A Robust Reputation Scheme for Decentralized Group Management Systems

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5352)


In the literature, reputation systems are used to evaluate other entities behavior and have many applications such as, for instance, the detection of malicious entities. The associated models are based on mathematic formulae, in order to formaly define elements such as the reputation evaluation and evolution and the reputation propagation between peers. Current proposals describe the behaviors of their models by examples, with few (if not no) formal analyses. In this article, we state the basic security properties such systems require and we show that current systems may not satisfy them on specific scenarios, which can be used by malicious entities to take advantage of the system. We also present a new reputation scheme, designed to satisfy these properties, and we compare it to existing research works.


Malicious Node Security Property Reputation System Malicious Behavior Reputation Mechanism 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Liu, J., Issarny, V.: Enhanced reputation mechanism for mobile ad hoc networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  2. 2.
    Conrad, M., French, T., Huang, W., Maple, C.: A lightweight model of trust propagation in a multi-client network environment: To what extent does experience matter? In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security (ARES 2006), pp. 482–487. IEEE Computer Society, Washington (2006)Google Scholar
  3. 3.
    Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: WWW 2004: Proceedings of the 13th international conference on World Wide Web, pp. 403–412. ACM Press, New York (2004)Google Scholar
  4. 4.
    Wong, C.K., Gouda, M.G., Lam, S.S.: Secure group communications using key graphs. In: Proceedings of the ACM SIGCOMM 1998 conference on Applications, technologies, architectures, and protocols for computer communication, pp. 68–79 (1998)Google Scholar
  5. 5.
    Sherman, A.T., McGrew, D.A.: Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering 29(5), 444–458 (2003)CrossRefGoogle Scholar
  6. 6.
    Cuppens, F., Cuppens-Boulahia, N., Thomas, J.A.: STGDH: An enhanced group management protocol. In: Proceedings of the CRISIS Conference, Marocco, Marrakech (July 2007)Google Scholar
  7. 7.
    Fall, K., Varadhan, K.: The ns Manual,
  8. 8.
    Anantyalee, T., Wu, J.: Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In: IEEE ICC, June 24–28 (2007)Google Scholar
  9. 9.
    Carbone, M., Nielsen, M., Sassone, V.: A formal model for trust in dynamic networks. In: Cerone, A., Lindsay, P. (eds.) Proceedings of Int. Conf. on Software Engineering and Formal Methods, SEFM 2003, pp. 54–61. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  10. 10.
    Cuppens, F., Cuppens-Boulahia, N., Thomas, J.A.: Malevolence detection and reactions in ad hoc networks. Technical report (June 2007)Google Scholar
  11. 11.
    Dembe, A.E., Boden, L.I.: The story of the moral. In: New Solutions, pp. 257–279 (2002)Google Scholar
  12. 12.
    Ba, S., Pavlou, P.A.: Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly 26(3) (2002)Google Scholar
  13. 13.
    Ros, F.J., Ruiz, P.M.: Implementing a New Manet Unicast Routing Protocol in NS2. Technical report, Dept. of Information and Communications Engineering University of Murcia (December 2004)Google Scholar
  14. 14.
    Cuppens, F., Cuppens-Boulahia, N., Ramard, T., Thomas, J.A.: Misbehaviors detection to ensure availability in olsr. In: Zhang, H., Olariu, S., Cao, J., Johnson, D.B. (eds.) MSN 2007. LNCS, vol. 4864, pp. 799–813. Springer, Heidelberg (2007)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  1. 1.IT/TELECOM Bretagne, SERES team, 2 rue de la Châtaigneraie, CS 17607, 35576 Cesson Sévigné CedexFrance

Personalised recommendations