Trust Establishment in Computer Networks: Theories and Applications by Yafei Yang a Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Electrical Engineering

نویسنده

  • YAFEI YANG
چکیده

Trust, a subject extensively studied in sociology and psychology, has long been known as the driving force for collaboration in social communities. Recently, trust is recognized as a key component in new security tools to defend computer networks, such as rating system in e-commerce networks, peer-to-peer networks, mobile ad hoc networks, and wireless sensor networks, against possible attacks. This dissertation focuses on trust framework, theoretical analysis and applications in different computer networks. It provides in-depth understanding of trust establishment process and analyze the vulnerability of trust and reputation mechanisms. Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. This problem is challenging especially when the number of honest ratings is relatively small and unfair ratings can contribute to a significant portion of the overall ratings. In addition, the lack of unfair rating data from real human users is another obstacle toward realistic evaluation of defense mechanisms. We propose a set of methods that jointly detect smart and collaborative unfair ratings based on signal modeling. Based on the detection, a framework of trust-assisted rating aggregation system is developed. Furthermore, we design and launch a Rating Challenge to collect unfair rating data from real human users. The proposed system is evaluated through simulations as well as experiments using real attack data. Compared with existing schemes, the proposed system can significantly reduce the impact from collaborative unfair ratings. Based on the real attack data from the rating challenge, we discover important features in unfair ratings, build attack models, and develop an unfair rating generator. The models and generator can be used to test current rating aggregation systems, as well as to assist the design of future rating systems. Similar to other security mechanisms, reputation systems can be under attack. We report the discovery of a new attack, named RepTrap(Reputation Trap), against feedback-based reputation systems, such as those used in P2P file-sharing systems and E-commerce websites(e.g. Amazon.com). We conduct an in-depth investigation on this new attack, including analysis, case study, and performance evaluation based on real data and realistic user behavior models. We discover that the RepTrap is a strong and destructive attack that can manipulate the reputation scores of users, objects, and even undermine the entire reputation system. Compared with other known attacks that achieve the similar goals, the RepTrap requires less effort from the attackers and causes multi-dimensional damage to the reputation systems. There have been many time synchronization protocols proposed for sensor networks. However, the security problems related to time synchronization have not been fully solved yet. If malicious entities manipulate time synchronization, failures of many functionalities in the sensor networks would occur. we identify various attacks against time synchronization and then develop a trust and self-healing scheme to defeat those attacks. The proposed scheme has three phases: (1) abnormality detection performed by individual sensors, (2) trust-based malicious node detection performed by the base station, and (3) self-healing through changing the topology of synchronization tree. Simulations are performed to demonstrate the effectiveness of the proposed scheme as well as the implementation overhead. In the current literature, the methods proposed for trust establishment are always evaluated through simulation, but theoretical analysis is extremely rare. We present a suite of approaches to analyze trust establishment process. These analysis approaches are used to provide in-depth understanding of trust establishment process and quantitative comparison among trust establishment methods. The proposed analysis methods are validated through simulations.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

اثربخشی آموزش ابراز وجود فرهنگمحور بر عزت‌نفس فرزندان طلاق

Brever, M.M.( 2010).The effects  of child gender and child age at the time of parental divorce on the development. COLLEGE OF SOCIAL AND BEHAVIORAL SCIENCES, Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Psychology Educational Track.  

متن کامل

Mathematical Modeling and Experimental Verification of Resonance Energy Transfer

Mathematical Modeling and Experimental Verification of Resonance Energy Transfer Networks: Applications in Cryptography and Biological Sensing by Vishwa Nellore Department of Electrical and Computer Engineering Duke University Date: 11/24/2014 Approved: ___________________________ Christopher Dwyer, Supervisor ___________________________ Alvin Lebeck ___________________________ Jeff Glass _____...

متن کامل

The Idea Of Using The Steganography As Encryption Tool

the increasing use of computers and the widespread use of networks, Social networking and use applications through the use of the Internet to make the spread images, which make it easy to be penetrated from the attacker and from everyone who try to change the information. So, the need arises to transmit the information securely through a secure manner . Steganography is the best solution to sol...

متن کامل

Iterative Processing: from Applications to Parallel Implementations

a dissertation submitted to the department of electrical engineering and the committee on graduate studies of stanford university in partial fulfillment of the requirements for the degree of doctor of philosophy ii I certify that I have read this dissertation and that, in my opinion, it is fully adequate in scope and quality, as a dissertation for the degree of Doctor of Philosophy. I certify t...

متن کامل

Advance Reservation in Distributed Computer Networks Advance Reservation in Distributed Computer Networks Advance Reservation in Distributed Computer Networks

OF DISSERTATION Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Engineering The University of New Mexico Albuquerque, New Mexico

متن کامل

Wangyao Ge's Dissertation

Organic Thin Films Deposited by Emulsion-Based, Resonant Infrared, Matrix-Assisted Pulsed Laser Evaporation: Fundamentals and Applications by Wangyao Ge Department of Electrical and Computer Engineering Duke University Date:_______________________ Approved: ___________________________ Adrienne D. Stiff-Roberts, Supervisor ___________________________ April S. Brown ___________________________ Ri...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008