PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

The Oracle - a New Intelligent Cooperative Strategy of Attacks on Trust and Reputation Systems

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper presents a new concept of attack on trust and reputation systems. The oracle attack could violate the security provided by some of the existing reputation systems. The formal model of the attack is presented in the article on the base of the reference trust model, provided bythe author. The author has proved that this type of attack could be eficient. On the other hand,a sort of measures is provided in the paper which could be implemented in the reputation systems to overcome identified vulnerabilities, unfortunately at the cost of increase of system complication.The paper also provides a definition of intelligent strategies of attacks on trust and reputation systems based on cooperation of many malicious nodes and justifies why this type of attacks is a serious threat.
Rocznik
Strony
86--102
Opis fizyczny
Bibliogr. 19 poz., rys.
Twórcy
  • Institute of Telecommunication, Warsaw University of Technology, Warsaw, Poland
Bibliografia
  • [1] Sun Y. L., Han Z., Yu W., Ray Liu K. J., Attacks on Trust Evaluation in Distributed Networks , Proc. Inf. Sci. Syst. Conf., 2 (2006): 1461-1466.
  • [2] Blaze M., Feigenbaum J., and Ioannidis J., The role of trust manage-ment in distributed systems security, in Secure Internet Programming, Springer-Verlag (1999): 185-210.
  • [3] Ganeriwal S., Srivastava M. B., Reputation-based framework for high integrity sensor networks, in Proceedings of ACM Security for Ad-hoc and Sensor Networks (SASN) (2004).
  • [4] Hoffman K., Zage D., Nita-Rotaru C., A Survey of Attack and Defense Techniques for Reputation Systems, ACM Computing Surveys, 42 (2009): 1-31.
  • [5] Kavitha T., Sridharan , D., Security Vulnerabilities In Wireless Sensor Networks: A Survey, J. Inform. Assur. Secur. (2010): 31-44.
  • [6] Padmavathi G., Shanmugapriya D., A Survey of Attacks, Security Mechanisms and Challenges in Wireless Sensor Networks, International Journal of Computer Science and Information Security 4(2) (2009).
  • [7] Sun Y., Han Z., Ray Liu K. J., Defense of Trust Management Vulnerabilities in Distributed Networks, IEEE Communications Magazine 46 (2008): 112-119.
  • [8] Sabater J., Sierra C., Computational trust and reputation models for open multi-agent systems - a review (2013).
  • [9] Sabater J., Sierra C., Review on Computational Trust and Reputation Models. Artificial Intelligence, Artificial Intelligence Review, 24(1) (2005): 3360.
  • [10] Velloso P. B., Laufer R. P., Duarte O. C. M. B., Pujolle G., A Trust Model Robust to Slander Attacks in Ad Hoc Networks, IEEE International Conf. Comput. Commun. Netw. ANC workshop (2008).
  • [11] Sun Y. L., Han Z., Yu W., Ray Liu K. J., A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks, Proc. IEEE INFOCOM (2006).
  • [12] Sun Y., Han Z., Ray Liu K. J., Defense of Trust Management Vulnerabilities in Distributed Networks, Communications Magazine, IEEE, 46(2) (2008): 112-119.
  • [13] Gomez Marmol F., Martnez Perez G., Security threats scenarios in trust and reputation models for distributed systems, Computers &, Security, 28(7) (2009): 545-556.
  • [14] Zhang L., Jiang S., Zhang J., Keong Ng W., Robustness of Trust Models and Combinations for Handling Unfair Ratings, In Proceedings of the 6th IFIP International Conference on Trust Management (IFIPTM) (2012): 36-51.
  • [15] Sun Y. L., Liu Y., Security of Online Reputation Systems The evolution of attacks and defenses, IEEE Signal Processing Magazine, 29(2) (2012): 87-97.
  • [16] Srivatsa M., Xiong L., Liu L., Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks, in Proc. 14th Int. Conf. World Wide Web (2005): 422-431.
  • [17] Yang Y., Feng Q., Sun Y., Dai Y., Reputation trap: A powerful attack on repu-tation system of file sharing P2P environment, in Proc. 4th Int. Conf. Security and Privacy in Communication Networks (2008): 1766-1780.
  • [18] Yu Y., Li K., Zhou W., Li P., Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures, Journal of Network and Computer Applications (2011).
  • [19] Srinivasany A., Teitelbaumy J., Liangz H., Wuy J., Cardei M., Reputation and Trust-based Systems for Ad Hoc and Sensor Networks, In: A. Boukerche, Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks (2009): 375-404.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-1872e517-624b-4a88-b2b8-aa54150a6998
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.