Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
Proceedings of the 2nd ACM conference on Electronic commerce
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities
IEEE Transactions on Knowledge and Data Engineering
Data Mining: Concepts and Techniques
Data Mining: Concepts and Techniques
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
An Entropy-Based Approach to Protecting Rating Systems from Unfair Testimonies
IEICE - Transactions on Information and Systems
A survey of trust and reputation systems for online service provision
Decision Support Systems
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing
IEEE Transactions on Parallel and Distributed Systems
Agent-based Trust Model in Wireless Sensor Networks
SNPD '07 Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 03
Analysis of ratings on trust inference in open environments
Performance Evaluation
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Security in Mobile Ad Hoc Networks
IEEE Security and Privacy
A survey of attack and defense techniques for reputation systems
ACM Computing Surveys (CSUR)
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
A survey of security issues in mobile ad hoc and sensor networks
IEEE Communications Surveys & Tutorials
Defense of trust management vulnerabilities in distributed networks
IEEE Communications Magazine
Hi-index | 0.00 |
Reputation models play an important role in defending Ad-hoc networks, such as securing routing and data forwarding protocols, against insider attacks. However, the performance of reputation models could be easily compromised by various dishonest recommendation attacks, i.e., slandering, self-promoting and collusion. Mitigating the influence of dishonest recommendation remains an important and challenging issue in Ad-hoc networks, especially when the dishonest recommendations are in the majority. In this paper, we propose a simple, novel and effective recommendation verifying scheme (RecommVerifier) to deal with dishonest recommendation. In RecommVerifier, tackling dishonest recommendation problem is modeled as the trials in reputation management court. Then three collaborated parts including deviation detection, time verifying and proof verifying, are proposed to protect reputation model from not only individual dishonest recommendation attacks but also collective ones. The novelty of our proposal is that it does not merely depend on majority rule but introduces time verifying mechanism to reduce the false positives and false negatives caused by deviation detection. Furthermore, proof verifying mechanism, which works at the side of evaluated node, is proposed to verify whether the recommenders are honest with certainty. Experimental results show that the proposed scheme is both effective and lightweight in alleviating the influence of different types of dishonest recommendation attacks.