Abstract
Malicious peers in Peer-to-peer networks can develop sophisticated strategies to bypass existing security mechanisms. The effectiveness of contemporary trust management systems is usually tested only against simple malicious strategies. In this paper, we propose a simulation framework for evaluation of resistance of trust management systems against different malicious strategies. We present results of five TMS that represent main contemporary approaches; the results indicate that most of the traditional trust managements are vulnerable to sophisticated malicious strategies.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-3-319-05939-6_37
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: WWW’03: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM Press (2003)
Xiong, L., Ling, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843–857 (2004)
Huanyu, Z., Xiaolin, L.: H-Trust: a group trust management system for peer-to-peer desktop grid. J. Comput. Sci. Technol. 24, 447–462 (2009)
Bonnaire, X., Rosas, E.: WTR: a reputation metric for distributed hash tables based on a risk and credibility factor. J. Comput. Sci. Technol. 24, 844–854 (2009)
Novotny, M., Zavoral, F.: BubbleTrust: a reliable trust management for large P2P networks. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) CNSA 2010. CCIS, vol. 89, pp. 359–373. Springer, Heidelberg (2010)
Novotny, M., Zavoral, F.: Resistance against malicious collectives in BubbleTrust. In: The 12th International Conference on Parallel and Distributed Computing, Gwangju, Korea (2011)
Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42(1), 1–31 (2009)
Marti, S., Garcia-Molina, H.: Taxonomy of trust: categorizing P2P reputation systems. Comput. Netw. 50, 472–484 (2006)
Selvaraj, C., Anand, S.: Peer profile based trust model for P2P systems using genetic algorithm. Peer-to-Peer Netw. Appl. 4, 1–12 (2011)
Suryanarayana, G., Taylor, R.N.: A survey of trust management and resource discovery technologies in peer-to-peer applications. Technical report, UC Irvine (2004)
Bonnaire, X., Rosas, E.: A critical analysis of latest advances in building trusted P2P networks using reputation systems. In: Weske, M., Hacid, M.-S., Godart, C. (eds.) WISE Workshops 2007. LNCS, vol. 4832, pp. 130–141. Springer, Heidelberg (2007)
Druschel, P., Rowstron, A.: PAST: a large-scale, persistent peer-to-peer storage utility. In: Proceedings of the Eighth Workshop Hot Topics in Operating Systems (2001)
Acknowledgment
This work was supported in part by grants 204/13/08195 and SVV-2013-267312.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Novotný, M., Zavoral, F. (2014). Resistance of Trust Management Systems Against Malicious Collectives. In: Vinh, P., Alagar, V., Vassev, E., Khare, A. (eds) Context-Aware Systems and Applications. ICCASA 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 128. Springer, Cham. https://doi.org/10.1007/978-3-319-05939-6_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-05939-6_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05938-9
Online ISBN: 978-3-319-05939-6
eBook Packages: Computer ScienceComputer Science (R0)