Abstract
It is argued that group-based trust metric is effective in resisting attacks, which evaluates groups of assertions “in tandem”, and generally computes trust ranks for sets of individuals according to peers’ social position in trust network. Thus, the group-based trust value should be called “reputation rank”. But, unfortunately, most group-based trust metrics are vulnerable to the attack of front peers, which represent these malicious colluding peers always cooperate with others in order to increase their reputation, and then provide misinformation to promote actively malicious peers. In this paper, we proposed adaptive spreading activation approach to mitigating the effect of front peer attack, in which adaptive spreading factor is used to reflect the peer’s recommendation ability according to behaviors of the peer’s direct/indirect children in trust network; Simulation results show that the adaptive spreading activation approach can identify and mitigate the attack of front peer.
Research supported by the NSFC Grants 60472067, JiangSu education bureau (5KJB510091) and State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications (BUPT).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the semantic web. In: Proceedings of the 7th International Workshop on Cooperative Intelligent Agents (2003)
Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International World Wide Web Conference (2004)
Ziegler, C.N., Lausen, G.: Spreading activation models for trust propagation. In: Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service (2004)
Douceur, J.R.: The sybil attack. In: Proceedings of 1st International Workshop on Peer-to-Peer Systems (2002)
Wang, Y.F., Hori, Y., Sakurai, K.: On securing open networks through trust and reputation? architecture, challenges and solutions. In: Proceeding of The 1st Joint Workshop on Information Security (2006)
Hogg, T., Adamic, L.: Enhancing reputation mechanisms via online social networks. In: Proceedings of ACM Conference on Electronic Commerce (2004)
Levien, R.: Attack resistant trust metrics. PhD thesis, UC Berkeley, Berkeley, CA, USA (2003)
Cheng, A., Friedman, E.: Sybilproof reputation mechanisms. In: Proceeding of the ACM SIGCOMM workshop on Economics of peer-to-peer systems (2005)
Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust incentive techniques for peer-to-peer networks. In: Proceedings of the 5th ACM conference on Electronic commerce (2004)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International World Wide Web Conference (2003)
Aberer, K., Despotovic, Z.: Possibilities for managing trust in P2P networks. EPFL Technical Report, IC/2004/84, Lausanne (2004)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems (2006)
Zhou, R., Hwang, K.: PowerTrust: A robust and scalable reputation system for trusted P2P computing. IEEE Transactions on Parallel and Distributed Systems, 18 (2007)
Ziegler, C.N., Lausen, G.: Propagation models for trust and distrust in social networks. Information Systems Frontiers 7 (2005)
Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45, 167–256 (2003)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, Y., Hori, Y., Sakurai, K. (2007). An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_26
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_26
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)