Encyclopedia of Wireless Networks

Living Edition
| Editors: Xuemin (Sherman) Shen, Xiaodong Lin, Kuan Zhang

Trustworthiness Evaluation

  • Chen WangEmail author
Living reference work entry
DOI: https://doi.org/10.1007/978-3-319-32903-1_318-1



Trustworthiness evaluation is the act of scoring or grading users by analyzing its attributes. The wireless network systems can decide whether to cooperate with a user by conducting a trustworthiness evaluation of it. How to combine cloud computing technology to securely and efficiently evaluate the trustworthiness of wireless network members while protecting the privacy of each member is one of the focuses of this theme.

Historical Background

User trustworthiness is an important issue that cannot be ignored in network security and information security. The concept of trust for the Internet is first proposed in Grandison and Sloman (2000). The main discussion of Grandison et al. is reputation-based trust. This kind of trustworthiness evaluation may be conducted according to a user’s credit card details, purchases, property situation, etc. With the growing development of cashless payments,...

This is a preview of subscription content, log in to check access.


  1. Grandison T, Sloman M (2000) A survey of trust in internet applications. IEEE Commun Surv Tutorials 3(4):2–16CrossRefGoogle Scholar
  2. Huang L, Li L, Tan Q (2006) Behavior-based trust in wireless sensor network. In: Proceedings of Asia-Pacific web conference. Springer, Berlin/Heidelberg, pp 214–223Google Scholar
  3. Shen J, Wang C, Castiglione A, Liu D, Esposito C (2017) Trustworthiness evaluation-based routing protocol for incompletely predictable vehicular ad hoc networks. IEEE Trans Big Data,  https://doi.org/10.1109/TBDATA.2017.2710347 CrossRefGoogle Scholar
  4. Sicari S, Rizzardi A, Grieco LA, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146–164CrossRefGoogle Scholar
  5. Song W, Phoha VV (2004) Neural network-based reputation model in a distributed system. In: Proceedings of IEEE international conference on e-commerce technology, CEC’2004. IEEE, Washington, DC, pp 321–324Google Scholar
  6. Zhang Y, Wang L, Sun W et al (2013) Trust system design optimization in smart grid network infrastructure. IEEE Trans Smart Grid 4(1):184–195CrossRefGoogle Scholar
  7. Zhang T, Yan L, Yang Y (2018) Trust evaluation method for clustered wireless sensor networks based on cloud model. Wirel Netw 24(3):777–797CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.School of Computer and SoftwareNanjing University of Information Science and TechnologyNanjingChina

Section editors and affiliations

  • Haojin Zhu
    • 1
  • Jian Shen
    • 2
  1. 1.Shanghai Jiaotong University, ChinaShanghaiChina
  2. 2.Nanjing University of Information Science & Technology, ChinaNanjingChina