On securing open networks through trust and reputation – architecture, challenges and solutions

نویسندگان

  • Yufeng Wang
  • Yoshiaki Hori
  • Kouichi SAKURAI
چکیده

The traditional approach of providing network security has been to borrow tools from cryptography and authentication. With the Internet growing into highly decentralized and self-organizing networks, the open and anonymous nature of these networks makes them vulnerable to attacks from malicious and self-interested peers. So, we argue that the conventional view of security based on cryptography alone is not sufficient for those open networks. One way to minimize threats in such networks is to build reputation-based trust mechanisms to assess the trustworthiness of peers. But, in this research filed, there is still lack of comprehensive reputation and trust architecture, and exists a great deal of conflicting challenges. In this paper, we identify five important attributes of an elemental trust relation, provide comprehensive understanding of reputation-based trust architecture which includes three basic components, and introduce the corresponding requirements and research challenges in each component. Then we offer various reputation rating and trust inference mechanisms which can help us quantitatively model and analyze the real reputation and trust mechanisms. Finally, the novel research that considers trust and reputation systems as complex social networks is provided. The goal of this paper is to provide abundant problems to triggers more discussion on relatively new area of soft security with trust and reputation systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GGRA: a grouped gossip-based reputation aggregation algorithm

An important issue in P2P networks is the existence of malicious nodes that decreases the performance of such networks. Reputation system in which nodes are ranked based on their behavior, is one of the proposed solutions to detect and isolate malicious (low ranked) nodes. Gossip Trust is an interesting previously proposed algorithm for reputation aggregation in P2P networks based on t...

متن کامل

A Taxonomy to Express Open Challenges in Trust and Reputation Systems

During the past decade, online trust and reputation systems have provided cogent answers to emerging challenges in the global computing infrastructures relating to computer and network security, electronic commerce, virtual enterprises, social networks and cloud computing. The goal of these systems in such global computing infrastructures is to allow entities to reason about the trustworthiness...

متن کامل

Trust building and usage control for electronic business processes

Information technology (IT) supports companies to streamline their business processes. The main contributions of IT are the digitalization of data and efficient communication networks, which allow companies to automatize their business processes and thus increase their efficiency, i.e., their value creation. This effort started with the optimization of internal business processes within a compa...

متن کامل

Security Schemes in Ad Hoc Networks a Survey and New Challenges

Ad hoc networks have lots of applications; however, a vital problem concerning their security aspects must be solved in order to realize these applications. The dynamic and cooperative nature of ad hoc networks present challenges in securing these networks. There are recent research efforts in securing ad hoc networks. Amongst security approaches, there are threshold cryptography, certification...

متن کامل

A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks

Software-Defined Networks have seen an increasing in their deployment because they offer better network manageability compared to traditional networks. Despite their immense success and popularity, various security issues in SDN remain open problems for research. Particularly, the problem of securing the controllers in distributed environment is still short of any solutions. This paper proposes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006