Information theoretic‐based detection and removal of slander and/or false‐praise attacks for robust trust management with Dempster‐Shafer combination of linguistic fuzzy terms

Critical systems are progressively abandoning the traditional isolated and closed architectures, and adopting more federated solutions, in order to deal with orchestrated decision making within large‐scale infrastructures. Such an increasing connectivity and the possibility of dynamically integrate constituents in a seamless manner by means of a decoupling middleware solution are causing the flouring of novel and previously unseen security threats, such as internal attacks conducted by camouflaged and/or compromised federated systems. Trust management is the most efficient way for dealing with such attacks, so that each constituent computes a trust degree of the other interacting ones based on the direct experiences and of collected reputation scores. An adversary may negatively affect the overall process with false reputations, which must not be considered when estimating a trust degree. Our work combines a multi‐criteria linguistic fuzzy term formulation of the trust degree with the concept of entropy for measuring the divergence of certain scores from the other ones and to avoid to consider them during reputation aggregation. A set of experiments have been conducted in order to measure the quality and effectiveness of the presented approach.

[1]  S. Buchegger,et al.  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .

[2]  Giorgos Zacharia,et al.  Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..

[3]  Yang Xiang,et al.  A novel multiple-level trust management framework for wireless sensor networks , 2014, Comput. Networks.

[4]  Aniruddha S. Gokhale,et al.  Architectural Evolution of Monitor and Control Systems - Issues and Challenges , 2010, Netw. Protoc. Algorithms.

[5]  Didier Dubois,et al.  Fuzzy sets: A survey of engineering applications , 1993 .

[6]  Philippe Smets,et al.  Decision making in the TBM: the necessity of the pignistic transformation , 2005, Int. J. Approx. Reason..

[7]  Lionel Brunie,et al.  Trust management and reputation systems in mobile participatory sensing applications: A survey , 2015, Comput. Networks.

[8]  Fakhri Karray,et al.  Fuzzy entropy: a brief survey , 2001, 10th IEEE International Conference on Fuzzy Systems. (Cat. No.01CH37297).

[9]  Florin Pop,et al.  AFT: Adaptive and fault tolerant peer-to-peer overlay - A user-centric solution for data sharing , 2018, Future Gener. Comput. Syst..

[10]  Andres Sousa-Poza,et al.  System of systems engineering , 2003, IEEE Engineering Management Review.

[11]  Christian Esposito,et al.  Interconnecting Federated Clouds by Using Publish-Subscribe Service , 2013, Cluster Computing.

[12]  Tiger Zhou,et al.  Whole exome sequencing implicates eye development, the unfolded protein response and plasma membrane homeostasis in primary open-angle glaucoma , 2017, PloS one.

[13]  Yongchuan Tang,et al.  A modified belief entropy in Dempster-Shafer framework , 2017, PloS one.

[14]  Lina Yao,et al.  CloudArmor: Supporting Reputation-Based Trust Management for Cloud Services , 2016, IEEE Transactions on Parallel and Distributed Systems.

[15]  Valentin Cristea,et al.  Decentralized Trust Management in Peer-to-Peer Systems , 2011, 2011 10th International Symposium on Parallel and Distributed Computing.

[16]  Ping Li,et al.  Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..

[17]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[18]  José M. Merigó,et al.  Fuzzy aggregation operators in decision making with Dempster-Shafer belief structure , 2012, Expert Syst. Appl..

[19]  Shady Aly,et al.  Fuzzy aggregation and averaging for group decision making: A generalization and survey , 2009, Knowl. Based Syst..

[20]  Peide Liu,et al.  Multiple attribute decision-making method based on 2-dimension uncertain linguistic density generalized hybrid weighted averaging operator , 2018, Soft Comput..

[21]  Zhi-Ping Fan,et al.  A method for group decision-making based on multi-granularity uncertain linguistic information , 2010, Expert Syst. Appl..

[22]  Rolf Oppliger,et al.  Authentication and authorization infrastructures (AAIs): a comparative survey , 2004, Comput. Secur..

[23]  Ananthram Swami,et al.  CATrust: Context-Aware Trust Management for Service-Oriented Ad Hoc Networks , 2018, IEEE Transactions on Services Computing.

[24]  Francisco Herrera,et al.  A Fuzzy Linguistic Methodology to Deal With Unbalanced Linguistic Term Sets , 2008, IEEE Transactions on Fuzzy Systems.

[25]  Valentin Cristea,et al.  Reputation Guided Genetic Scheduling Algorithm for Independent Tasks in Inter-clouds Environments , 2013, 2013 27th International Conference on Advanced Information Networking and Applications Workshops.

[26]  Valentin Cristea,et al.  Reputation Based Selection for Services in Cloud Environments , 2011, 2011 14th International Conference on Network-Based Information Systems.

[27]  Piero P. Bonissone,et al.  Selecting Uncertainty Calculi and Granularity: An Experiment in Trading-off Precision and Complexity , 1985, UAI.

[28]  Christian Esposito,et al.  Smart Cloud Storage Service Selection Based on Fuzzy Logic, Theory of Evidence and Game Theory , 2016, IEEE Transactions on Computers.

[29]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[30]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[31]  Félix Gómez Mármol,et al.  LFTM, linguistic fuzzy trust mechanism for distributed networks , 2012, Concurr. Comput. Pract. Exp..

[32]  Jianhua Lin,et al.  Divergence measures based on the Shannon entropy , 1991, IEEE Trans. Inf. Theory.

[33]  Christian Esposito,et al.  Trust management for distributed heterogeneous systems by using linguistic term sets and hierarchies, aggregation operators and mechanism design , 2017, Future Gener. Comput. Syst..

[34]  Peter Harremoës,et al.  Rényi Divergence and Kullback-Leibler Divergence , 2012, IEEE Transactions on Information Theory.

[35]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[36]  Aamir Saeed Malik,et al.  Trust management system in wireless sensor networks: design considerations and research challenges , 2015, Trans. Emerg. Telecommun. Technol..

[37]  Yue Wu,et al.  Security and trust management in opportunistic networks: a survey , 2015, Secur. Commun. Networks.

[38]  Prakash P. Shenoy,et al.  Entropy of Belief Functions in the Dempster-Shafer Theory: A New Perspective , 2016, BELIEF.

[39]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[40]  Marcello Cinque,et al.  On data dissemination for large-scale complex critical infrastructures , 2012, Comput. Networks.

[41]  Philippe Smets,et al.  The Transferable Belief Model , 1991, Artif. Intell..

[42]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[43]  Yang Liu,et al.  Towards Robust and Effective Trust Management for Security: A Survey , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[44]  Huayou Chen,et al.  Interval-valued hesitant fuzzy Einstein prioritized aggregation operators and their applications to multi-attribute group decision making , 2016, Soft Comput..

[45]  Francisco Herrera,et al.  Hesitant Fuzzy Linguistic Term Sets for Decision Making , 2012, IEEE Transactions on Fuzzy Systems.