A Robust Reputation Scheme for Decentralized Group Management Systems
- 1.5k Downloads
In the literature, reputation systems are used to evaluate other entities behavior and have many applications such as, for instance, the detection of malicious entities. The associated models are based on mathematic formulae, in order to formaly define elements such as the reputation evaluation and evolution and the reputation propagation between peers. Current proposals describe the behaviors of their models by examples, with few (if not no) formal analyses. In this article, we state the basic security properties such systems require and we show that current systems may not satisfy them on specific scenarios, which can be used by malicious entities to take advantage of the system. We also present a new reputation scheme, designed to satisfy these properties, and we compare it to existing research works.
KeywordsMalicious Node Security Property Reputation System Malicious Behavior Reputation Mechanism
Unable to display preview. Download preview PDF.
- 2.Conrad, M., French, T., Huang, W., Maple, C.: A lightweight model of trust propagation in a multi-client network environment: To what extent does experience matter? In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security (ARES 2006), pp. 482–487. IEEE Computer Society, Washington (2006)Google Scholar
- 3.Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: WWW 2004: Proceedings of the 13th international conference on World Wide Web, pp. 403–412. ACM Press, New York (2004)Google Scholar
- 4.Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. In: Proceedings of the ACM SIGCOMM 1998 conference on Applications, technologies, architectures, and protocols for computer communication, pp. 68–79 (1998)Google Scholar
- 6.Cuppens, F., Cuppens-Boulahia, N., Thomas, J.A.: STGDH: An enhanced group management protocol. In: Proceedings of the CRISIS Conference, Marocco, Marrakech (July 2007)Google Scholar
- 7.Fall, K., Varadhan, K.: The ns Manual, http://www.isi.edu/nsnam/ns/doc/
- 8.Anantyalee, T., Wu, J.: Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In: IEEE ICC, June 24–28 (2007)Google Scholar
- 9.Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: Cerone, A., Lindsay, P. (eds.) Proceedings of Int. Conf. on Software Engineering and Formal Methods, SEFM 2003, pp. 54–61. IEEE Computer Society, Los Alamitos (2003)Google Scholar
- 10.Cuppens, F., Cuppens-Boulahia, N., Thomas, J.A.: Malevolence detection and reactions in ad hoc networks. Technical report (June 2007)Google Scholar
- 11.Dembe, A.E., Boden, L.I.: The story of the moral. In: New Solutions, pp. 257–279 (2002)Google Scholar
- 12.Ba, S., Pavlou, P.A.: Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly 26(3) (2002)Google Scholar
- 13.Ros, F.J., Ruiz, P.M.: Implementing a New Manet Unicast Routing Protocol in NS2. Technical report, Dept. of Information and Communications Engineering University of Murcia (December 2004)Google Scholar