skip to main content
research-article

A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems

Published:04 June 2021Publication History
Skip Abstract Section

Abstract

Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent on disseminating false reputation values. Given the variety of application scenarios in which RMSs can be adopted, as well as the multitude of behaviours that agents can implement, designers need RMS evaluation tools that allow them to predict the robustness of the system to security attacks, before its actual deployment. To this aim, we present a simulation software for the vulnerability evaluation of RMSs and illustrate three case studies in which this tool was effectively used to model and assess state-of-the-art RMSs.

References

  1. V. Agate, A. De Paola, G. Lo Re, and M. Morana. 2016. A simulation framework for evaluating distributed reputation management systems. In Proceedings of the 13th International Conference on Distributed Computing and Artificial Intelligence. Springer International Publishing, Cham, 247–254.Google ScholarGoogle Scholar
  2. V. Agate, A. De Paola, G. Lo Re, and M. Morana. 2016. Vulnerability evaluation of distributed reputation management systems. In Proceedings of the New Frontiers in Quantitative Methods in Informatics (InfQ’16). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, 1–8.Google ScholarGoogle Scholar
  3. V. Agate, A. De Paola, G. Lo Re, and M. Morana. 2018. A platform for the evaluation of distributed reputation algorithms. In Proceedings of the IEEE/ACM 22nd International Symposium on Distributed Simulation and Real Time Applications (DS-RT’18). IEEE, New York, NY, 1–8.Google ScholarGoogle Scholar
  4. Alessandro Aldini. 2014. A calculus for trust and reputation systems. In Trust Management VIII, Jianying Zhou, Nurit Gal-Oz, Jie Zhang, and Ehud Gudes (Eds.). Springer, Berlin, 173–188.Google ScholarGoogle Scholar
  5. Alessandro Aldini. 2018. Design and verification of trusted collective adaptive systems. ACM Trans. Model. Comput. Simul. 28, 2 (2018), 1–27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, and Alhanof Abuhaimed. 2013. Reputation-based trust systems for wireless sensor networks: A comprehensive review. In Trust Management VII, Carmen Fernández-Gago, Fabio Martinelli, Siani Pearson, and Isaac Agudo (Eds.). Springer, Berlin, 66–82.Google ScholarGoogle Scholar
  7. F. M. Awuor, C.-Y. Wang, and T.-C. Tsai. 2018. Motivating content sharing and trustworthiness in mobile social networks. IEEE Access 6 (2018), 28339–28355.Google ScholarGoogle ScholarCross RefCross Ref
  8. S. Ba and P. A. Pavlou. 2002. Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quart. 26, 3 (2002), 243–268.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Amir Jalaly Bidgoly and Behrouz Tork Ladani. 2013. Quantitative verification of beta reputation system using PRISM probabilistic model checker. In Proceedings of the 10th International ISC Conference on Information Security and Cryptology (ISCISC’13). IEEE, New York, NY, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  10. Amir Jalaly Bidgoly and Behrouz Tork Ladani. 2015. Modelling and quantitative verification of reputation systems against malicious attackers. Comput. J. 58, 10 (2015), 2567–2582.Google ScholarGoogle ScholarCross RefCross Ref
  11. Amir Jalaly Bidgoly and Behrouz Tork Ladani. 2016. Modeling and quantitative verification of trust systems against malicious attackers. Comput. J. 59, 7 (2016), 1005–1027.Google ScholarGoogle ScholarCross RefCross Ref
  12. Diego De Siqueira Braga, Marco Niemann, Bernd Hellingrath, and Fernando Buarque De Lima Neto. 2018. Survey on computational trust and reputation models. ACM Comput. Survey 51, 5 (2018), 1–40.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Chandrasekaran and B. Esfandiari. 2015. Toward a testbed for evaluating computational trust models: Experiments and analysis. J. Trust Manage. 2, 1 (2015), 1–27.Google ScholarGoogle ScholarCross RefCross Ref
  14. C. Crapanzano, F. Milazzo, A. De Paola, and G. Lo Re. 2010. Reputation management for distributed service-oriented architectures. In Proceedings of the 4th IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop (SASOW’10). IEEE, New York, NY, 160–165.Google ScholarGoogle Scholar
  15. CVSS. 2015. Common Vulnerability Scoring System v3.0. Retrieved from https://www.first.org/cvss.Google ScholarGoogle Scholar
  16. A. De Paola and A. Tamburo. 2008. Reputation management in distributed systems. In Proceedings of the 3rd International Symposium on Communications, Control and Signal Processing (ISCCSP’08). IEEE, New York, NY, 666–670.Google ScholarGoogle Scholar
  17. John R. Douceur. 2002. The sybil attack. In Proceedings of the International Workshop on Peer-to-Peer Systems. Springer, Gewerbestr, Switzerland, 251–260.Google ScholarGoogle ScholarCross RefCross Ref
  18. M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica. 2004. Free-riding and whitewashing in peer-to-peer systems. In Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems. Association for Computing Machinery, New York, NY, 228–236.Google ScholarGoogle Scholar
  19. K. K. Fullam, T. B. Klos, G. Muller, J. Sabater, A. Schlosser, Z. Topol, K. S. Barber, J. S. Rosenschein, L. Vercouter, and M. Voss. 2005. A specification of the agent reputation and trust (ART) testbed: Experimentation and competition for trust in agent societies. In Proceedings of the 4th International joint Conference on Autonomous Agents and Multiagent Systems. ACM, New York, NY, 512–518.Google ScholarGoogle Scholar
  20. Seyed Asgary Ghasempouri and Behrouz Tork Ladani. 2020. Model checking of robustness properties in trust and reputation systems. Future Gen. Comput. Syst. 108 (2020), 302–319. DOI:https://doi.org/10.1016/j.future.2020.02.070Google ScholarGoogle ScholarCross RefCross Ref
  21. Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, and Han-Chieh Chao. 2014. Management and applications of trust in Wireless Sensor Networks: A survey. J. Comput. Syst. Sci. 80, 3 (2014), 602–617. DOI:https://doi.org/10.1016/j.jcss.2013.06.014Special Issue on Wireless Network Intrusion.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. F. Hendrikx, K. Bubendorfer, and R. Chard. 2015. Reputation systems: A survey and taxonomy. J. Parallel Distrib. Comput. 75 (2015), 184–197.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. K. Hoffman, D. Zage, and C. Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. ACM Comput. Surveys. 42, 1 (2009), 1–31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Amir Jalaly Bidgoly and Behrouz Tork Ladani. 2016. Benchmarking reputation systems: A quantitative verification approach. Comput. Hum. Behav. 57 (2016), 274–291. DOI:https://doi.org/10.1016/j.chb.2015.12.024Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. D. Jelenc, R. Hermoso, J. Sabater-Mir, and D. Trček. 2013. Decision making matters: A better way to evaluate trust models. Knowl.-Based Syst. 52 (2013), 147–164.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Siwei Jiang, Jie Zhang, and Yew-Soon Ong. 2013. An evolutionary model for constructing robust trust networks. In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS’13), Vol. 13. International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 813–820.Google ScholarGoogle Scholar
  27. Håvard D. Johansen, Robbert Van Renesse, Ymir Vigfusson, and Dag Johansen. 2015. Fireflies: A secure and scalable membership and gossip service. ACM Trans. Comput. Syst. 33, 2 (2015), 5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Audun Jøsang. 2007. Trust and reputation systems. In Foundations of Security Analysis and Design IV. Springer, Gewerbestr, Switzerland, 209–245.Google ScholarGoogle Scholar
  29. Audun Josang and Roslan Ismail. 2002. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference, Vol. 5. BLED Proceeding, Slovenia, 2502–2511.Google ScholarGoogle Scholar
  30. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. 2003. The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web. Association for Computing Machinery, New York, NY, 640–651.Google ScholarGoogle Scholar
  31. Reid Kerr and Robin Cohen. 2007. Towards provably secure trust and reputation systems in e-marketplaces. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems. Association for Computing Machinery, New York, NY, 1–3.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. R. Kerr and R. Cohen. 2010. TREET: The trust and reputation experimentation and evaluation testbed. Electronic Commerce Res. 10, 3 (Dec. 2010), 271–290.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. E. Koutrouli and A. Tsalgatidou. 2016. Reputation systems evaluation survey. ACM Comput. Surveys 48, 3 (2016), 35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Nabila Labraoui, Mourad Gueroui, and Larbi Sekhri. 2015. On-off attacks mitigation against trust systems in wireless sensor networks. In IFIP International Conference on Computer Science and its Applications. Springer, Gewerbestr, Switzerland, 406–415.Google ScholarGoogle ScholarCross RefCross Ref
  35. Ze Li and Haiying Shen. 2011. Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mobile Comput. 11, 8 (2011), 1287–1303.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Q. Lian, Z. Zhang, M. Yang, B. Y. Zhao, Y. Dai, and X. Li. 2007. An empirical study of collusion behavior in the Maze P2P file-sharing system. In Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS’07). IEEE, New York, NY, 56–56.Google ScholarGoogle Scholar
  37. N. A. Lynch. 1996. Distributed Algorithms. Morgan Kaufmann, San Francisco, CA.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. F. G. Mármol and G. M. Pérez. 2009. TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC’09). IEEE, New York, NY, 1–5.Google ScholarGoogle Scholar
  39. S. Marti and H. Garcia-Molina. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Comput. Netw. 50, 4 (2006), 472–484.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Fabio Martinelli. 2005. Towards an integrated formal analysis for security and trust. In Proceedings of the International Conference on Formal Methods for Open Object-Based Distributed Systems. Springer, Gewerbestr, Switzerland, 115–130.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Pietro Michiardi and Refik Molva. 2002. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security. Springer, Gewerbestr, Switzerland, 107–121.Google ScholarGoogle Scholar
  42. Tim Muller, Yang Liu, Sjouke Mauw, and Jie Zhang. 2014. On robustness of trust systems. In Proceedings of the IFIP International Conference on Trust Management. Springer, Gewerbestr, Switzerland, 44–60.Google ScholarGoogle ScholarCross RefCross Ref
  43. P. Naghizadeh and M. Liu. 2016. Perceptions and truth: A mechanism design approach to crowd-sourcing reputation. IEEE/ACM Trans. Netw. 24, 1 (2016), 163–176.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Kevin Regan, Pascal Poupart, and Robin Cohen. 2006. Bayesian reputation modeling in e-marketplaces sensitive to subjectivity, deception and change. In Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI’06). Association for the Advancement of Artificial Intelligence, Palo Alto, CA, 1206–1212.Google ScholarGoogle Scholar
  45. A. Salehi-Abari and T. White. 2012. DART: A distributed analysis of reputation and trust framework. Comput. Intell. 28, 4 (2012), 642–682.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Vladimiro Sassone, Karl Krukow, and Mogens Nielsen. 2007. Towards a formal framework for computational trust. In Formal Methods for Components and Objects, Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, and Willem-Paul de Roever (Eds.). Springer, Berlin, 175–184.Google ScholarGoogle Scholar
  47. Anna Satsiou and Leandros Tassiulas. 2009. Reputation-based resource allocation in P2P systems of rational users. IEEE Trans. Parallel Distrib. Syst. 21, 4 (2009), 466–479.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Chithra Selvaraj and Sheila Anand. 2012. A survey on security issues of reputation management systems for peer-to-peer networks. Comput. Sci. Rev. 6, 4 (2012), 145–160.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Pengzhi Shi and Haiguang Chen. 2012/08. RASN: Resist on-off attack for wireless sensor networks. In Proceedings of the International Conference on Computer Application and System Modeling. Atlantis Press, Paris, France, 690–693. DOI:https://doi.org/10.2991/iccasm.2012.175Google ScholarGoogle Scholar
  50. Mudhakar Srivatsa, Li Xiong, and Ling Liu. 2005. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of the 14th international conference on World Wide Web. Association for Computing Machinery, New York, NY, 422–431.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Y. Sun and Y. Liu. 2012. Security of online reputation systems: The evolution of attacks and defenses. IEEE Signal Process. Mag. 29, 2 (2012), 87–97.Google ScholarGoogle ScholarCross RefCross Ref
  52. S. Tadelis. 2016. The economics of reputation and feedback systems in e-commerce marketplaces. IEEE Internet Comput. 20, 1 (2016), 12–19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. W. T. Luke Teacy, Jigar Patel, Nicholas R. Jennings, and Michael Luck. 2006. Travos: Trust and reputation in the context of inaccurate information sources. Auton. Agents Multi-Agent Syst. 12, 2 (2006), 183–198.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. George Theodorakopoulos and John S. Baras. 2006. On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Select. Areas Commun. 24, 2 (2006), 318–328.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. E. Vasilomanolakis, S. Karuppayah, M. Mühlhäuser, and M. Fischer. 2015. Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surveys 47, 4 (2015), 55.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad. 2015. A survey on trust and reputation models for Web services: Single, composite, and communities. Decision Support Syst. 74 (2015), 121–134.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Dongxia Wang, Tim Muller, Athirai A. Irissappane, Jie Zhang, and Yang Liu. 2015. Using information theory to improve the robustness of trust systems. In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 791–799.Google ScholarGoogle Scholar
  58. Dongxia Wang, Tim Muller, Jie Zhang, and Yang Liu. 2015. Quantifying robustness of trust systems against collusive unfair rating attacks using information theory. In Proceedings of the International Joint Conferences on Artificial Intelligence. International Joint Conferences on Artificial Intelligence, 111–117.Google ScholarGoogle Scholar
  59. K. Wang, X. Qi, L. Shu, D.-J. Deng, and J. J. Rodrigues. 2016. Toward trustworthy crowdsourcing in the social internet of things. IEEE Wireless Commun. 23, 5 (2016), 30–36.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. A. G. West, S. Kannan, I. Lee, and O. Sokolsky. 2010. An evaluation framework for reputation management systems. In Trust Modeling and Management in Digital Environments: From Social Concept to System Development. IGI Global, Hershey, PA, 282–308.Google ScholarGoogle Scholar
  61. Y. Zhang, W. Wang, and S. Lü. 2007. Simulating trust overlay in p2p networks. In Proceedings of the Computational Science (ICCS’07). Springer, Berlin, 632–639.Google ScholarGoogle Scholar

Index Terms

  1. A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Transactions on Computer Systems
          ACM Transactions on Computer Systems  Volume 37, Issue 1-4
          November 2019
          177 pages
          ISSN:0734-2071
          EISSN:1557-7333
          DOI:10.1145/3446674
          Issue’s Table of Contents

          Copyright © 2021 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 June 2021
          • Accepted: 1 March 2021
          • Revised: 1 January 2021
          • Received: 1 August 2019
          Published in tocs Volume 37, Issue 1-4

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format