Skip to main content

Incentivizing Responsible Networking via Introduction-Based Routing

  • Conference paper
Trust and Trustworthy Computing (Trust 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6740))

Included in the following conference series:

Abstract

The Introduction-Based Routing Protocol (IBRP) leverages implicit trust relationships and per-node discretion to create incentives to avoid associating with misbehaving network participants. Nodes exercise discretion through their policies for offering or accepting introductions. We empirically demonstrate the robustness of IBRP against different attack scenarios. We also use empirical game-theoretic techniques to assess the strategic stability of compliant policies, and find preliminary evidence that IBRP encourages the adoption of policies that limit damage from misbehaving nodes. We argue that IBRP scales to Internet-sized networks, and can be deployed as an overlay on the current Internet, requiring no modifications to applications, operating systems or core network services, thus minimizing cost of adoption.

This research was supported by the Air Force Research Laboratory (AFRL).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: Workshop on New Security Paradigms, Langdale, UK, pp. 48–60 (1997)

    Google Scholar 

  2. Blaze, M., Ioannidis, J., Keromytis, A.D.: Trust management for IPsec. ACM Transactions on Information and System Security 5(2), 95–118 (2002)

    Article  Google Scholar 

  3. Buchegger, S., Le Boudec, J.Y.: Performance analysis of the CONFIDANT protocol. In: Third International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, pp. 226–236 (2002)

    Google Scholar 

  4. Cornelli, F., Damiani, E., di Vimercati, S.D.C., Paraboschi, S., Samarati, P.: Choosing reputable servents in a P2P network. In: Eleventh International World Wide Web Conference, Honolulu, pp. 376–386 2002)

    Google Scholar 

  5. Duong, Q., LeFevre, K., Wellman, M.P.: Strategic modeling of information sharing among data privacy attackers. Informatica 34, 151–158 (2010)

    MATH  Google Scholar 

  6. Friedman, E.J., Resnick, P.: The social cost of cheap pseudonyms. Journal of Economics and Management Strategy 10(2), 173–199 (2001)

    Article  Google Scholar 

  7. Friedman, E., Resnick, P., Sami, R.: Manipulation-resistant reputation systems. In: Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V. (eds.) Algorithmic Game Theory, pp. 677–697. Cambridge University Press, Cambridge (2007)

    Chapter  Google Scholar 

  8. Golbeck, J.A.: Computing and applying trust in web-based social networks. Ph.D. thesis. University of Maryland (2005)

    Google Scholar 

  9. Grossklags, J., Christin, N., Chuang, J.: Secure or insure?: A game-theoretic analysis of information security games. In: Seventeenth International Conference on World Wide Web, Beijing, pp. 209–218 (2008)

    Google Scholar 

  10. Jain, M., Pita, J., Tambe, M., Ordóñez, F., Parachuri, P., Kraus, S.: Bayesian Stackelberg games and their application for security at Los Angeles International Airport. SigEcom Exchanges 7(2), 1–3 (2008)

    Article  Google Scholar 

  11. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  12. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Twelfth International Conference on World Wide Web, Budapest, pp. 640–651(2003)

    Google Scholar 

  13. Lagesse, B., Kumar, M., Wright, M.: AREX: An adaptive system for secure resource access in mobile P2P systems. In: Peer-to-Peer Computing 2008, pp. 43–52 (2008)

    Google Scholar 

  14. Laskowski, P., Chuang, J.: Network monitors and contracting systems: Competition and innovation. ACM SIGCOMM Computer Communication Review 36(4), 194 (2006)

    Article  Google Scholar 

  15. Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: Seventh USENIX Security Symposium, San Antonio, TX, pp. 229–242 (1998)

    Google Scholar 

  16. Levine, J.: DNS Blacklists and Whitelists. RFC 5782 (Informational) (February 2010), http://www.ietf.org/rfc/rfc5782.txt

  17. Maurer, U.M.: Modelling a public-key infrastructure. In: Bertino, E. (ed.) ESORICS 1996. LNCS, vol. 1146, pp. 325–350. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  18. Mendes, S., Huitema, C.: A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model. In: IEEE Symposium on Network and Distributed System Security, pp. 172–189 (1995)

    Google Scholar 

  19. Pease, M., Shostak, R., Lamport, L.: Reaching agreement in the presence of faults. Journal of the ACM 27, 228–234 (1980)

    Article  MathSciNet  MATH  Google Scholar 

  20. Reiter, M.K., Stubblebine, S.G.: Authentication metric analysis and design. ACM Transactions on Information System Security 2, 138–158 (1999)

    Article  Google Scholar 

  21. Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  22. Ruohomaa, S., Kutvonen, L.: Trust management survey. In: Third International Conference on Trust Management, Rocquencourt, France, pp. 77–92 (2005)

    Google Scholar 

  23. Srivastava, V., Neel, J., Mackenzie, A.B., Menon, R., DaSilva, L.A., Hicks, J.E., Reed, J.H., Gilles, R.P.: Using game theory to analyze wireless ad hoc networks. IEEE Communications Surveys and Tutorials 7(4), 46–56 (2005)

    Article  Google Scholar 

  24. Srivatsa, M., Xiong, L., Liu, L.: Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks. In: Fourteenth International Conference on World Wide Web, pp. 422–431 (2005)

    Google Scholar 

  25. Sun, Y., Han, Z., Liu, K.: Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine 46(2), 112–119 (2008)

    Article  Google Scholar 

  26. Tarah, A., Huitema, C.: Associating metrics to certification paths. In: Second European Symposium on Research in Computer Security, pp. 175–189 (1992)

    Google Scholar 

  27. Wellman, M.P.: Methods for empirical game-theoretic analysis (extended abstract). In: Twenty-First National Conference on Artificial Intelligence, Boston, pp. 1552–1555 (2006)

    Google Scholar 

  28. Wellman, M.P., Osepayshvili, A., MacKie-Mason, J.K., Reeves, D.M.: Bidding strategies for simultaneous ascending auctions. Berkeley Electronic Journal of Theoretical Economics (Topics) 8(1) (2008)

    Google Scholar 

  29. Wong, E.L., Balasubramanian, P., Alvisi, L., Gouda, M.G., Shmatiko, V.: Truth in advertising: Lightweight verification of route integrity. In: Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, Portland, OR, pp. 156–165 (2007)

    Google Scholar 

  30. Xiong, L., Liu, L.: Building trust in decentralized peer-to-peer electronic communities. In: International Conference on Electronic Commerce Research (2002)

    Google Scholar 

  31. Xu, J., Lee, W.: Sustaining availability of web services under distributed denial of service attacks. IEEE Transactions on Computers 52, 195–208 (2003)

    Article  Google Scholar 

  32. Zimmermann, P.R.: The Official PGP User’s Guide. MIT Press, Cambridge (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Frazier, G., Duong, Q., Wellman, M.P., Petersen, E. (2011). Incentivizing Responsible Networking via Introduction-Based Routing. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, AR., Sasse, A., Beres, Y. (eds) Trust and Trustworthy Computing. Trust 2011. Lecture Notes in Computer Science, vol 6740. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21599-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21599-5_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21598-8

  • Online ISBN: 978-3-642-21599-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics