10th EAI International Conference on Performance Evaluation Methodologies and Tools

Research Article

Vulnerability Evaluation of Distributed Reputation Management Systems

  • @INPROCEEDINGS{10.4108/eai.25-10-2016.2266868,
        author={Vincenzo Agate and Alessandra De Paola and Giuseppe Lo Re and Marco Morana},
        title={Vulnerability Evaluation of Distributed Reputation Management Systems},
        proceedings={10th EAI International Conference on Performance Evaluation Methodologies and Tools},
        publisher={ACM},
        proceedings_a={VALUETOOLS},
        year={2017},
        month={5},
        keywords={distributed reputation management security attacks evaluation metrics},
        doi={10.4108/eai.25-10-2016.2266868}
    }
    
  • Vincenzo Agate
    Alessandra De Paola
    Giuseppe Lo Re
    Marco Morana
    Year: 2017
    Vulnerability Evaluation of Distributed Reputation Management Systems
    VALUETOOLS
    ACM
    DOI: 10.4108/eai.25-10-2016.2266868
Vincenzo Agate1, Alessandra De Paola1,*, Giuseppe Lo Re1, Marco Morana1
  • 1: University of Palermo
*Contact email: alessandra.depaola@unipa.it

Abstract

In distributed environments, Reputation Management Systems (RMSs) aim to estimate agents' trustworthiness by exploiting different sources of information. The distributed nature of these systems makes them vulnerable to several types of security attacks, and the response provided by a specific RMS depends on various factors, such as the algorithms adopted for estimating the reputation values and the communication protocols used to enable the cooperation among agents. This work examines the most important security attacks against RMSs and proposes a set of metrics for a quantitative evaluation of the RMS vulnerabilities. A parallel simulation framework is used to automatically give a vulnerability score to a RMS according to the computed metrics. Experiments performed on a case-study RMS show the effectiveness of the metrics we defined, and the convenience of using a simulation environment to support the design of a secure RMS.