12,000

We have over 12,000 students, from over 100 countries, within one of the safest campuses in the UK

93%

93% of Lancaster students go into work or further study within six months of graduating

Home > Research > Publications & Outputs > Attacks and Vulnerabilities of Trust and Reputa...
View graph of relations

« Back

Attacks and Vulnerabilities of Trust and Reputation Models

Research output: Contribution in Book/Report/ProceedingsChapter

Published

Publication date2013
Host publicationAgreement Technologies
EditorsSascha Ossowski
Place of publicationDordrecht
PublisherSpringer Verlag
Pages467-477
Number of pages11
ISBN (Electronic)978-94-007-5583-3
ISBN (Print)978-94-007-5582-6
Original languageEnglish

Publication series

NameLaw, Governance and Technology Series
PublisherSpringer
Volume8

Abstract

Most of the current reputation models suffer from some common vulnerabilities. This means that malicious agents may be able to perform attacks that exploit these vulnerabilities, which has the potential to cause much harm such as monetary losses and to place the whole system in jeopardy. In this chapter we detail some of the most important vulnerabilities of current reputation models. We also detail examples of attacks that take advantage of these vulnerabilities in order to achieve strategic manipulation of reputation models. Moreover, we review works that partially/fully address these vulnerabilities, and thus, prevent possible attacks from being successful.