8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing

Research Article

EigenTrust++: Attack Resilient Trust Management

Download775 downloads
  • @INPROCEEDINGS{10.4108/icst.collaboratecom.2012.250420,
        author={Xinxin Fan and Ling Liu and Mingchu Li and Zhiyuan Su},
        title={EigenTrust++: Attack Resilient Trust Management},
        proceedings={8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing},
        publisher={IEEE},
        proceedings_a={COLLABORATECOM},
        year={2012},
        month={12},
        keywords={trust reputation management trust propagation feedback rating eigenvector},
        doi={10.4108/icst.collaboratecom.2012.250420}
    }
    
  • Xinxin Fan
    Ling Liu
    Mingchu Li
    Zhiyuan Su
    Year: 2012
    EigenTrust++: Attack Resilient Trust Management
    COLLABORATECOM
    ICST
    DOI: 10.4108/icst.collaboratecom.2012.250420
Xinxin Fan, Ling Liu1, Mingchu Li2,*, Zhiyuan Su2
  • 1: Georgia Institute of Technology
  • 2: Dalian University of Technology
*Contact email: mingchul@dlut.edu.cn

Abstract

This paper argues that trust and reputation models should take into account not only direct experiences (local trust)and experiences from the circle of ”friends”, but also be attack resilient by design in the presence of dishonest feedbacks and sparse network connectivity. We first revisit EigenTrust, one of the most popular reputation systems to date, and identify the inherent vulnerabilities of EigenTrust in terms of its local trust vector, its global aggregation of local trust values, and its eigenvector based reputation propagating model. Then we present EigenTrust++, an attack resilient trust management scheme. EigenTrust++ extends the eigenvector based reputation propagating model, the core of EigenTrust, and counters each of vulnerabilities identified with alternative methods that are by design more resilient to dishonest feedbacks and sparse network connectivity under four known attack models. We conduct extensive experimental evaluation on EigenTrust++, and show that EigenTrust++ can significantly outperform EigenTrust in terms of both performance and attack resilience in the presence of dishonest feedbacks and sparse network connectivity against four representative attack models.