Outline

  • Abstract
  • Keywords
  • 1. Introduction
  • 2. Trust and Reputation Management
  • 3. Security Threats
  • 3.1. Individual Malicious Peers
  • 3.2. Malicious Collectives
  • 3.3. Malicious Collectives with Camouflage
  • 3.4. Malicious Spies
  • 3.5. Sybil Attack
  • 3.6. Man in the Middle Attack
  • 3.7. Driving Down the Reputation of a Reliable Peer
  • 3.8. Partially Malicious Collectives
  • 3.9. Malicious Pre-Trusted Peers
  • 4. Security Threats Taxonomy
  • 5. Dealing with Main Security Threats in Major Trust and Reputation Models
  • 5.1. Eigentrust
  • 5.1.1. Brief Introduction
  • 5.1.2. Security Analysis
  • 5.2. Peertrust
  • 5.2.1. Brief Introduction
  • 5.2.2. Security Analysis
  • 5.3. Btrm-Wsn
  • 5.3.1. Brief Introduction
  • 5.3.2. Security Analysis
  • 5.4. Powertrust
  • 5.4.1. Brief Introduction
  • 5.4.2. Security Analysis
  • 5.5. Tackling Summary
  • 6. Conclusions and Future Work
  • Acknowledgements
  • References

رئوس مطالب

  • چکیده
  • 1. مقدمه
  • 2. مدیریت اعتماد و اعتبار
  • 3. تهدیدهای امنیتی
  • 3.1. اعضاء مخرب فردی
  • 3.2. مجموعه های مخرب
  • 3.3 مجموعه های مخرب دارای استتار
  • 3.4. جاسوسهای مخرب
  • 3.5 . حمله سیبل
  • 3.6.حمله مرد میانی
  • 3.7. پایین آوردن اعتبار یک عضو قابل اطمینان
  • 3.8. مجموعه های نسبتا مخرب
  • 3.9. اعضای مخرب از پیش مورد اعتماد
  • 4. طبقه بندی تهدیدهای امنیتی
  • 5. طرز برخورد با بیشتر تهدیدهای امنیتی مهم در مدلهای اعتماد و اعتبار مهم
  • 5.1. ایگن تراست
  • 5.1.1. یک مقدمه مختصر
  • 5.1.2. تجزیه و تحلیل امنیت
  • 5.2. پیر تراست
  • 5.2.1. یک مقدمه مختصر
  • 5.2.2: تجزیه و تحلیل امنیتی
  • 5.3. BTRM-WSN
  • 5.3.1 . یک مقدمه مختصر
  • 5.3.2. تجزیه و تحلیل امنیتی
  • 5.4. پاور تراست
  • 5.4.1. یک مقدمه مختصر
  • 5.4.2.: تجزیه و تحلیل امنیتی
  • 5.5. خلاصه ای از مقابله ها
  • 6. . نتیجه گیریها و کارهای آینده

Abstract

Trust and reputation management over distributed systems has been proposed in the last few years as a novel and accurate way of dealing with some security deficiencies which are inherent to those environments. Thus, many models and theories have been developed in order to effective and accurately manage trust and reputation in those communities. Nevertheless, very few of them take into consideration all the possible security threats that can compromise the system. In this paper, we present some of the most important and critical security threats that could be applied in a trust and reputation scheme. We will describe and analyze each of those threats and propose some recommendations to face them when developing a new trust and reputation mechanism. We will also study how some trust and reputation models solve them. This work expects to be a reference guide when designing secure trust and reputation models.

Keywords: - - - -

Conclusions and future work

Trust and reputation management over distributed and heterogeneous systems has emerged in the last few years as a novel and accurate way of dealing with some security risks related to these environments.

Nevertheless, the application of such mechanisms involves the arising of new specific and related threats that should not be underestimated. As far as we know, this is one of the first works mainly focused on describing such threats and proposing solutions to overcome them.

In this paper, we have analyzed the main security threats that can be applied in most of trust and reputation schemes. Moreover, we have discussed them and suggested a possible way of tackling each one of those risks in the design phase. A complete taxonomy of those threats or attacks has been developed as well, describing several possible dimensions of an attack over trust and reputation systems, and categorizing the exposed threats according to these dimensions or properties.

Additionally, we have presented some representative trust and reputation models and shown how they deal with those threats that can be applied to them, revealing that not all the threats are paid the same attention and none of them is categorically solved.

As for future work, we consider that an implementation and comparison of several of the most representative trust and reputation models, in terms of their response against some of the threats presented in this paper could be an interesting research line. In that way, we will focus on the development of a validation tool allowing researchers to perform such tests.

Finally, we hope this work helps to the development of this research field by constituting a guide for new trust and reputation model designers.

دانلود ترجمه تخصصی این مقاله دانلود رایگان فایل pdf انگلیسی