A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. Sun, Y. L., Han, Z., Yu, W., & Liu, K. J. R. 2006.
A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks. [link]Paper  doi  abstract   bibtex   
Evaluation of trustworthiness of participating entities is an effective method to stimulate collaboration and improve network security in distributed networks. Similar to other security related protocols, trust evaluation is an attractive target for adversaries. Currently, the vulnerabilities of trust evaluation system have not been well understood. In this paper, we present several attacks that can undermine the accuracy of trust evaluation, and then develop defense techniques. Based on our investigation on attacks and defense, we implement a trust evaluation system in ad hoc networks for securing ad hoc routing and assisting malicious node detection. Extensive simulations are performed to illustrate various attacks, the effectiveness of the proposed defense techniques, and the overall performance of the trust evaluation system.
@conference {conf/infocom/SunHYL06,
	title = {A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks.},
	booktitle = {INFOCOM},
	year = {2006},
	publisher = {IEEE},
	organization = {IEEE},
	abstract = {Evaluation of trustworthiness of participating entities is an effective method to stimulate collaboration and improve network security in distributed networks. Similar to other security related protocols, trust evaluation is an attractive target for adversaries. Currently, the vulnerabilities of trust evaluation system have not been well understood. In this paper, we present several attacks that can undermine the accuracy of trust evaluation, and then develop defense techniques. Based on our investigation on attacks and defense, we implement a trust evaluation system in ad hoc networks for securing ad hoc routing and assisting malicious node detection. Extensive simulations are performed to illustrate various attacks, the effectiveness of the proposed defense techniques, and the overall performance of the trust evaluation system.},
	keywords = {ad-hoc networks},
	isbn = {1-4244-0349-9 },
	doi = {10.1109/CISS.2006.286695 },
	url = {http://dblp.uni-trier.de/db/conf/infocom/infocom2006.html$\#$SunHYL06},
	author = {Yan L. Sun and Zhu Han and Wei Yu and K. J. Ray Liu}
}

Downloads: 0