Abstract
In the literature, reputation systems are used to evaluate other entities behavior and have many applications such as, for instance, the detection of malicious entities. The associated models are based on mathematic formulae, in order to formaly define elements such as the reputation evaluation and evolution and the reputation propagation between peers. Current proposals describe the behaviors of their models by examples, with few (if not no) formal analyses. In this article, we state the basic security properties such systems require and we show that current systems may not satisfy them on specific scenarios, which can be used by malicious entities to take advantage of the system. We also present a new reputation scheme, designed to satisfy these properties, and we compare it to existing research works.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Liu, J., Issarny, V.: Enhanced reputation mechanism for mobile ad hoc networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)
Conrad, M., French, T., Huang, W., Maple, C.: A lightweight model of trust propagation in a multi-client network environment: To what extent does experience matter? In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security (ARES 2006), pp. 482–487. IEEE Computer Society, Washington (2006)
Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: WWW 2004: Proceedings of the 13th international conference on World Wide Web, pp. 403–412. ACM Press, New York (2004)
Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. In: Proceedings of the ACM SIGCOMM 1998 conference on Applications, technologies, architectures, and protocols for computer communication, pp. 68–79 (1998)
Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering 29(5), 444–458 (2003)
Cuppens, F., Cuppens-Boulahia, N., Thomas, J.A.: STGDH: An enhanced group management protocol. In: Proceedings of the CRISIS Conference, Marocco, Marrakech (July 2007)
Fall, K., Varadhan, K.: The ns Manual, http://www.isi.edu/nsnam/ns/doc/
Anantyalee, T., Wu, J.: Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In: IEEE ICC, June 24–28 (2007)
Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: Cerone, A., Lindsay, P. (eds.) Proceedings of Int. Conf. on Software Engineering and Formal Methods, SEFM 2003, pp. 54–61. IEEE Computer Society, Los Alamitos (2003)
Cuppens, F., Cuppens-Boulahia, N., Thomas, J.A.: Malevolence detection and reactions in ad hoc networks. Technical report (June 2007)
Dembe, A.E., Boden, L.I.: The story of the moral. In: New Solutions, pp. 257–279 (2002)
Ba, S., Pavlou, P.A.: Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly 26(3) (2002)
Ros, F.J., Ruiz, P.M.: Implementing a New Manet Unicast Routing Protocol in NS2. Technical report, Dept. of Information and Communications Engineering University of Murcia (December 2004)
Cuppens, F., Cuppens-Boulahia, N., Ramard, T., Thomas, J.A.: Misbehaviors detection to ensure availability in olsr. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds.) MSN 2007. LNCS, vol. 4864, pp. 799–813. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cuppens, F., Cuppens-Boulahia, N., Thomas, J.A. (2008). A Robust Reputation Scheme for Decentralized Group Management Systems. In: Sekar, R., Pujari, A.K. (eds) Information Systems Security. ICISS 2008. Lecture Notes in Computer Science, vol 5352. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89862-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-540-89862-7_5
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89861-0
Online ISBN: 978-3-540-89862-7
eBook Packages: Computer ScienceComputer Science (R0)