DocumentCode
657387
Title
Leveraging node properties in random walks for robust reputations in decentralized networks
Author
Gkorou, Dimitra ; Vinko, Tamas ; Pouwelse, Johan ; Epema, Dick
Author_Institution
Delft Univ. of Technol., Delft, Netherlands
fYear
2013
fDate
9-11 Sept. 2013
Firstpage
1
Lastpage
10
Abstract
Reputation systems are essential to establish trust and to provide incentives for cooperation among users in decentralized networks. In these systems, the most widely used algorithms for computing reputations are based on random walks. However, in decentralized networks where nodes have only a partial view of the system, random walk-based algorithms can be easily exploited by uncooperative and malicious nodes. Traditionally, a random walk only uses information about the adjacency of nodes, and ignores their structural and temporal properties. Nevertheless, the properties of nodes indicate their reliability, and so, random walks using much richer information about the nodes than simple adjacency may achieve higher robustness against malicious exploitations. In this paper, we introduce the properties of nodes that are indicative of their reliability, and we propose a scheme to integrate these properties into the traditional random walks. Particularly, we consider two common malicious exploitations of random walks in decentralized networks, uncooperative nodes and Sybil attacks, and we show that integrating node properties into random walks results in much more robust reputation systems. Our experimental evaluation in synthetic graphs and graphs derived from real-world networks covering a significant number of users, shows the effectiveness of the resulting biased random walks.
Keywords
computer network security; graph theory; network theory (graphs); random processes; trusted computing; Sybil attacks; decentralized networks; malicious exploitations; malicious nodes; node properties; random walk-based algorithms; real-world networks; reputation systems; robust reputation systems; structural properties; synthetic graphs; temporal properties; uncooperative nodes; Conferences; Correlation; Facebook; Peer-to-peer computing; Protocols; Robustness;
fLanguage
English
Publisher
ieee
Conference_Titel
Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on
Conference_Location
Trento
Type
conf
DOI
10.1109/P2P.2013.6688708
Filename
6688708
Link To Document