Information theoretic-based detection and removal of slander and/or false-praise attacks for robust trust management with Dempster-Shafer combination of linguistic fuzzy terms
Corresponding Author
Christian Esposito
Department of Computer Science, University of Salerno, Fisciano, Italy
Correspondence
Christian Esposito, Department of Computer Science, University of Salerno, Fisciano, Italy.
Email: [email protected]
Search for more papers by this authorAniello Castiglione
Department of Computer Science, University of Salerno, Fisciano, Italy
Search for more papers by this authorFrancesco Palmieri
Department of Computer Science, University of Salerno, Fisciano, Italy
Search for more papers by this authorCorresponding Author
Christian Esposito
Department of Computer Science, University of Salerno, Fisciano, Italy
Correspondence
Christian Esposito, Department of Computer Science, University of Salerno, Fisciano, Italy.
Email: [email protected]
Search for more papers by this authorAniello Castiglione
Department of Computer Science, University of Salerno, Fisciano, Italy
Search for more papers by this authorFrancesco Palmieri
Department of Computer Science, University of Salerno, Fisciano, Italy
Search for more papers by this authorSummary
Critical systems are progressively abandoning the traditional isolated and closed architectures, and adopting more federated solutions, in order to deal with orchestrated decision making within large-scale infrastructures. Such an increasing connectivity and the possibility of dynamically integrate constituents in a seamless manner by means of a decoupling middleware solution are causing the flouring of novel and previously unseen security threats, such as internal attacks conducted by camouflaged and/or compromised federated systems. Trust management is the most efficient way for dealing with such attacks, so that each constituent computes a trust degree of the other interacting ones based on the direct experiences and of collected reputation scores. An adversary may negatively affect the overall process with false reputations, which must not be considered when estimating a trust degree. Our work combines a multi-criteria linguistic fuzzy term formulation of the trust degree with the concept of entropy for measuring the divergence of certain scores from the other ones and to avoid to consider them during reputation aggregation. A set of experiments have been conducted in order to measure the quality and effectiveness of the presented approach.
REFERENCES
- 1Keating C, Rogers R, Unal R, et al. System of systems engineering. J Eng Manage. 2003; 15(3): 36-45.
- 2Boardman J, Pallas S, Sauser BJ, Verma D. Report on system of systems engineering. Stevens Institute of Technology. 2006. http://www.boardmansauser.com/downloads/SoSSEreporttoDoD.pdf.
- 3Cinque M, Di Martino C, Esposito C. On data dissemination for large-scale complex critical infrastructures. Comput Netw. 2012; 56(4): 1215-1235.
- 4Lopez J, Oppliger R, Pernul G. Authentication and authorization infrastructures (AAIs): a comparative survey. Comp Secur. 2004; 23(7): 578-590.
- 5Grandison T, Sloman M. A survey of trust in internet applications. IEEE Commun Surv Tut. 2000; 3(4): 2-16.
10.1109/COMST.2000.5340804 Google Scholar
- 6Visan A, Pop F, Cristea V. Decentralized trust management in peer-to-peer systems. In: Proceedings of the 10th International Symposium on Parallel and Distributed Computing, Cluj Napoca, Romania; 2011: 232-239.
- 7Pop F, Cristea V, Bessis N, Sotiriadis S. Reputation guided genetic scheduling algorithm for independent tasks in inter-clouds environments. In: Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, Barcelona, Spain; 2013: 772-776.
- 8Achim OM, Pop F, Cristea V. Reputation based selection for services in cloud environments. In: Proceedings of the 14th International Conference on Network-Based Information Systems, Tirana, Albania; 2011: 268-273.
- 9Poenaru A, Istrate R, Pop F. AFT: adaptive and fault tolerant peer-to-peer overlay—a user-centric solution for data sharing. Futur Gener Comput Syst. 2016.
- 10Esposito C, Castiglione A, Palmieri F, Ficco M. Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design. Futur Gener Comput Syst. 2017; 74: 325-336.
- 11Buchegger S, Le Boudec J-Y. A robust reputation system for peer-to-peer and mobile ad-hoc networks. In: Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems (P2PEcon), Cambridge, USA; 2004 June.
- 12Zhang B, Huang Z, Xiang Y. A novel multiple-level trust management framework for wireless sensor networks. Comput Netw. 2014; 72: 45-61.
- 13Lin J. Divergence measures based on the Shannon entropy. IEEE Trans Inf Theory. 1991; 37(1): 145-151.
- 14Al-sharhan S, Karray F, Gueaieb W, Basir O. Fuzzy entropy: a brief survey. Proceedings of the 10th IEEE International Conference on Fuzzy Systems. 2001; 3: 1135-1139.
- 15Jiroušek R, Shenoy P. P. Entropy of belief functions in the Dempster-Shafer theory: a new perspective. In: Proceedings of the 4th International Conference on Belief Functions: Theory and Applications, Prague, Czech Republic; 2016: 3-13.
- 16Esposito C, Ficco M, Palmieri F, Castiglione A. Smart cloud storage service selection based on fuzzy logic, theory of evidence and game theory. IEEE Trans Comput. 2016; 65(8): 2348-2362.
- 17Chu Y-H, Feigenbaum J, LaMacchia B, Resnick P, Strauss M. Referee: trust management for web applications. CNS. 1997; 29(8-13): 953-964.
- 18Moses T. eXtensible Access Control Markup Language (XACML)—OASIS Standard. http://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf.
- 19Zacharia G, Maes P. Trust management through reputation mechanisms. Appl Artif Intell Int J. 2000; 14(9): 881-907.
- 20Esposito C, Cotroneo D, Gokhale A, Schmidt D. Architectural evolution of monitor and control systems - issues and challenges. Network Protoc Algorithms. 2010; 2(3): 1-17.
- 21Esposito C, Ficco M, Palmieri F, Castiglione A. Interconnecting federated clouds by using publish-subscribe service. Clust Comput. 2013; 16(4): 887-903.
- 22Dubois D, Prade H. Fuzzy sets: a survey of engineering applications. Comp Chem Eng. 1993; 17: S373-S380.
- 23Marmol F. Gomez, Marin-Blazquez JG, Perez G. Martinez. LFTM, linguistic fuzzy trust mechanism for distributed networks. Concurrency Computat: Pract Exper. 2012; 24(17): 2007-2027.
- 24Bonissone P, Decker K. Selecting uncertainty calculi and granularity: an experiment in trading-off precision and complexity. In: Proceedings of the First Annual Conference on Uncertainty in Artificial Intelligence (UAI), Los Angeles, USA; 1985: 57-66.
- 25Shaikh RA, Jameel H, d'Auriol BJ, Lee H, Lee S, Song YJ. Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans Parallel Distrib Syst. 2009; 20(11): 1698-1712.
- 26Lopez J, Roman R, Agudo I, Fernandez-Gago C. Trust management systems for wireless sensor networks: best practices. Comput Commun. 2010; 33(9): 1086-1093.
- 27Mousa H, Mokhtar SB, Hasan O, Younes O, Hadhoud M, Brunie L. Trust management and reputation systems in mobile participatory sensing applications: a survey. Comput Netw. 2015; 90: 49-73.
10.1016/j.comnet.2015.07.011 Google Scholar
- 28Yu Y, Li K, Zhou W, Li P. Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J Netw Comput Appl. 2012; 35(3): 867-880.
- 29Wang D, Muller T, Liu Y, Zhang J. Towards robust and effective trust management for security: a survey. In: Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China; 2014: 511-518.
- 30Noor TH, Sheng QZ, Yao L, Dustdar S, Ngu AHH. Cloudarmor: supporting reputation-based trust management for cloud services. EEE Trans Parallel Distrib Syst. 2016; 27(2): 367-380.
- 31Wu Y, Zhao Y, Riguidel M, Wang G, Yi P. Security and trust management in opportunistic networks: a survey. Secur Commun Networks. 2015; 8(9): 1812-1827.
- 32Ishmanov F, Malik AS, Kim SW, Begalov B. Trust management system in wireless sensor networks: design considerations and research challenges. ETT. 2015; 26(2): 107-130.
- 33Wang Y, Chen IR, Cho JH, Swami A, Lu YC, Lu CT, Tsai J. Catrust: Context-aware trust management for service-oriented ad hoc networks. IEEE Trans Serv Comput. 2017; PP(99): 1-1.
- 34Rodriguez RM, Martinez L, Herrera F. Hesitant fuzzy linguistic term sets for decision making. IEEE Trans Fuzzy Syst. 2012; 20(1): 109-119.
- 35Herrera F, Herrera-Viedma E, Martinez L. A fuzzy linguistic methodology to deal with unbalanced linguistic term sets. IEEE Trans Fuzzy Syst. 2008; 16(2): 354-370.
- 36Fan Z-P, Liu Y. A method for group decision-making based on multi-granularity uncertain linguistic information. Expert Syst Appl. 2010; 37(5): 4000-4008.
- 37Vaníček J, Vrana I, Aly S. Fuzzy aggregation and averaging for group decision making: a generalization and survey. Knowl-Based Syst. 2009; 22(1): 79-84.
10.1016/j.knosys.2008.07.002 Google Scholar
- 38Liu P, Teng F. Multiple attribute decision-making method based on 2-dimension uncertain linguistic density generalized hybrid weighted averaging operator. Soft Comput. October 2016: 1-14.
- 39Jin F, Ni Z, Chen H. Interval-valued hesitant fuzzy einstein prioritized aggregation operators and their applications to multi-attribute group decision making. Soft Comput. 2016; 20(5): 1863-1878.
- 40Casanovas M, Merigó JM. Fuzzy aggregation operators in decision making with Dempster-Shafer belief structure. Expert Syst Appl. 2012; 39(8): 7138-7149.
- 41Yu B, Singh MP. An evidential model of distributed reputation management. In: Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1, Bologna, Italy; 2002: 294-301.
- 42Sentz K, Ferson S. Combination of evidence in Dempster-Shafer theory. Report SAND 2002-0835, Sandia National Laboratories; 2002.
- 43Smets P, Kennes R. The transferable belief model. Artif Intell. 1994; 66(2): 191-234.
- 44Smets P. Decision making in the TBM: the necessity of the pignistic transformation. Int J Approx Reason. 2005; 38(2): 133-147.
- 45Zhou D, Tang Y, Jiang W. A modified belief entropy in Dempster-Shafer framework. PLOS ONE. 201705; 12(5): 1-17.
- 46van Erven T, Harremos P. Rényi Divergence and Kullback-Leibler divergence. IEEE Trans Inf Theory. 2014; 60(7): 3797-3820.