H-trust: a group trust management system for pee-to-peer desktop grid
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
Dishonest behaviors in online rating systems: cyber competition, attack models, and attack generator
Journal of Computer Science and Technology - Special section on trust and reputation management in future computing systmes and applications
SensorTrust: A resilient trust model for wireless sensing systems
Pervasive and Mobile Computing
VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks
The Journal of Supercomputing
Hi-index | 0.00 |
The effectiveness of reputation-based trust management fundamentally relies on the assumption that an entity’s future behavior may be predicted based on its past behavior. Though many reputation-based trust schemes have been proposed, they can often be easily exploited, as an attackermay adapt its behavior and make the above assumption invalid. In this paper, we build a statistic model for honest entities in decentralized systems, which serves as a profiling tool to identify suspicious entities. It can be combined with existing trust schemes to ensure that they are applied to entities whose transaction records are consistent with thestatistic model. This approach limits the manipulation capability of adversaries, and thus can greatly improve the quality of reputation-based trust assessment.