Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2016, Article ID 5185170, 16 pages
http://dx.doi.org/10.1155/2016/5185170
Research Article

A Fuzzy Collusive Attack Detection Mechanism for Reputation Aggregation in Mobile Social Networks: A Trust Relationship Based Perspective

1College of Information, Mechanical and Electrical Engineering, Shanghai Normal University, Shanghai 200234, China
2The Third Research Institute of Ministry of Public Security, Shanghai 201204, China
3Anhui Boryou Information Technology Co., Ltd., Hefei, Anhui 230000, China

Received 21 November 2015; Revised 25 February 2016; Accepted 6 March 2016

Academic Editor: Claudio Agostino Ardagna

Copyright © 2016 Bo Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. S. P. Borgatti, D. J. Brass, and D. S. Halgin, “Social network research: Confusions, criticisms, and controversies,” Research in the Sociology of Organizations, vol. 40, pp. 1–29, 2014. View at Publisher · View at Google Scholar · View at Scopus
  2. Z. Huang, S. Ruj, M. A. Cavenaghi, M. Stojmenovic, and A. Nayak, “A social network approach to trust management in VANETs,” Peer-to-Peer Networking and Applications, vol. 7, no. 3, pp. 229–242, 2014. View at Publisher · View at Google Scholar · View at Scopus
  3. A. Jøsang, R. Ismail, and C. Boyd, “A survey of trust and reputation systems for online service provision,” Decision Support Systems, vol. 43, no. 2, pp. 618–644, 2007. View at Publisher · View at Google Scholar · View at Scopus
  4. S. D. Kamvar, M. Schlosser, and H. Garcia-Molina, “EigenRep: reputation management in peer-to-peer networks,” in Proceedings of the 12th International World Wide Web Conference (WWW '03), pp. 123–134, Budapest, Hungary, 2003.
  5. A. Kumar, S. K. Gupta, A. K. Rai, and S. Sinha, “Social networking sites and their security issues,” International Journal of Scientific and Research Publications, vol. 3, no. 4, pp. 1–5, 2013. View at Google Scholar
  6. Y. Wang, S. Yao, J. Li, Z. Xia, H. Yan, and J. Xu, “ReSpam: a novel reputation based mechanism of defending against tag spam in social computing,” in Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering (SOSE '14), pp. 338–343, IEEE, Oxford, UK, April 2014. View at Publisher · View at Google Scholar · View at Scopus
  7. B.-H. Cha and S.-I. Choi, “Continuous media fingerprinting against time-varying collusion attacks,” Information Sciences, vol. 298, pp. 66–79, 2015. View at Publisher · View at Google Scholar · View at Scopus
  8. M. G. Pérez, J. E. Tapiador, J. A. Clark, G. M. Pérez, and A. F. S. Gómez, “Trustworthy placements: improving quality and resilience in collaborative attack detection,” Computer Networks, vol. 58, no. 1, pp. 70–86, 2014. View at Publisher · View at Google Scholar · View at Scopus
  9. C. S. Hyder, B. Grebur, L. Xiao, and M. Ellison, “ARC: adaptive reputation based clustering against spectrum sensing data falsification attacks,” IEEE Transactions on Mobile Computing, vol. 13, no. 8, pp. 1707–1719, 2014. View at Publisher · View at Google Scholar · View at Scopus
  10. G. Wang, F. Musau, S. Guo, and M. B. Abdullahi, “Neighbor similarity trust against Sybil attack in P2P E-commerce,” IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 3, pp. 824–833, 2015. View at Publisher · View at Google Scholar · View at Scopus
  11. E. Staab and T. Engel, “Collusion detection for grid computing,” in Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID '09), pp. 412–419, IEEE, Shanghai, China, May 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. Y. Liu, Y. Yang, and Y. L. Sun, “Detection of collusion behaviors in online reputation systems,” in Proceedings of the 42nd Asilomar Conference on Signals, Systems and Computers (ASILOMAR '08), pp. 1368–1372, IEEE, Pacific Grove, Calif, USA, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  13. J. Wu, F. Chiclana, and E. Herrera-Viedma, “Trust based consensus model for social network in an incomplete linguistic information context,” Applied Soft Computing Journal, vol. 35, pp. 827–839, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. M.-R. Motallebi, F. Ishikawa, and S. Honiden, “Trust computation in web service compositions using Bayesian networks,” in Proceedings of the IEEE 19th International Conference on Web Services (ICWS '12), pp. 623–625, Honolulu, Hawaii, USA, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. B. Qureshi, G. Min, and D. Kouvatsos, “A distributed reputation and trust management scheme for mobile peer-to-peer networks,” Computer Communications, vol. 35, no. 5, pp. 608–618, 2012. View at Publisher · View at Google Scholar · View at Scopus
  16. F. G. Marmol, M. G. Perez, and G. M. Perez, “Reporting offensive content in social networks: toward a reputation-based assessment approach,” IEEE Internet Computing, vol. 18, no. 2, pp. 32–40, 2014. View at Publisher · View at Google Scholar
  17. K. Chen, H. Shen, K. Sapra, and G. Liu, “A social network based reputation system for cooperative P2P file sharing,” IEEE Transactions on Parallel & Distributed Systems, vol. 26, no. 8, pp. 2140–2153, 2015. View at Publisher · View at Google Scholar · View at Scopus
  18. F. Hendrikx, K. Bubendorfer, and R. Chard, “Reputation systems: a survey and taxonomy,” Journal of Parallel & Distributed Computing, vol. 75, pp. 184–197, 2015. View at Publisher · View at Google Scholar · View at Scopus
  19. A. A. Selçuk, E. Uzun, and M. R. Pariente, “A reputation-based trust management system for P2P networks,” International Journal of Network Security, vol. 6, no. 3, pp. 235–245, 2008. View at Google Scholar
  20. F. J. Ortega, J. A. Troyano, F. L. Cruz, C. G. Vallejo, and F. Enríquez, “Propagation of trust and distrust for the detection of trolls in a social network,” Computer Networks, vol. 56, no. 12, pp. 2884–2895, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. B. Qureshi, G. Min, and D. Kouvatsos, “Trusted information exchange in peer-to-peer mobile social networks,” Concurrency Computation Practice & Experience, vol. 24, no. 17, pp. 2055–2068, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. B.-Z. He, C.-M. Chen, Y.-P. Su, and H.-M. Sun, “A defence scheme against Identity Theft Attack based on multiple social networks,” Expert Systems with Applications, vol. 41, no. 5, pp. 2345–2352, 2014. View at Publisher · View at Google Scholar · View at Scopus
  23. S. Liu, J. Zhang, C. Miao, Y.-L. Theng, and A. C. Kot, “An integrated clustering-based approach to filtering unfair multi-nominal testimonies,” Computational Intelligence, vol. 30, no. 2, pp. 316–341, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  24. J. Marshall, V. Thakur, and A. Yasinsac, “Identifying flaws in the secure routing protocol,” in Proceedings of the 22nd IEEE International Performance, Computing, and Communications Conference, pp. 167–174, IEEE, April 2003. View at Scopus
  25. Y. Yang, Y. L. Sun, S. Kay, and Q. Yang, “Defending online reputation systems against collaborative unfair raters through signal modeling and trust,” in Proceedings of the ASM Symposium on Applied Computing (SAC '09), pp. 1308–1315, Honolulu, Hawaii, USA, March 2009. View at Publisher · View at Google Scholar
  26. K. Thirunarayan, P. Anantharam, C. Henson, and A. Sheth, “Comparative trust management with applications: bayesian approaches emphasis,” Future Generation Computer Systems, vol. 31, no. 1, pp. 182–199, 2014. View at Publisher · View at Google Scholar · View at Scopus
  27. F. Liu, L. Wang, L. Gao, H. Li, H. Zhao, and S. K. Men, “A web service trust evaluation model based on small-world networks,” Knowledge-Based Systems, vol. 57, no. 2, pp. 161–167, 2014. View at Publisher · View at Google Scholar · View at Scopus
  28. J. S. Weng, C. Y. Miao, and A. Goh, “An entropy-based approach to protecting rating systems from unfair testimonies,” IEICE Transactions on Information & Systems, vol. 89, no. 9, pp. 2502–2511, 2006. View at Publisher · View at Google Scholar · View at Scopus
  29. A. Rossi and S. Pierre, “Collusion-resistant reputation-based intrusion detection system for MANETs,” International Journal of Computer Science and Network Security, vol. 9, no. 11, pp. 8–14, 2009. View at Google Scholar
  30. G. C. Silaghi, F. Araujo, L. M. Silva, P. Domingues, and A. E. Arenas, “Defeating colluding nodes in desktop grid computing platforms,” Journal of Grid Computing, vol. 7, no. 4, pp. 555–573, 2009. View at Publisher · View at Google Scholar · View at Scopus
  31. B. Zhang, H. Yuan, F. Song, and H. Li, “A relationship based collusive attack detection mechanism for reputation aggregation in social network,” in Proceedings of the International Conference on Mechatronics, Electronic, Industrial and Control Engineering, 2014.
  32. M. Jamali and M. Ester, “TrustWalker: a random walk model for combining trust-based and item-based recommendation,” in Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '09), pp. 397–406, ACM, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  33. J. Wu and F. Chiclana, “A social network analysis trust–consensus based approach to group decision-making problems with interval-valued fuzzy reciprocal preference relations,” Knowledge-Based Systems, vol. 59, pp. 97–107, 2014. View at Publisher · View at Google Scholar · View at Scopus