|
|
A Trust Model for Identifying and Tracing Malicious Anonymous Feedback Providers |
ZHANG Keli1,LI Zhongxian1,2,YANG Yixian1 |
(1.Information Security Center, Beijing University of Posts and Telecommunications, Beijing 1000876, China; 2. National Cybernet Security Co. Ltd., Beijing 100088, China) |
|
|
Abstract In reputation systems, the anonymous evaluation mechanisms introduced for preserving privacy of honest feedback providers brings about the difficulty in identifying slandering, ballot stuffing and Sybil attacks. A trust model which protects honest feedback providers and identifies and traces the malicious peer was proposed in this paper to deal with this problem. Peers in this trust model use a verifiable random function to generate tags, so as to anonymously evaluate the transaction objects and hide the true identity of the transaction process. In this model, the Bayesian filtering algorithm was introduced to identify malicious tags; when the tags exceed the threshold malicious number, the trust model can automatically expose true identities and track all of the providing feedbacks based on the verifiable secret sharing mechanism. The simulation results show that the proposed trust model can efficiently resist attacks of anonymous malicious peers and evidently improve the accuracy of trust accumulated value compared with two existing trust models.
|
Received: 09 October 2013
Published: 28 July 2014
|
|
|
|
|
[1] |
YANG Bin,LU Yuliang,YANG Guozheng,ZHU Kailong. An Artificial Immune Network Classification Algorithm Based on VirtualForce Direction and Cell Differentiation[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2017, 51(1): 98-. |
[2] |
WEN Zhicheng1,2,CHEN Zhigang1,DENG Xiaoheng1,LIU Anfeng1. Network Security Situation Awareness Method Based on Multi-Source and Multi-Level Information Fusion[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2015, 49(08): 1144-1152. |
[3] |
XU Bo,MIN Huaqing,XIAO Fangxiong. Ant Colony Algorithm for Solving Discrete Minimum Constraint Removal (MCR) Problem[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2015, 49(03): 383-386. |
[4] |
WANG Xin1,JIA Qingxuan1,GAO Xin1,CHEN Gang1,ZHAO Bing2. Adaptive N Tree Anti-Collision Algorithm Based on Bitmap Construction[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2015, 49(02): 150-157. |
[5] |
ZHANG Ying,JI Changgang,LI Junfu. A Routing Algorithm Based on Energy and Distance for Heterogeneous Sensor Networks with Multilevel Energies[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2014, 48(07): 953-958. |
[6] |
CHEN Jianhong1,2,SHAN Jingsong1,YANG Ronggen1,GONG Lejun1,CHEN Kefei 2,YU Kun1,CHEN Liqing1,SUN Chengfu1. Identity-based Threshold Key-insulated Signature Without Random Oracles
[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(08): 1239-1245. |
[7] |
XIE Jing, LIU Gong-Shen, SU Bo, MENG Kui. Prediction of User’s Retweet Behavior in Social Network[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(04): 583-588. |
[8] |
LIU Chen-Yan-1, 2 , PAN Li-1, 2 , ZI Xiao-Chao-2. A Binary-String-Set-Based Algebraic Framework for Policy Composition[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(04): 579-583. |
[9] |
QIAO Yu-Ran, WU Nan, YANG Qian-Ming, WEN Mei, ZHANG Chun-Yuan. Deadlock Detection and Recovery Based on Topological Order for NoC[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(01): 92-97. |
[10] |
CHEN Gui-Rong-1, 2 , CAI Wan-Dong-1, XU Hui-Jie-1, YAN Pei-Xiang-3, WANG Jian-Ping-1. High-Effect Priority Bounded Confidence Model for Network Opinion Evolution[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(01): 155-160. |
[11] |
FANG Ming-1, CHEN Song-Qiao-1, WANG Ke-Fei-2. High Radix Router Design Based on Asymmetric Crossbar[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2013, 47(01): 138-143. |
[12] |
ZHOU Gui-Yin, HE Chen, JIANG Ling-Ge. Single Transceiver and Network Characteristics Based
MAC Protocol for Cognitive Radio Wireless Sensor Networks[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(11): 1729-1735. |
[13] |
XIAO Rong, JIANG Ling-Ge, HE Chen. A Channel Reliability Based Multi-channel MAC Protocol in Wireless Sensor Networks[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(09): 1382-1386. |
[14] |
LIU Su-Na-1, 2 , PAN Li-1, 2 , 3 , YAO Li-Hong-2. BLP Based Access Control Mechanism in Multi-level Network Systems[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(09): 1387-1391. |
[15] |
ZHENG Bo-1, 2 , ZHANG Heng-Yang-1, SUN Peng-1, HUANG Guo-Ce-1. Connectivity on One-and Two-Way Flight Routes in Aeronautical Ad hoc Networks[J]. J. Shanghai Jiaotong Univ.(Sci.) , 2012, 46(04): 624-629. |
|
|
|
|