Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
The Eigentrust algorithm for reputation management in P2P networks
WWW '03 Proceedings of the 12th international conference on World Wide Web
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Identity Crisis: Anonymity vs. Reputation in P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Trusted P2P Transactions with Fuzzy Reputation Aggregation
IEEE Internet Computing
A survey of trust and reputation systems for online service provision
Decision Support Systems
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
SuperTrust: a secure and efficient framework for handling trust in super-peer networks
Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
A survey of autonomic computing—degrees, models, and applications
ACM Computing Surveys (CSUR)
Reputation Systems for Anonymous Networks
PETS '08 Proceedings of the 8th international symposium on Privacy Enhancing Technologies
Sybil proof anonymous reputation management
Proceedings of the 4th international conference on Security and privacy in communication netowrks
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
A verifiable, centralized, coercion-free reputation system
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Two improved partially blind signature schemes from bilinear pairings
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
FC'10 Proceedings of the 14th international conference on Financial Cryptography and Data Security
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Reputation systems play a vital role in constructing mutual trust relationships between different entities in autonomic computing networks by enforcing them to act as prescribed protocols or specifications. They can be, however, subverted and abused if the association rules between an entity's identity and its reputation is exploited. While various anonymizating techniques can be used to prevent that, the extent of anonymity is extremely hard to be determined at an appropriate level, potentially allowing sophisticated attackers to correlate a party with its reputation. To manifest and further gain insights into such vulnerabilities, we systematically decompose the reputation system into four components from a functional perspective and use a set of performance metrics to examine them. Specifically, a new attack taxonomy is given, and a simple scheme termed STARS, which is transparent to particular reputation systems, is proposed for achieving both anonymity and traceability. We finally discuss implementation issues and validate performance through case studies, comparative analysis, and simulations.