Sean Sirur
The Reputation Lag Attack
Sirur, Sean; Muller, Tim
Abstract
Reputation systems and distributed networks are increasingly common. Examples are electronic marketplaces, IoT and ad-hoc networks. The propagation of information through such networks may suffer delays due to, e.g., network connectivity, slow reporting and rating-update delays. It is known that these delays enable an attack called the reputation lag attack. There is evidence of impact of reputation lag attacks on existing trust system proposals. There has not been in-depth formal analysis of the reputation lag attack. Here, we present a formal model capturing the core properties of the attack: firstly, the reputation of an actor failing to reflect their behaviour due to lag and, secondly, a malicious actor exploiting this for their personal gain. This model is then used to prove three key properties of the system and the attacker: if there is no decay of reputation, then the worst-case attacker behaviour is to cooperate initially, then wait, then behave badly; increasing communication between users was found to always be of benefit to the users; performing a specified number of negative interactions given any instance of the system is an NP-hard problem.
Citation
Sirur, S., & Muller, T. (2019, July). The Reputation Lag Attack. Presented at 13th IFIP WG 11.11 International Conference on Trust Management, Copenhagen, Denmark
Presentation Conference Type | Conference Paper (published) |
---|---|
Conference Name | 13th IFIP WG 11.11 International Conference on Trust Management |
Start Date | Jul 17, 2019 |
End Date | Jul 19, 2019 |
Acceptance Date | May 24, 2019 |
Publication Date | Jul 19, 2019 |
Deposit Date | Jul 8, 2019 |
Publicly Available Date | Jul 8, 2019 |
Public URL | https://nottingham-repository.worktribe.com/output/2286298 |
Related Public URLs | http://ifiptm2019.compute.dtu.dk/IFIPTM19/IFIPTM.html |
Contract Date | Jul 8, 2019 |
Files
IFIPTM 2019 Paper 22
(345 Kb)
PDF
You might also like
Is It Harmful when Advisors Only Pretend to Be Honest?
(2016)
Presentation / Conference Contribution
Information Theoretical Analysis of Unfair Rating Attacks under Subjectivity
(2019)
Journal Article
Provably Secure Decisions based on Potentially Malicious Information
(2024)
Journal Article
Quantifying robustness of trust systems against collusive unfair rating attacks using information theory
(-0001)
Presentation / Conference Contribution
Using Information Theory to Improve the Robustness of Trust Systems
(-0001)
Presentation / Conference Contribution
Downloadable Citations
About Repository@Nottingham
Administrator e-mail: discovery-access-systems@nottingham.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search