{"title":"An attack resistant method for detecting dishonest recommendations in pervasive computing environment","authors":"N. Iltaf, Abdul Ghafoor, Usman Zia","doi":"10.1109/ICON.2012.6506554","DOIUrl":null,"url":null,"abstract":"An attack resistant method for indirect trust computation (based on recommendation) for pervasive computing environment is proposed. The method extends a mechanism to detect outliers in dataset presented in [19] and apply it to filter out malicious recommendations in indirect trust computation. The method is based on a dissimilarity metric based on the statistical distribution of the recommendations grouped into recommendation classes. The proposed model has been evaluated in different attack scenarios (bad mouthing, ballot stuffing and random attack). The model has also been compared with other existing evolutionary recommendation models in this field, and it is shown that the proposed approach can effectively filter out dishonest recommendations provided that the number of dishonest recommendations is less than the number of honest recommendations.","PeriodicalId":234594,"journal":{"name":"2012 18th IEEE International Conference on Networks (ICON)","volume":"274 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 18th IEEE International Conference on Networks (ICON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICON.2012.6506554","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
An attack resistant method for indirect trust computation (based on recommendation) for pervasive computing environment is proposed. The method extends a mechanism to detect outliers in dataset presented in [19] and apply it to filter out malicious recommendations in indirect trust computation. The method is based on a dissimilarity metric based on the statistical distribution of the recommendations grouped into recommendation classes. The proposed model has been evaluated in different attack scenarios (bad mouthing, ballot stuffing and random attack). The model has also been compared with other existing evolutionary recommendation models in this field, and it is shown that the proposed approach can effectively filter out dishonest recommendations provided that the number of dishonest recommendations is less than the number of honest recommendations.