点对点网络的去中心化信任管理

T. Repantis, V. Kalogeraki
{"title":"点对点网络的去中心化信任管理","authors":"T. Repantis, V. Kalogeraki","doi":"10.1145/1169075.1169081","DOIUrl":null,"url":null,"abstract":"Modern mobile devices can form ad-hoc networks to autonomously share data and services. While such self-organizing, peer-to-peer communities offer exciting collaboration opportunities, deciding whether to trust another peer can be challenging. In this work we propose a decentralized trust management middleware for ad-hoc, peer-to-peer networks, based on reputation. Our middleware's protocols take advantage of the unstructured nature of the network to render malicious behavior, such as lying and colluding, risky. The reputation information of each peer is stored in its neighbors and piggy-backed on its replies. By simulating the behavior of networks both with and without a rating scheme we were able to show that just a few dishonest peers can flood the network with false results, whereas this phenomenon is virtually eliminated when using our middleware.","PeriodicalId":364168,"journal":{"name":"workshop on Middleware for Pervasive and Ad-hoc Computing","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2006-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"66","resultStr":"{\"title\":\"Decentralized trust management for ad-hoc peer-to-peer networks\",\"authors\":\"T. Repantis, V. Kalogeraki\",\"doi\":\"10.1145/1169075.1169081\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Modern mobile devices can form ad-hoc networks to autonomously share data and services. While such self-organizing, peer-to-peer communities offer exciting collaboration opportunities, deciding whether to trust another peer can be challenging. In this work we propose a decentralized trust management middleware for ad-hoc, peer-to-peer networks, based on reputation. Our middleware's protocols take advantage of the unstructured nature of the network to render malicious behavior, such as lying and colluding, risky. The reputation information of each peer is stored in its neighbors and piggy-backed on its replies. By simulating the behavior of networks both with and without a rating scheme we were able to show that just a few dishonest peers can flood the network with false results, whereas this phenomenon is virtually eliminated when using our middleware.\",\"PeriodicalId\":364168,\"journal\":{\"name\":\"workshop on Middleware for Pervasive and Ad-hoc Computing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-11-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"66\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"workshop on Middleware for Pervasive and Ad-hoc Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1169075.1169081\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"workshop on Middleware for Pervasive and Ad-hoc Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1169075.1169081","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 66

摘要

现代移动设备可以形成自组织网络来自主共享数据和服务。虽然这种自组织的点对点社区提供了令人兴奋的协作机会,但决定是否信任另一个点可能是具有挑战性的。在这项工作中,我们提出了一种分散的信任管理中间件,用于基于声誉的ad-hoc点对点网络。我们的中间件协议利用了网络的非结构化特性来呈现恶意行为,比如撒谎和串通,这些都是有风险的。每个对等体的信誉信息存储在它的邻居中,并依赖于它的回复。通过模拟有和没有评级方案的网络的行为,我们能够证明,只有少数不诚实的对等点可以用错误的结果淹没网络,而使用我们的中间件实际上消除了这种现象。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Decentralized trust management for ad-hoc peer-to-peer networks
Modern mobile devices can form ad-hoc networks to autonomously share data and services. While such self-organizing, peer-to-peer communities offer exciting collaboration opportunities, deciding whether to trust another peer can be challenging. In this work we propose a decentralized trust management middleware for ad-hoc, peer-to-peer networks, based on reputation. Our middleware's protocols take advantage of the unstructured nature of the network to render malicious behavior, such as lying and colluding, risky. The reputation information of each peer is stored in its neighbors and piggy-backed on its replies. By simulating the behavior of networks both with and without a rating scheme we were able to show that just a few dishonest peers can flood the network with false results, whereas this phenomenon is virtually eliminated when using our middleware.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Ambient transactors A middleware for service-oriented communication in mobile disaster response environments Adaptive self-management of teams of autonomous vehicles Middleware for ubiquitous context-awareness Deontic logic for modelling data flow and use compliance
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1