EigenTrustp++: Attack resilient trust management
نویسندگان
چکیده
This paper argues that trust and reputation models should take into account not only direct experiences (local trust) and experiences from the circle of ”friends”, but also be attack resilient by design in the presence of dishonest feedbacks and sparse network connectivity. We first revisit EigenTrust, one of the most popular reputation systems to date, and identify the inherent vulnerabilities of EigenTrust in terms of its local trust vector, its global aggregation of local trust values, and its eigenvector based reputation propagating model. Then we present EigenTrust, an attack resilient trust management scheme. EigenTrust extends the eigenvector based reputation propagating model, the core of EigenTrust, and counters each of vulnerabilities identified with alternative methods that are by design more resilient to dishonest feedbacks and sparse network connectivity under four known attack models. We conduct extensive experimental evaluation on EigenTrust, and show that EigenTrust can significantly outperform EigenTrust in terms of both performance and attack resilience in the presence of dishonest feedbacks and sparse network connectivity against four representative attack models.
منابع مشابه
Trust Based Node Replication Attack Detection Protocol for Wireless Sensor Networks
The harmful attack against Wireless Sensor Networks (WSN) is Node Replication attack, where one or more node(s) illegitimately claims an identity, are also called clone attack due to identity theft. The Node replication attack can be exceedingly injurious to many important functions of the sensor network such as routing, resource allocation, misbehavior detection, This study proposes a method R...
متن کاملSensorTrust: A resilient trust model for wireless sensing systems
Wireless sensor networks (WSNs) are prone to failures and malicious attacks. Traditional approaches from encryption and authentication are not sufficient to solve the problems. Trust management of WSNs is bringing new approaches. However, it is still a challenge to establish a trust environment for WSNs. To conquer that challenge, we propose a resilient trust model with a focus on data integrit...
متن کاملImproving Trustworthiness in E-Market Using Attack Resilient Reputation Modeling
Asymmetric information is a major problem in e-commerce transactions as it gives rise to adverse selection and moral hazard problems. Reputation mechanisms provide a solution to this problem by discouraging fraudulent behavior and encouraging honest behavior of participants in the uncertain and un-trusted environment of e-market. This paper discusses trust and reputation relationships, and high...
متن کاملLocation verification and trust management for resilient geographic routing
In this paper, we consider the security of geographic routing (GR) protocols. In GR, neighbors exchange their location information. Based on this information, a node forwards packets to the neighbor that is closest to the destination. Although GR is widely used in ad hoc and wireless sensor networks, its security has rarely been studied; there are a number of attacks that are possible on GR. In...
متن کاملSybil-Resilient Online Content Rating
Obtaining user feedback (using votes) is essential in ranking user-generated online content. However, any online voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating several Sybil identities. In this paper, we present SumUp, a Sybilresilient online content rating system that leverages trust networks among users to defend against Sybil attacks wi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012