skip to main content
10.1145/1169075.1169081acmconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
Article

Decentralized trust management for ad-hoc peer-to-peer networks

Published: 27 November 2006 Publication History

Abstract

Modern mobile devices can form ad-hoc networks to autonomously share data and services. While such self-organizing, peer-to-peer communities offer exciting collaboration opportunities, deciding whether to trust another peer can be challenging. In this work we propose a decentralized trust management middleware for ad-hoc, peer-to-peer networks, based on reputation. Our middleware's protocols take advantage of the unstructured nature of the network to render malicious behavior, such as lying and colluding, risky. The reputation information of each peer is stored in its neighbors and piggy-backed on its replies. By simulating the behavior of networks both with and without a rating scheme we were able to show that just a few dishonest peers can flood the network with false results, whereas this phenomenon is virtually eliminated when using our middleware.

References

[1]
K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In International Conference on Information and Knowledge Management, CIKM, 2001.
[2]
V. Cahill et al. Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing, 2:52--61, 2003.
[3]
F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a P2P network. In International World Wide Web Conference, WWW, 2002.
[4]
Gnutella Protocol Development. http://rfc-gnutella.sourceforge.net/, 2003.
[5]
T. Horozov, N. Narasimhan, and V. Vasudevan. Using location for personalized POI recommendations in mobile environments. In International Symposium on Applications on Internet, SAINT, 2006.
[6]
M. Huebscher and J. McCann. A learning model for trustworthiness of context-awareness services. In 2nd International Workshop on Pervasive Computing and Communication Security, PerSec, 2005.
[7]
S. Joseph. An extendible open source P2P simulator. P2P Journal, pages 1--15, November 2003.
[8]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. In International World Wide Web Conference, WWW, 2003.
[9]
S. Lee, R. Sherwood, and B. Bhattacharjee. Cooperative peer groups in NICE. In IEEE INFOCOM, 2003.
[10]
J. Liu and V. Issarny. Enhanced reputation mechanism for mobile ad hoc networks. In International Conference on Trust Management, iTrust, 2004.
[11]
L. Mcnamara, C. Mascolo, and L. Capra. Trust and mobility aware service provision for pervasive computing. In 1st International Workshop on Requirements and Solutions for Pervasive Software Infrastructures, RSPSI, 2006.
[12]
B. Ooi, C. Liau, and K. Tau. Managing trust in peer-to-peer systems using reputation-based techniques. In International Conference on Web Age Information Management, WAIM, 2003.
[13]
T. Repantis and V. Kalogeraki. Data dissemination in mobile peer-to-peer networks. In International Conference on Mobile Data Management, MDM, 2005.
[14]
M. Roman et al. Amiddleware infrastructure for active spaces. IEEE Pervasive Computing, 1:74--83, 2002.
[15]
A. Singh and L. Liu. TrustMe: Anonymous management of trust relationships in decentralized P2P systems. In International Conference on Peer-to-Peer Computing, P2P, 2003.
[16]
M. Srivatsa, L. Xiong, and L. Liu. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In International World Wide Web Conference, WWW, 2005.
[17]
Q. Sun and H. Garcia-Molina. SLIC: A selfish link-based incentive mechanism for unstructured peer-to-peer networks. In International Conference on Distributed Computing Systems, ICDCS, 2004.
[18]
K. Walsh and E. Sirer. Experience with an object reputation system for peer-to-peer filesharing. In Networked Systems Design and Implementation, NSDI, 2006.
[19]
H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman. SybilGuard: Defending against sybil attacks via social networks. In ACM SIGCOMM, 2006.

Cited By

View all
  • (2022)Decentralized Evaluation of Trust in Ad Hoc Networks using Neural Networks2022 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMob55322.2022.9941360(30-35)Online publication date: 10-Oct-2022
  • (2022)Estimation of Trust in Clustered Mobile Ad hoc Networks2022 International Conference on Electronics and Renewable Systems (ICEARS)10.1109/ICEARS53579.2022.9752313(724-728)Online publication date: 16-Mar-2022
  • (2022)A trust change detection mechanism in mobile ad-hoc networksComputer Communications10.1016/j.comcom.2022.02.007187:C(155-163)Online publication date: 1-Apr-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MPAC '06: Proceedings of the 4th international workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006)
November 2006
63 pages
ISBN:1595934219
DOI:10.1145/1169075
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 November 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. ad-hoc
  2. decentralized
  3. peer-to-peer networks
  4. reputation
  5. trust
  6. unstructured

Qualifiers

  • Article

Conference

Middleware06
Sponsor:
Middleware06: 7th International Middleware Conference
November 27 - December 1, 2006
Melbourne, Australia

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Decentralized Evaluation of Trust in Ad Hoc Networks using Neural Networks2022 18th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMob55322.2022.9941360(30-35)Online publication date: 10-Oct-2022
  • (2022)Estimation of Trust in Clustered Mobile Ad hoc Networks2022 International Conference on Electronics and Renewable Systems (ICEARS)10.1109/ICEARS53579.2022.9752313(724-728)Online publication date: 16-Mar-2022
  • (2022)A trust change detection mechanism in mobile ad-hoc networksComputer Communications10.1016/j.comcom.2022.02.007187:C(155-163)Online publication date: 1-Apr-2022
  • (2019)Location Aware Clustering and Epidemic Trust Management in Mobile Ad Hoc Network2019 28th International Conference on Computer Communication and Networks (ICCCN)10.1109/ICCCN.2019.8847166(1-7)Online publication date: Jul-2019
  • (2018)Location Aware Clustering and Trust Management in Mobile Ad Hoc Networks2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)10.1109/WiMOB.2018.8589136(55-60)Online publication date: Oct-2018
  • (2018)A Multi-Criteria Model for Users Trust Management in Ad-hoc Mobile Cloud Computing2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)10.1109/ICONIC.2018.8601095(1-6)Online publication date: Dec-2018
  • (2017)On the Personalization of Trust Management2017 IEEE Security and Privacy Workshops (SPW)10.1109/SPW.2017.25(1-10)Online publication date: May-2017
  • (2017)Towards Collaborative Trust Management2017 IEEE 3rd International Conference on Collaboration and Internet Computing (CIC)10.1109/CIC.2017.00035(198-208)Online publication date: Oct-2017
  • (2017)Trust Is Risk: A Decentralized Financial Trust PlatformFinancial Cryptography and Data Security10.1007/978-3-319-70972-7_19(340-356)Online publication date: 2017
  • (2016)PETRA: Personalized Trust Management Architecture (Application Paper)2016 IEEE 17th International Conference on Information Reuse and Integration (IRI)10.1109/IRI.2016.46(287-296)Online publication date: Jul-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media