388,325 research outputs found

    Adaptive trust and reputation system as a security service in group communications

    Get PDF
    Group communications has been facilitating many emerging applications which require packet delivery from one or more sender(s) to multiple receivers. Owing to the multicasting and broadcasting nature, group communications are susceptible to various kinds of attacks. Though a number of proposals have been reported to secure group communications, provisioning security in group communications remains a critical and challenging issue. This work first presents a survey on recent advances in security requirements and services in group communications in wireless and wired networks, and discusses challenges in designing secure group communications in these networks. Effective security services to secure group communications are then proposed. This dissertation also introduces the taxonomy of security services, which can be applied to secure group communications, and evaluates existing secure group communications schemes. This dissertation work analyzes a number of vulnerabilities against trust and reputation systems, and proposes a threat model to predict attack behaviors. This work also considers scenarios in which multiple attacking agents actively and collaboratively attack the whole network as well as a specific individual node. The behaviors may be related to both performance issues and security issues. Finally, this work extensively examines and substantiates the security of the proposed trust and reputation system. This work next discusses the proposed trust and reputation system for an anonymous network, referred to as the Adaptive Trust-based Anonymous Network (ATAN). The distributed and decentralized network management in ATAN does not require a central authority so that ATAN alleviates the problem of a single point of failure. In ATAN, the trust and reputation system aims to enhance anonymity by establishing a trust and reputation relationship between the source and the forwarding members. The trust and reputation relationship of any two nodes is adaptive to new information learned by these two nodes or recommended from other trust nodes. Therefore, packets are anonymously routed from the \u27trusted\u27 source to the destination through \u27trusted\u27 intermediate nodes, thereby improving anonymity of communications. In the performance analysis, the ratio of the ATAN header and data payload is around 0.1, which is relatively small. This dissertation offers analysis on security services on group communications. It illustrates that these security services are needed to incorporate with each other such that group communications can be secure. Furthermore, the adaptive trust and reputation system is proposed to integrate the concept of trust and reputation into communications. Although deploying the trust and reputation system incurs some overheads in terms of storage spaces, bandwidth and computation cycles, it shows a very promising performance that enhance users\u27 confidence in using group communications, and concludes that the trust and reputation system should be deployed as another layer of security services to protect group communications against malicious adversaries and attacks

    A Hierarchical Bayesian Trust Model based on Reputation and Group Behaviour

    No full text
    In many systems, agents must rely on their peers to achieve their goals. However, when trusted to perform an action, an agent may betray that trust by not behaving as required. Agents must therefore estimate the behaviour of their peers, so that they may identify reliable interaction partners. To this end, we present a Bayesian trust model (HABIT) for assessing trust based on direct experience and (potentially unreliable) reputation. Although existing approaches claim to achieve this, most rely on heuristics with little theoretical foundation. In contrast, HABIT is based on principled statistical techniques; can be used with any representation of behaviour; and can assess trust based on observed similarities between groups of agents. In this paper, we describe the theoretical aspects of the model and present experimental results in which HABIT was shown to be up to twice as accurate at predicting trustee performance as an existing state-of-the-art trust model

    Trust Model Based On Islamic Business Ethics and Social Network Analysis

    Get PDF
    Buyers and sellers in e-commerce market such as e-auction form a virtual community. They use the feedback system to rate each other following a completed transaction and these ratings are used to build their reputation in the virtual community.  Existing reputation systems can often be easily manipulated by forming cohesive group in giving fake user feedbacks to increase their respective reputation. This practice is a clear violation of Islamic business ethics. In addition, there is currently no real-time support for reputation system and this causes users to be misinformed on the reputation of a seller. To improve the reputation system this study developed a trust framework based on business Islamic ethics. In this paper, a trust model which evaluates conformance to nine Islamic business ethical codes is proposed to calculate users’ initial trust value based on their ethical behavior. The trust model proposed the Islamic business ethics algorithm which calculates the user compliance to Islamic business ethics (IBE) score based on trading partner’s feedbacks. Because of feedback frauds can still occur, this study introduces a cohesive group algorithm to track users who collaborate to give false feedbacks. The cohesive group algorithm applied k-core algorithms which is capable of determining the strength of the relationship of every user in the cohesive group. The cohesive group algorithm also proposed a cohesive score to determine the feedback reliability of every user’s transaction based on the user’s k-core and the highest k-core. In the group user reputation (trust score) is measured by considering the feedback reliability status for all transactions. A reputation prototype system for e-auction was developed as the test bed to validate the trust model through simulation of the set of initial experiments, showing the feasibility and benefit of the model

    Group trust yields improved scalability and anomalydetection for p2p systems

    Get PDF
    This paper implements an existing computational model of trust and reputationapplied to a P2P environment, and extends the approach using a novel group trust calculationthat demonstrates improved scalability and anomaly detection for P2P systems. Our analysis isbased on results obtained by simulating a P2P environment using the JXTA open source platform.A trust and reputation model was implemented in the same platform, allowing to constructinga baseline for the behavior of the nodes using combined trust and reputation coefficients in ascenario without malicious nodes. Then simulations were conducted with malicious nodes andthe effect of trust and reputation factors were analyzed regarding their influence on the anomalydetection capacity and scalability in P2P communications. Several simulation scenarios wereconfigured and explored, considering the presence of different number of malicious nodes in theP2P environment, with both constant and variable behavior. Other scenarios included calculationsof combined trust and reputation for node groups. The results show that group trust ensure moreinteractions among nodes, even in the presence of a large number of malicious nodes (60% of thetotal), besides providing focused identification of malicious nodes inside groups

    Group reputations: an experimental foray

    Get PDF
    Often information structures are such that while individual reputation building is impossible groups of agents would have the opportunity of building up a reputation. We experimentally examine whether groups of sellers in markets that suffer from moral hazard are able to build up reputations and, thus, avoid market breakdown. We contrast our findings with situations where sellers alternatively can build up an individual reputation or where there are no possibilities for reputation building at all. Our results offer a rather optimistic outlook on group reputations. Even though sellers only receive some of the reputation benefits of withstanding short-run incentives to exploit trust, they are able to overcome the dilemma and successfully exploit the information structure

    Dynamical trust and reputation computation model for B2C E-Commerce

    Get PDF
    Trust is one of the most important factors that influence the successful application of network service environments, such as e-commerce, wireless sensor networks, and online social networks. Computation models associated with trust and reputation have been paid special attention in both computer societies and service science in recent years. In this paper, a dynamical computation model of reputation for B2C e-commerce is proposed. Firstly, conceptions associated with trust and reputation are introduced, and the mathematical formula of trust for B2C e-commerce is given. Then a dynamical computation model of reputation is further proposed based on the conception of trust and the relationship between trust and reputation. In the proposed model, classical varying processes of reputation of B2C e-commerce are discussed. Furthermore, the iterative trust and reputation computation models are formulated via a set of difference equations based on the closed-loop feedback mechanism. Finally, a group of numerical simulation experiments are performed to illustrate the proposed model of trust and reputation. Experimental results show that the proposed model is effective in simulating the dynamical processes of trust and reputation for B2C e-commerce

    Trust Building in the Mobile Payment Platform:

    Get PDF
    This study investigates gender differences issue regarding the effect of platform characteristics on trust and continuance intention in the context of mobile payment. Drawing upon innovation diffusion and trust theory, a research model is developed to examine four significant antecedents of trust for male and female users. An empirical survey was conducted and 740 valid questionnaires were collected from users of Alipay and Wechat pay, which are recognized as two leading mobile payment platforms in China. Structural equation modelling analysis results suggest that security is the most significant antecedent of customers’ trust, followed by platform reputation, mobility and customization. Specifically, a multi-group analysis results indicate that mobility and reputation have more significant influence on trust for males, while customization and security are more important in promoting trust for females. Theoretical and practical implications are discussed in the final section

    Identifikasi Faktor Kepercayaan Konsumen dalam Belanja Online

    Get PDF
    This study discusses the influence of six factors on consumer trust in online shopping: Reputation, Business Size, Service Quality, Website Quality, Information Security, and Reference group. This study applies a quantitative methodology and shows mixed results, namely there are 3 supported hypotheses and 3 rejected hypotheses, where the results show that reputation, business size, and website quality have no significant effect on consumer trust, while service quality, information security, and reference group has a significant influence on consumer trust

    The impact of religious affiliation on trust in the context of electronic commerce

    Get PDF
    There is currently a growing literature on the role that trust plays in encouraging consumers to engage in e-commerce transactions. Various models have been proposed which aim to identify both the antecedents and outcomes of trust displayed towards e-commerce web sites. Increased trust is generally shown to increase positive user attitude which in turn is linked to increased willingness to buy. Studies have shown the antecedents of trust include variables such as the perceived reputation and size of the vendor organisation. The current paper explores the role of cultural variables as antecedents of trust with the main emphasis being on religious affiliation. Participants recruited from Christian, Muslim and other faiths were asked to interact with online bookstores identified as Christian, Muslim or Neutral. Trust and attitudes towards the web sites were measured and this data was used to test the hypothesis that same-religion sites would be trusted and liked more than other religion or neutral sites. This hypothesis was partially supported, but only for the Muslim participants. It was found that the Muslim group expressed significantly more trust in the Muslim site compared to the Christian site. They also expressed significantly more positive attitudes towards the Muslim online bookstore than the other two sites. The implications of these result for theories of web based trust and attitude are discussed along with the practical implications of the findings
    corecore