Impact of Sybil attacks on Web services trust assessment

被引:0
|
作者
Saoud, Zohra [1 ]
Faci, Noura [1 ]
Maamar, Zakaria [2 ]
Benslimane, Djamal [1 ]
机构
[1] Univ Lyon 1, Villeurbanne, France
[2] Zayed Univ, Dubai, U Arab Emirates
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses how Sybil attacks can undermine trust management systems and how to respond to these attacks using advanced techniques such as credibility and probabilistic databases. In such attacks end-users have purposely different identities and hence, can provide inconsistent ratings over the same Web Services. Many existing approaches rely on arbitrary choices to filter out Sybil users and reduce their attack capabilities. However this turns out inefficient. Our approach relies on non-Sybil credible users who provide consistent ratings over Web services and hence, can be trusted. To establish these ratings and debunk Sybil users techniques such as fuzzy-clustering, graph search, and probabilistic databases are adopted. A series of experiments are carried out to demonstrate robustness of our trust approach in presence of Sybil attacks.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Trust but verify: Authorization for web services
    Department of Computer Science, University of Vermont, VT, United States
    Comput Syst Sci Eng, 2006, 5 (381-392):
  • [32] Detecting Sybil attacks in VANETs
    Yu, Bo
    Xu, Cheng-Zhong
    Xiao, Bin
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2013, 73 (06) : 746 - 756
  • [33] Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
    Alsaedi, Noor
    Hashim, Fazirulhisyam
    Sali, A.
    Rokhani, Fakhrul Z.
    COMPUTER COMMUNICATIONS, 2017, 110 : 75 - 82
  • [34] Physical Identification Based Trust Path Routing Against Sybil Attacks on RPL in IoT Networks
    Kim, Jae-Dong
    Ko, Minseok
    Chung, Jong-Moon
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (05) : 1102 - 1106
  • [35] LETM-IoT: A lightweight and efficient trust mechanism for Sybil attacks in Internet of Things networks
    Hassan, Jawad
    Sohail, Adnan
    Awad, Ali Ismail
    Zaka, M. Ahmed
    AD HOC NETWORKS, 2024, 163
  • [36] An access control for IoT based on network community perception and social trust against Sybil attacks
    de Oliveira, Gustavo H. C.
    de Souza Batista, Agnaldo
    Nogueira, Michele
    dos Santos, Aldri L.
    INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, 2022, 32 (01)
  • [37] A survey of attacks on web services: Classification and countermeasures
    Jensen, Meiko
    Gruschka, Nils
    Herkenhoener, Ralph
    COMPUTER SCIENCE-RESEARCH AND DEVELOPMENT, 2009, 24 (04): : 185 - 197
  • [38] Blockchain-based Multi-Levels Trust Mechanism Against Sybil Attacks for Vehicular Networks
    Haddaji, Achref
    Ayed, Samiha
    Fourati, Lamia Chaari
    2020 IEEE 14TH INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (BIGDATASE 2020), 2020, : 155 - 163
  • [39] Mitigating Sybil Attacks in Federated Learning
    Samy, Ahmed E.
    Girdzijauskas, Sarunas
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 36 - 51
  • [40] Trust enhanced distributed authorisation for web services
    Nagarajan, Aarthi
    Varadharajan, Vijay
    Tarr, Nathan
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (05) : 916 - 934