Attacks and Vulnerabilities of Trust and Reputation Models

0Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Most of the current reputation models suffer from some common vulnerabilities. This means that malicious agents may be able to perform attacks that exploit these vulnerabilities, which has the potential to cause much harm such as monetary losses and to place the whole system in jeopardy. In this chapter we detail some of the most important vulnerabilities of current reputation models. We also detail examples of attacks that take advantage of these vulnerabilities in order to achieve strategic manipulation of reputation models. Moreover, we review works that partially/fully address these vulnerabilities, and thus, prevent possible attacks from being successful.

Cite

CITATION STYLE

APA

Such, J. M. (2013). Attacks and Vulnerabilities of Trust and Reputation Models. In Law, Governance and Technology Series (Vol. 8, pp. 467–477). Springer Nature. https://doi.org/10.1007/978-94-007-5583-3_27

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free