An attack-Resistant trust management model on three attacks of Newcomer attack, On -off attack and unfair rating

سال انتشار: 1393
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 795

فایل این مقاله در 7 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICEEE06_341

تاریخ نمایه سازی: 1 مهر 1394

چکیده مقاله:

Communication in open communities and distributed systems has a dynamic nature and is shaped without a central institution. Therefore, using the traditional strategies of security like authentication and access control have faces challenges; and a new approach has been developed called soft security. The trust management systems can be considered the demonstrative examples of soft security-based systems. However, even a trust management system is vulnerable against attacks and malevolent behaviors.In this article, the three attacks namely Newcomer attack, On-off attack, unfair rating, and the collusion of malevolent agents which are among the most important attacks on a trust management system have been explained; and the given strategies in the previous tasks were represented. Then our trust management model is offered in which some security strategies to enhance the resistance of the system against these three attacks were applied. The results of the evaluation tests on the proposed model demonstrate the growing accuracy in trust estimation facing these attacks in comparison with the present models.

نویسندگان

Maryam Tavakoli

Imam Reza international university, Islamic Azad University, Mashhad Branch Mashhad, Iran

Hasan Shakeri

Imam Reza international university, Islamic Azad University, Mashhad Branch Mashhad, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • _ _ _ _ .e- pdf/0 7_S oftSecurity.pdf ...
  • Audun Jsang. (2009). Trust and Reputation Systems, Tutorial at University, ...
  • Grandison, T., & Sloman, M. (2000). A survey of trust ...
  • Ingram, D. (2005). An evidence based architecture for efficient, ...
  • Marmol, F. G., & Perez, G. M. (2009). Security threats ...
  • _ _ _ In Peer-to-peer ...
  • _ _ _ _ Journal ...
  • _ _ _ IEEE, 46(2), l12-119. ...
  • Yu, Y., Li, K., Zhou, W., & Li, P. (2012). ...
  • Melaye, D., & Demazeau, Y. (2005). Bayesian dynamic trust _ ...
  • _ 3 # 5 _ _ _ _ 13 14 ...
  • th Iranian Conference On Electrical and Electronics Engineering (ICEEE 2014) ...
  • Islamic Azad University Gonabad Branch August 19, 20, 21 - ...
  • environment. EURASIP Journal on Wireless C ommunicati ons and Networking, ...
  • Das, A., & Islam, M. M. (2012). Securedtrust: a dynamic ...
  • He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, ...
  • Wang, X., Liu, L, & Su, J. (2012). Rlm: A ...
  • Yang, Y., Feng, Q., Sun, Y. L., & Dai, Y. ...
  • Tian, C., & Yang, B. (2011). Trust, a reputation and ...
  • Theodorakop oulos, G., &c Baras, J. S. (2006). On trust ...
  • Teacy, W. L., Patel, J., Jennings, N. R., & Luck, ...
  • Khosravifar, B., Bentahar, J. Gomrokchi, M., & Alam, R (2012). ...
  • _ _ _ 12). A Confdece-Awar ...
  • _ _ _ _ _ _ _ Conference ...
  • نمایش کامل مراجع