Trust-based Collection of Information in Distributed Reputation Networks

被引:2
|
作者
Gkorou, Dimitra [1 ]
Pouwelse, Johan [1 ]
Epema, Dick [1 ]
机构
[1] EEMCS, Parallel & Distributed Syst, Mekelweg 4, NL-2628 CD Delft, Netherlands
关键词
D O I
10.1145/2695664.2695868
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Distributed reputation systems establish trust among strangers in online communities and provide incentives for users to contribute. In these systems, each user monitors the interactions of others and computes the reputations accordingly. Collecting information for computing the reputations is challenging for the users due to their vulnerability to attacks, their limited resources, and the burst of their interactions. The low cost of creating accounts in most reputation systems makes them popular to million of users, but also enables malicious users to boost their reputations by performing Sybil attacks. Furthermore, the burst of user interactions causes an information overload. To avoid the impact of malicious users and information overload, we propose EscapeLimit, a sybil attack-resistant, computationally simple, and fully distributed method for information collection. EscapeLimit leverages user interactions as indicators of trust and similarity between the corresponding users, and collects relevant and trusted information by limiting the escape probability into the Sybil area. We evaluate it by emulating interaction patterns derived from synthetic and real-world networks. Our evaluation shows EscapeLimit's effectiveness in terms of its resilience to Sybil attacks, its scalability, and its ability to provide relevant information to each user.
引用
收藏
页码:2312 / 2319
页数:8
相关论文
共 50 条
  • [31] A trust-based model for information integrity in open systems
    Zuo, YJ
    Panda, B
    [J]. Security Management, Integrity, and Internal Control in Information Systems, 2005, 193 : 337 - 354
  • [32] Trust-based information system architecture for personal wellness
    Ruotsalainen, Pekka
    Nykanen, Pirkko
    Seppala, Antto
    Blobel, Bernd
    [J]. E-HEALTH - FOR CONTINUITY OF CARE, 2014, 205 : 136 - 140
  • [33] Trust-based Relay Selection in Relay-based Networks
    Wu, Di
    Zhu, Gang
    Zhu, Li
    Ai, Bo
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (10): : 2587 - 2600
  • [34] A trust-based geographical routing scheme in sensor networks
    Hung, Ka-Shun
    Lui, King-Shan
    Kwok, Yu-Kwong
    [J]. 2007 IEEE WIRELESS COMMUNICATIONS & NETWORKING CONFERENCE, VOLS 1-9, 2007, : 3125 - 3129
  • [35] Trust-based LEACH Protocol for Wireless Sensor Networks
    Song, Fei
    Zhao, Baohua
    [J]. FGCN: PROCEEDINGS OF THE 2008 SECOND INTERNATIONAL CONFERENCE ON FUTURE GENERATION COMMUNICATION AND NETWORKING, VOLS 1 AND 2, 2008, : 200 - 205
  • [36] Trust-Based Protocol for Securing Routing in Opportunistic Networks
    Wu, Xiaojun
    Xiao, Jiakai
    Shao, Jianbo
    [J]. 2017 13TH IEEE CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING (CASE), 2017, : 434 - 439
  • [37] Trust-based fast authentication for multiowner wireless networks
    Hassan, Jahan
    Sirisena, Harsha
    Landfeldt, Bjoern
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2008, 7 (02) : 247 - 261
  • [38] Trust-based distributed authentication middleware in ubiquitous mobile environments
    Zhang, Mingwu
    Zhu, Shengmi
    Yang, Bo
    Zhang, Wenzheng
    [J]. ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 5, PROCEEDINGS, 2007, : 814 - +
  • [39] Trust-based Anonymity Framework for Wireless Mesh Networks
    Siddiqui, Muhammad Shoaib
    Shaikh, Riaz Ahmed
    Hong, Choong Seon
    [J]. 11TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS I-III, PROCEEDINGS,: UBIQUITOUS ICT CONVERGENCE MAKES LIFE BETTER!, 2009, : 1638 - 1642
  • [40] A trust-based routing protocol for ad hoc networks
    Xue, XY
    Leneutre, J
    Ben-Othman, J
    [J]. MOBILE AND WIRELESS COMMUNICATION NETWORKS, 2005, 162 : 251 - 262