Attacks on trust evaluation in distributed networks

被引:48
|
作者
Sun, Yan Lindsay [1 ]
Han, Zhu [2 ]
Yu, Wei [2 ]
Liu, K. J. Ray [2 ]
机构
[1] Univ Rhode Isl, Dept Elect & Comp Engn, Kingston, RI 02881 USA
[2] Univ Maryland, Dept Elect & Comp Engn, College Pk, MD 20742 USA
关键词
D O I
10.1109/CISS.2006.286695
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Evaluation of trustworthiness of participating entities is an effective method to stimulate collaboration and improve network security in distributed networks. Similar to other security related protocols, trust evaluation is an attractive target for adversaries. Currently, the vulnerabilities of trust evaluation system have not been well understood. In this paper, we present several attacks that can undermine the accuracy of trust evaluation, and then develop defense techniques. Based on our investigation on attacks and defense, we implement a trust evaluation system in ad hoc networks for securing ad hoc routing and assisting malicious node detection. Extensive simulations are performed to illustrate various attacks, the effectiveness of the proposed defense techniques, and the overall performance of the trust evaluation system.
引用
收藏
页码:1461 / 1466
页数:6
相关论文
共 50 条
  • [31] Distributed trust infrastructure and Trust-Security articulation: Application to heterogeneous networks
    Tchepnda, Christian
    Riguidel, Michel
    [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 33 - +
  • [32] NeighborTrust: A Trust-based Scheme for Countering Distributed Denial-of-Service Attacks in P2P Networks
    Gupta, Ankur
    Malhotra, Deepti
    Awasthi, Lalit K.
    [J]. PROCEEDINGS OF THE 2008 16TH INTERNATIONAL CONFERENCE ON NETWORKS, 2008, : 471 - +
  • [33] LFTM, linguistic fuzzy trust mechanism for distributed networks
    Marmol, Felix Gomez
    Marin-Blazquez, Javier G.
    Perez, Gregorio Martinez
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2012, 24 (17): : 2007 - 2027
  • [34] The complexity of fixed point models of trust in distributed networks
    Krukow, Karl
    Twigg, Andrew
    [J]. THEORETICAL COMPUTER SCIENCE, 2007, 389 (03) : 528 - 549
  • [35] An Efficient Distributed Trust Model for Wireless Sensor Networks
    Jiang, Jinfang
    Han, Guangjie
    Wang, Feng
    Shu, Lei
    Guizani, Mohsen
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2015, 26 (05) : 1228 - 1237
  • [36] Trust and Independence Aware Decision Fusion in Distributed Networks
    Wang, Xinlei
    Cho, Jin-Hee
    Chan, Kevin
    Chang, MoonJeong
    Swami, Ananthram
    Mohapatra, Prasant
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS), 2013, : 481 - 486
  • [37] Federated, secure trust networks for distributed healthcare IT services
    Weaver, AC
    Dwyer, SJ
    Snyder, AM
    Van Dyke, J
    Hu, J
    Chen, XH
    Mulholland, T
    Marshall, A
    [J]. INDIN 2003: IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, PROCEEDINGS, 2003, : 162 - 169
  • [38] A distributed trust mechanism for mobile ad hoc networks
    Sen, Jaydip
    Chowdhury, Piyah Roy
    Sengupta, Indranil
    [J]. 2006 INTERNATIONAL SYMPOSIUM ON AD HOC AND UBIQUITOUS COMPUTING, 2007, : 60 - +
  • [39] Trust Management for Distributed Decision Fusion in Sensor Networks
    Guan, Kyle
    Gharai, Ladan
    Delmie, Sintayehu
    Ghanadan, Reza
    Kumar, Srikanta
    [J]. FUSION: 2009 12TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2009, : 1933 - +
  • [40] Trust management problem in distributed wireless sensor networks
    Shaikh, Riaz Ahmed
    Jameel, Hassan
    Lee, Sungyoung
    Rajput, Saeed
    Song, Young Jae
    [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS, PROCEEDINGS, 2006, : 411 - 414