Attacks on trust evaluation in distributed networks

被引:48
|
作者
Sun, Yan Lindsay [1 ]
Han, Zhu [2 ]
Yu, Wei [2 ]
Liu, K. J. Ray [2 ]
机构
[1] Univ Rhode Isl, Dept Elect & Comp Engn, Kingston, RI 02881 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
10.1109/CISS.2006.286695
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Evaluation of trustworthiness of participating entities is an effective method to stimulate collaboration and improve network security in distributed networks. Similar to other security related protocols, trust evaluation is an attractive target for adversaries. Currently, the vulnerabilities of trust evaluation system have not been well understood. In this paper, we present several attacks that can undermine the accuracy of trust evaluation, and then develop defense techniques. Based on our investigation on attacks and defense, we implement a trust evaluation system in ad hoc networks for securing ad hoc routing and assisting malicious node detection. Extensive simulations are performed to illustrate various attacks, the effectiveness of the proposed defense techniques, and the overall performance of the trust evaluation system.
引用
收藏
页码:1461 / 1466
页数:6
相关论文
共 50 条
  • [1] A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
    Sun, Yan Lindsay
    Han, Zhu
    Yu, Wei
    Liu, K. J. Ray
    [J]. 25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 810 - +
  • [2] A Distributed Algorithm for Personalized Trust Evaluation in Social Networks
    Carchiolo, V.
    Longheu, A.
    Malgeri, M.
    Mangioni, G.
    [J]. INTELLIGENT DISTRIBUTED COMPUTING IV, 2010, 315 : 99 - 108
  • [3] Securing Cognitive Radio Networks with Distributed Trust Management against Belief Manipulation Attacks
    Ding, Lei
    Savas, Onur
    Ahn, Gahng-Seop
    Deng, Hongmei
    [J]. 2015 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2015,
  • [4] A Distributed Trust Evaluation Model for Wireless Mobile Sensor Networks
    Meghanathan, Natarajan
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 186 - 191
  • [5] CETEF: A Comprehensive and Efficient Trust Evaluation Framework for Distributed Networks
    Zhang, Juanjuan
    Li, Jinglin
    Sun, Qibo
    Zhou, Ao
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (07): : 2176 - 2185
  • [6] A Trust Assessment-Based Distributed Localization Algorithm for Sensor Networks Under Deception Attacks
    Ya Wang
    Xinming Chen
    Lei Shi
    Yuhua Cheng
    Houjun Wang
    [J]. IEEE/CAA Journal of Automatica Sinica, 2022, (10) : 1879 - 1882
  • [7] A Trust Assessment-Based Distributed Localization Algorithm for Sensor Networks Under Deception Attacks
    Wang, Ya
    Chen, Xinming
    Shi, Lei
    Cheng, Yuhua
    Wang, Houjun
    [J]. IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2022, 9 (10) : 1879 - 1882
  • [8] Privacy and trust in distributed networks
    Rössler, T
    Hollosi, A
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2003, 2828 : 117 - 131
  • [9] True: A trust evaluation service for mobile ad hoc networks resistant to malicious attacks
    Da Silva, Eduardo
    Misaghi, Mehran
    Albini, Luiz Carlos P.
    [J]. Journal of Digital Information Management, 2012, 10 (04): : 262 - 271
  • [10] Trust-based Cooperative Spectrum Sensing Against SSDF Attacks in Distributed Cognitive Radio Networks
    Wang, Ji
    Chen, Ing-Ray
    Tsai, Jeffrey J. P.
    Wang, Ding-Chau
    [J]. 2016 IEEE INTERNATIONAL WORKSHOP TECHNICAL COMMITTEE ON COMMUNICATIONS QUALITY AND RELIABILITY (CQR), 2016, : 13 - 18