PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Towards an Evaluation Model of Trust and Reputation Management Systems

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The paper presents a set of concepts which can establish a basis for the creation of new evaluation model of trust and reputation management systems (TRM). The presented approach takes into account essential characteristics of such systems to provide an assessment of its robustness. The model also specifies measures of effectiveness of trust and reputation systems. There is still a need to create a comprehensive evaluation model of attacks on trust and reputation management systems and evaluation model of TRM systems itself, which could facilitate establishing a framework to deeply evaluate the security of existing TRM systems. We believe that this paper could be perceived as a small step forward towards this goal.
Twórcy
  • NASK - Research and Academic Computer Network, Warsaw, Poland, and with the Institute of Telecommunication, Faculty of Electronics and Information Technology, Warsaw University of Technology, Warsaw, Poland
Bibliografia
  • [1] S. Babar, P. Mahalle, A. Stango, N. Prasad, R. Prasad, “Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT)”. Recent Trends in Network Security and Applications, pp. 420-429, 2010.
  • [2] Y. L. Sun, Z. Han, W. Yu, K. J. Ray Liu, “Attacks on Trust Evaluation in Distributed Networks” , Proc. Inf. Sci. Syst. Conf., vol. 2, pp.1461-1466, 2006.
  • [3] M. Blaze, J. Feigenbaum, and J. Ioannidis, “The role of trust management in distributed systems security”, in Secure Internet Programming, Springer-Verlag, pp. 185-210, 1999.
  • [4] S. Ganeriwal , M. B. Srivastava, “Reputation-based framework for high integrity sensor networks”, in Proceedings of ACM Security for Ad-hoc and Sensor Networks (SASN), 2004.
  • [5] I. Pinyol, J. Sabater-Mir, “Computational trust and reputation models for open multi-agent systems: a review”, Artif. Intell. Rev., 40(1), pp. 1–25, 2013.
  • [6] J. Sabater, C. Sierra, “Review on computational trust and reputation models” Artif. Intell. Rev., 24(1), pp. 33–60, 2005.
  • [7] X. Li, Z. Xuan, L. Wen, “Research on the Architecture of Trusted Security System Based on the Internet of Things”, Proc. 2011 Fourth Int. Conf. Intell. Comput. Technol. Autom., Vol. 02, pp. 1172–1175, IEEE Computer Society, Washington, DC, USA, 2011.
  • [8] M. Janiszewski, „Matamodel of trust and reputation management systems”, Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, vol. 8-9/2017, pp. 803-808, 2017.
  • [9] M. Janiszewski, „TRM-EAT - narzędzie oceny odporności na ataki i efektywności systemów zarządzania zaufaniem”, Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, vol. 8-9/2015, pp. 813-821, 2015.
  • [10] M. Janiszewski, „MEAEM – metoda identyfikacji i oceny najbardziej efektywnego ataku przeciwko systemom zarządzania zaufaniem i reputacją”, Przegląd Telekomunikacyjny i Wiadomości Telekomunikacyjne, vol. 8-9/2016, pp. 852-858, 2016.
  • [11] E. Koutrouli, A. Tsalgatidou, “Reputation Systems Evaluation Survey”. ACM Computing Surveys, vol.48, no. 3, 2015.
  • [12] J. Sabater, C. Sierra, “Computational trust and reputation models for open multi-agent systems - a review”, 2013.
  • [13] Y. Sun, Z. Han, K. J. Ray Liu, “Defense of Trust Management Vulnerabilities in Distributed Networks”, IEEE Communications Magazine, vol.46, pp.112-119, 2008.
  • [14] H. Marzi, M. Li, “An Enhanced Bio-Inspired Trust and Reputation Model for Wireless Sensor Network”, Procedia Computer Science 19, pp. 1159-1166, 2013.
  • [15] T. Zahariadis, H. Leligou, S. Voliois, S. Maniatis, P. Trakadas, P. Karkazis, “An Energy and Trust-aware Routing Protocol for Large Wireless Sensor Networks”, Proceedings of the 9th WSEAS International Conference on Applied Informatics and Communications, 2009.
  • [16] A. Srinivasany, J. Teitelbaumy, H. Liangz, J. Wuy, M Cardei, “Reputation and Trust-based Systems for Ad Hoc and Sensor Networks”, W: A. Boukerche (red.), Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks, pp. 375-404, 2009.
  • [17] Y. L. Sun and Y. Liu, Security of Online Reputation Systems The evolution of attacks and defenses, 2012.
  • [18] M. Srivatsa, L. Xiong, and L. Liu, “Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks,” Proc. 14th Int. Conf. World Wide Web, pp. 422–431, 2005.
  • [19] Y. Yang, Q. Feng, Y. Sun, and Y. Dai, “Reputation trap: A powerful attack on reputation system of file sharing P2P environment,” Proc. 4th Int. Conf. Security and Privacy in Communication Networks, pp. 1766–1780, 2008.
  • [20] F. Gomez Marmol, G. Martınez Perez, “Security threats scenarios in trust and reputation models for distributed systems,” Computers &, Security, vol. 28, no. 7, pp. 545-556, 2009.
  • [21] K. Hoffman, D. Zage, C. Nita-Rotaru, “A Survey of Attack and Defense Techniques for Reputation Systems”, ACM Computing Surveys, vol. 42, pp. 1-31, 2009.
  • [22] F. Gomez Marmol, G. Martınez Perez, "Trust and reputation models comparison," Internet Research, Vol. 21, No. 2, pp. 138-153, 2011.
  • [23] Bidgoly Amir Jalaly, Ladani Behrouz Tork, “Benchmarking reputation systems: A quantitative verification approach”, Computers in Human Behaviour 57, pp. 274-291, 2016
Uwagi
PL
Opracowanie ze środków MNiSW w ramach umowy 812/P-DUN/2016 na działalność upowszechniającą naukę (zadania 2017).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-d51ac6e9-3f67-4bd5-a58f-481d421dc623
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.