Skip to main content

Resistance of Trust Management Systems Against Malicious Collectives

  • Conference paper
  • First Online:
Context-Aware Systems and Applications (ICCASA 2013)

Abstract

Malicious peers in Peer-to-peer networks can develop sophisticated strategies to bypass existing security mechanisms. The effectiveness of contemporary trust management systems is usually tested only against simple malicious strategies. In this paper, we propose a simulation framework for evaluation of resistance of trust management systems against different malicious strategies. We present results of five TMS that represent main contemporary approaches; the results indicate that most of the traditional trust managements are vulnerable to sophisticated malicious strategies.

The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-319-05939-6_37

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: WWW’03: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM Press (2003)

    Google Scholar 

  2. Xiong, L., Ling, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843–857 (2004)

    Article  Google Scholar 

  3. Huanyu, Z., Xiaolin, L.: H-Trust: a group trust management system for peer-to-peer desktop grid. J. Comput. Sci. Technol. 24, 447–462 (2009)

    Google Scholar 

  4. Bonnaire, X., Rosas, E.: WTR: a reputation metric for distributed hash tables based on a risk and credibility factor. J. Comput. Sci. Technol. 24, 844–854 (2009)

    Article  Google Scholar 

  5. Novotny, M., Zavoral, F.: BubbleTrust: a reliable trust management for large P2P networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 359–373. Springer, Heidelberg (2010)

    Google Scholar 

  6. Novotny, M., Zavoral, F.: Resistance against malicious collectives in BubbleTrust. In: The 12th International Conference on Parallel and Distributed Computing, Gwangju, Korea (2011)

    Google Scholar 

  7. Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42(1), 1–31 (2009)

    Article  Google Scholar 

  8. Marti, S., Garcia-Molina, H.: Taxonomy of trust: categorizing P2P reputation systems. Comput. Netw. 50, 472–484 (2006)

    Article  MATH  Google Scholar 

  9. Selvaraj, C., Anand, S.: Peer profile based trust model for P2P systems using genetic algorithm. Peer-to-Peer Netw. Appl. 4, 1–12 (2011)

    Google Scholar 

  10. Suryanarayana, G., Taylor, R.N.: A survey of trust management and resource discovery technologies in peer-to-peer applications. Technical report, UC Irvine (2004)

    Google Scholar 

  11. Bonnaire, X., Rosas, E.: A critical analysis of latest advances in building trusted P2P networks using reputation systems. In: Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE Workshops 2007. LNCS, vol. 4832, pp. 130–141. Springer, Heidelberg (2007)

    Google Scholar 

  12. Druschel, P., Rowstron, A.: PAST: a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the Eighth Workshop Hot Topics in Operating Systems (2001)

    Google Scholar 

Download references

Acknowledgment

This work was supported in part by grants 204/13/08195 and SVV-2013-267312.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Filip Zavoral .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Novotný, M., Zavoral, F. (2014). Resistance of Trust Management Systems Against Malicious Collectives. In: Vinh, P., Alagar, V., Vassev, E., Khare, A. (eds) Context-Aware Systems and Applications. ICCASA 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 128. Springer, Cham. https://doi.org/10.1007/978-3-319-05939-6_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05939-6_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05938-9

  • Online ISBN: 978-3-319-05939-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics