditional propagation0.005, 0.5
Rating mechanismMultiscale rating mechanism
Similarity algorithm[8] [Su, et al. 2013]
Local trust algorithm[5] [Kamvar, et al. 2003]
Initialization strategyVaried in propagation models
Jump strategyVaried in propagation models
Queries issued by each nodeUniform distribution 50–100.
Number of cycles30