Using Information Theory to Improve the Robustness of Trust Systems

被引:0
作者
Wang, Dongxia [1 ]
Muller, Tim [1 ]
Irissappane, Athirai A. [1 ]
Zhang, Jie [1 ]
Liu, Yang [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
来源
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON AUTONOMOUS AGENTS & MULTIAGENT SYSTEMS (AAMAS'15) | 2015年
基金
新加坡国家研究基金会;
关键词
Trust System; Unfair Rating; Robustness; Information Leakage; Worst-Case Attack; REPUTATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Unfair rating attacks to trust systems can affect the accuracy of trust evaluation when trust ratings (recommendations) about trustee agents are sought by truster agents from others (advisor agents). A robust trust system should remain accurate, even under the worst-case attacks which yield the least useful recommendations. In this work, we base on information theory to quantify the utility of recommendations. We analyse models where the advisors have the worst-case behaviour. With these models, we formally prove that if the fraction of dishonest advisors exceeds a certain threshold, recommendations become completely useless (in the worst case). Our evaluations on several popular trust models show that they cannot provide accurate trust evaluation under the worst-case as well as many other types of unfair rating attacks. Our way of explicitly modelling dishonest advisors induces a method of computing trust accurately, which can serve to improve the robustness of the trust models.
引用
收藏
页码:791 / 799
页数:9
相关论文
共 21 条
[1]  
[Anonymous], 2002, Probability, Random Variables, andStochastic Processes
[2]  
[Anonymous], P 8 INT C TRUST MAN
[3]  
Dellarocas C., 2000, P 2 ACM C EL COMM EC
[4]  
Fang H., 2014, P 13 INT AUT AG MULT
[5]   Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses [J].
Feng, Qinyuan ;
Sun, Yan Lindsay ;
Liu, Ling ;
Yang, Yafei ;
Dai, Yafei .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2010, 22 (12) :1766-1780
[6]  
Fullam K.K., 2005, Proceedings of the International Joint Conference on Autonomous Agents and ultiagent Systems, P512
[7]   A Survey of Attack and Defense Techniques for Reputation Systems [J].
Hoffman, Kevin ;
Zage, David ;
Nita-Rotaru, Cristina .
ACM COMPUTING SURVEYS, 2009, 42 (01)
[8]  
Ismail R., 2002, BLED 2002 P, P41
[9]  
Jiang S., 2013, P 12 INT JOINT C AUT
[10]  
Josang A., 2012, P 6 IFIP INT C TRUST