TY - GEN
T1 - Information sharing in cooperative networks
T2 - 2016 IEEE International Conference on Communications, ICC 2016
AU - Jiang, Chunxiao
AU - Ren, Yong
AU - Chen, Hsiao Hwa
AU - Moshen, Guizani
PY - 2016/7/12
Y1 - 2016/7/12
N2 - In a cooperative network, users share information with each other to achieve a common target. Due to the concerns of privacy and cost, users may be reluctant to share genuine information with each other, which incurs the information trustworthiness problem. Most of the existing research attempts have proposed various mechanisms targeting to enhance the information credibility in various scenarios. However, the users' information sharing inclinations have not been well considered and modeled, which closely determine the information credibility in the network. In this paper, we study a trustworthy situation in cooperative networks and utilize the concept of reputation to model users' behaviors. Specifically, we propose two reputation learning methods based on both the peer-to-peer Bayesian learning and the social non-Bayesian learning models, and also propose a trustworthiness learning method based on the posterior estimation. Finally, simulations are conducted to verify the correctness and effectiveness of our theoretical analysis.
AB - In a cooperative network, users share information with each other to achieve a common target. Due to the concerns of privacy and cost, users may be reluctant to share genuine information with each other, which incurs the information trustworthiness problem. Most of the existing research attempts have proposed various mechanisms targeting to enhance the information credibility in various scenarios. However, the users' information sharing inclinations have not been well considered and modeled, which closely determine the information credibility in the network. In this paper, we study a trustworthy situation in cooperative networks and utilize the concept of reputation to model users' behaviors. Specifically, we propose two reputation learning methods based on both the peer-to-peer Bayesian learning and the social non-Bayesian learning models, and also propose a trustworthiness learning method based on the posterior estimation. Finally, simulations are conducted to verify the correctness and effectiveness of our theoretical analysis.
UR - http://www.scopus.com/inward/record.url?scp=84981297753&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84981297753&partnerID=8YFLogxK
U2 - 10.1109/ICC.2016.7511092
DO - 10.1109/ICC.2016.7511092
M3 - Conference contribution
AN - SCOPUS:84981297753
T3 - 2016 IEEE International Conference on Communications, ICC 2016
BT - 2016 IEEE International Conference on Communications, ICC 2016
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 22 May 2016 through 27 May 2016
ER -