Skip to main content
Fig. 3 | EURASIP Journal on Wireless Communications and Networking

Fig. 3

From: A collaborative service resource evaluation model based on trust network

Fig. 3

Processes of the challenge mechanism. To challenge node U, Node V first asks k friend nodes or high-trust nodes for several confirmed File ids and evaluations. After receiving the request, the friend node will select files related to the requirement keyword from its own LVR confirmed Hash store to form a file collection response and return it to the originating node. The originating node tries to select the file ids that have an intersection from the different node response messages, to prevent spoofing by malicious nodes. Node V will select the good service ID to constitute the "Votes Challenge Request" message of evaluation and collection. The whole process is secret to U

Back to article page