Abstract
In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show that such attacks can be mitigated by a server-side double-blind repu-tation scheme. We offer a minimum-information framework for Fake VIP attacks and a stochastic analysis of a two-player Stackelberg game to find optimum attack and defense strategies, as well as to identify regions of operation where both the client and the server find the reputation scheme beneficial.
Citations
-
0
CrossRef
-
0
Web of Science
-
2
Scopus
Author (1)
Cite as
Full text
- Publication version
- Accepted or Published Version
- License
- Copyright (2017 IEEE)
Keywords
Details
- Category:
- Conference activity
- Type:
- materiały konferencyjne indeksowane w Web of Science
- Title of issue:
- Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC) strony 1 - 8
- Language:
- English
- Publication year:
- 2017
- Bibliographic description:
- Konorski J..: Fake VIP Attacks and Their Mitigation via Double-Blind Reputation, W: Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC), 2017, ,.
- DOI:
- Digital Object Identifier (open in new tab) 10.1109/atnac.2017.8215385
- Bibliography: test
-
- J. Konorski and S. Szott, "Discouraging traffic remapping attacks in local ad hoc networks," IEEE Transactions on Wireless Communications, vol. 13, 7, pp. 3752-3767, July 2014. open in new tab
- S. Mangold, S. Choi, G. R. Hiertz, O. Klein, and B. Walke, "Analysis of IEEE 802.11e for QoS support in Wireless LANs," IEEE Wireless Communications, vol. 10, 6, pp. 40-50, Dec. 2003. open in new tab
- I.-R. Chen, F. Bao, and J. Guo, "Trust-based service management for Social Internet of Things systems, " IEEE Transactions on Dependable and Secure Computing, vol. 13, 6, pp. 684-696, Nov./Dec. 2016. open in new tab
- Po-Ching Lin, Ying-Dar Lin, Yuan-Cheng Lai, and Tsern-Huei Lee, "Using String Matching for Deep Packet Inspection," Computer, vol. 41, 4, pp. 23−28, April 2008. open in new tab
- Rasmussen E.: Games and Information: An Introduction to Game Theory, 3rd ed. Blackwell Publishers. 2001. open in new tab
- P. L. Bartlett. Online Prediction. http://stat.berkeley.edu/~bartlett/ papers/b-ol-16.pdf. 2015.
- A. Josang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, 2, pp. 618−644, March 2007. open in new tab
- Q. Liu, "Information acquisition and reputation dynamics," Review of Economic Studies, vol. 78, no. 4, pp. 1400-1425, 2011. open in new tab
- K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," ACM Computing Surveys, vol. 42, 1, Dec. 2009. open in new tab
- Y. Chae, L. C. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, 4, pp. 1178−1191, April 2015. open in new tab
- M. H. Cheung, A. H. Mohsenian-Rad, V. W. Wong, and R. Schober, "Random access protocols for WLANs based on mechanism design," Proc. IEEE Int. Conf. on Comm. ICC'09, Dresden, Germany, June 2009. open in new tab
- S. H. Nguyen, L. L. Andrew, and H. L. Vu, "Service differentiation without prioritization in IEEE 802.11 WLANs," Proc. 36th IEEE Conf. on Local Computer Networks (LCN), Bonn, Germany, Oct 2011. open in new tab
- L. Galluccio, "A game-theoretic approach to prioritized transmission in wireless CSMA/CA networks," Proc. 69th IEEE Vehicular Technology Conf., Barcelona, Spain, April 2009. open in new tab
- M. Li and B. Prabhakaran, "MAC layer admission control and priority re-allocation for handling QoS guarantees in non-cooperative wireless LANs," Springer Mobile Networks and Applications, vol. 10, 6, pp. 947-959, Dec. 2005. open in new tab
- F. Hendrikx, K. Bubendorfer, and R. Chard, "Reputation systems: A survey and taxonomy," J. Parallel and Distrib. Comput., vol. 75, pp. 184-197, Jan. 2015. open in new tab
- Y. L. Sun and Y. Liu, "Security of online reputation systems: The evolution of attacks and defenses," IEEE Signal Proc. Mag., vol. 29, 2, pp. 87−97, March 2012.
- R. Kerr and R. Cohen, "Smart cheaters do prosper: Defeating trust and reputation systems," Proc. AAMS'09, Budapest, Hungary, May 2009. open in new tab
- Y. Freund, M. Kearns, Y. Mansour, D. Ron, R. Rubinfeld, and R. E. Schapire, "Efficient Algorithms for Learning to Play Repeated Games Against Computationally Bounded Adversaries," Proc. 36th Annual Symp. Foundations of Computer Science, Milwaukee WI, Nov. 1995. open in new tab
- A. Patcha and Jung-Min Park, "A Game Theoretic Formulation for Intrusion Detection in Mobile Ad Hoc Networks," Int. J. of Network Security, vol. 2, 2, pp.131-137, March 2006. open in new tab
- Intel Corporation, "Delivering 160Gbps DPI performance on the Intel ® Xeon ® processor E5-2600 series using HyperScan," solution white paper, 2013. open in new tab
- Verified by:
- Gdańsk University of Technology
seen 89 times