2013
DOI: 10.1186/1687-1499-2013-189
|View full text |Cite
|
Sign up to set email alerts
|

A mechanism for detecting dishonest recommendation in indirect trust computation

Abstract: Indirect trust computation based on recommendations form an important component in trust-based access control models for pervasive environment. It can provide the service provider the confidence to interact with unknown service requesters. However, recommendation-based indirect trust computation is vulnerable to various types of attacks. This paper proposes a defense mechanism for filtering out dishonest recommendations based on a measure of dissimilarity function between the two subsets. A subset of recommend… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(16 citation statements)
references
References 25 publications
0
16
0
Order By: Relevance
“…Initial credibility of service consumer as recommender is set as 0.5. To compute the accuracy of the reputation score, we compared the reputation score computed through our scheme with the average of reputation values provided by non-malicious users and with the scheme presented in [ 39 ].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Initial credibility of service consumer as recommender is set as 0.5. To compute the accuracy of the reputation score, we compared the reputation score computed through our scheme with the average of reputation values provided by non-malicious users and with the scheme presented in [ 39 ].…”
Section: Resultsmentioning
confidence: 99%
“…The control chart method calculates the lower and the upper confidence limits using the average and the standard deviation to filter out the recommendations that are malicious. In [ 39 ] scheme based on dissimilarity measure is presented to detect malicious recommendations. The scheme focuses on declaring the recommenders as malicious whose provided recommendation is distant from the Median value and has a lower frequency of occurrence.…”
Section: Related Workmentioning
confidence: 99%
“…Firstly, the influence of punishment and regulation mechanism on direct trust value is verified with dynamic change of communication behavior between nodes in our trust model. Then, our model compares with DDR (Detecting Dishonest Recommendation) [29] in terms of trust value under the condition of no attack or malicious node's attack. Subsequently, the comparison of ACOSR, DDR, and SRC (Secure and Robust Clustering) [30] algorithm demonstrates in aspects of the average energy consumption, the average time delay, throughput, and the packet loss rate.…”
Section: Resultsmentioning
confidence: 99%
“…The authors of Dishonest Recommendation Detection Model Ullah et al 13 provided the approach proposed in Iltaf et al 14 with some level of resistance to bad mouthing attacks. To achieve this, recommendations are accepted only when they neither are highly deviated from the mean trust value nor have been received from a low trustworthy node.…”
Section: Related Workmentioning
confidence: 99%