Advertisement

An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System

  • Yufeng Wang
  • Yoshiaki Hori
  • Kouichi Sakurai
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)

Abstract

It is argued that group-based trust metric is effective in resisting attacks, which evaluates groups of assertions “in tandem”, and generally computes trust ranks for sets of individuals according to peers’ social position in trust network. Thus, the group-based trust value should be called “reputation rank”. But, unfortunately, most group-based trust metrics are vulnerable to the attack of front peers, which represent these malicious colluding peers always cooperate with others in order to increase their reputation, and then provide misinformation to promote actively malicious peers. In this paper, we proposed adaptive spreading activation approach to mitigating the effect of front peer attack, in which adaptive spreading factor is used to reflect the peer’s recommendation ability according to behaviors of the peer’s direct/indirect children in trust network; Simulation results show that the adaptive spreading activation approach can identify and mitigate the attack of front peer.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. [1]
    Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the semantic web. In: Proceedings of the 7th International Workshop on Cooperative Intelligent Agents (2003)Google Scholar
  2. [2]
    Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International World Wide Web Conference (2004)Google Scholar
  3. [3]
    Ziegler, C.N., Lausen, G.: Spreading activation models for trust propagation. In: Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service (2004)Google Scholar
  4. [4]
    Douceur, J.R.: The sybil attack. In: Proceedings of 1st International Workshop on Peer-to-Peer Systems (2002)Google Scholar
  5. [5]
    Wang, Y.F., Hori, Y., Sakurai, K.: On securing open networks through trust and reputation? architecture, challenges and solutions. In: Proceeding of The 1st Joint Workshop on Information Security (2006)Google Scholar
  6. [6]
    Hogg, T., Adamic, L.: Enhancing reputation mechanisms via online social networks. In: Proceedings of ACM Conference on Electronic Commerce (2004)Google Scholar
  7. [7]
    Levien, R.: Attack resistant trust metrics. PhD thesis, UC Berkeley, Berkeley, CA, USA (2003)Google Scholar
  8. [8]
    Cheng, A., Friedman, E.: Sybilproof reputation mechanisms. In: Proceeding of the ACM SIGCOMM workshop on Economics of peer-to-peer systems (2005)Google Scholar
  9. [9]
    Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust incentive techniques for peer-to-peer networks. In: Proceedings of the 5th ACM conference on Electronic commerce (2004)Google Scholar
  10. [10]
    Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International World Wide Web Conference (2003)Google Scholar
  11. [11]
    Aberer, K., Despotovic, Z.: Possibilities for managing trust in P2P networks. EPFL Technical Report, IC/2004/84, Lausanne (2004)Google Scholar
  12. [12]
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems (2006)Google Scholar
  13. [13]
    Zhou, R., Hwang, K.: PowerTrust: A robust and scalable reputation system for trusted P2P computing. IEEE Transactions on Parallel and Distributed Systems, 18 (2007)Google Scholar
  14. [14]
    Ziegler, C.N., Lausen, G.: Propagation models for trust and distrust in social networks. Information Systems Frontiers 7 (2005)Google Scholar
  15. [15]
    Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45, 167–256 (2003)zbMATHCrossRefMathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Yufeng Wang
    • 1
  • Yoshiaki Hori
    • 2
  • Kouichi Sakurai
    • 2
  1. 1.College of Telecommunications, Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003China
  2. 2.Department of Computer Science and Communication Engineering, Kyushu University, Fukuoka 812-0053Japan

Personalised recommendations