TY - GEN
T1 - An adaptive spreading activation approach to combating the front-peer attack in trust and reputation system
AU - Wang, Yufeng
AU - Hori, Yoshiaki
AU - Sakurai, Kouichi
PY - 2007
Y1 - 2007
N2 - It is argued that group-based trust metric is effective in resisting attacks, which evaluates groups of assertions "in tandem", and generally computes trust ranks for sets of individuals according to peers' social position in trust network. Thus, the group-based trust value should be called "reputation rank". But, unfortunately, most group-based trust metrics are vulnerable to the attack of front peers, which represent these malicious colluding peers always cooperate with others in order to increase their reputation, and then provide misinformation to promote actively malicious peers. In this paper, we proposed adaptive spreading activation approach to mitigating the effect of front peer attack, in which adaptive spreading factor is used to reflect the peer's recommendation ability according to behaviors of the peer's direct/indirect children in trust network; Simulation results show that the adaptive spreading activation approach can identify and mitigate the attack of front peer.
AB - It is argued that group-based trust metric is effective in resisting attacks, which evaluates groups of assertions "in tandem", and generally computes trust ranks for sets of individuals according to peers' social position in trust network. Thus, the group-based trust value should be called "reputation rank". But, unfortunately, most group-based trust metrics are vulnerable to the attack of front peers, which represent these malicious colluding peers always cooperate with others in order to increase their reputation, and then provide misinformation to promote actively malicious peers. In this paper, we proposed adaptive spreading activation approach to mitigating the effect of front peer attack, in which adaptive spreading factor is used to reflect the peer's recommendation ability according to behaviors of the peer's direct/indirect children in trust network; Simulation results show that the adaptive spreading activation approach can identify and mitigate the attack of front peer.
UR - http://www.scopus.com/inward/record.url?scp=38049023969&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38049023969&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-73547-2_26
DO - 10.1007/978-3-540-73547-2_26
M3 - Conference contribution
AN - SCOPUS:38049023969
SN - 9783540735465
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 249
EP - 258
BT - Autonomic and Trusted Computing - 4th International Conference, ATC 2007, Proceedings
PB - Springer Verlag
T2 - 4th International Conference on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality, ATC 2007
Y2 - 11 July 2007 through 13 July 2011
ER -