2015
DOI: 10.1109/tpds.2014.2312932
|View full text |Cite
|
Sign up to set email alerts
|

Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce

Abstract: Peer to peer (P2P) e-commerce applications exist at the edge of the Internet with vulnerabilities to passive and active attacks. These attacks have pushed away potential business firms and individuals whose aim is to get the best benefit in e-commerce with minimal losses. The attacks occur during interactions between the trading peers as a transaction takes place. In this paper, we propose how to address Sybil attack, which is a kind of active attack. The peers can have bogus and multiple identity to fake thei… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 35 publications
(8 citation statements)
references
References 19 publications
0
8
0
Order By: Relevance
“…Mehta et al [22] determined that fake users are highly correlated to each other, and he proposed an algorithm based on principal component analysis. Wang et al [23] proposed an approach to eliminate maliciousness among the peers based on the neighbor similarity of peers in a group peer-to-peer (P2P) ecommerce network. These studies inspired us to propose an approach based on user similarities.…”
Section: A Robust Cf Based On Similarities For Service Recommendationmentioning
confidence: 99%
“…Mehta et al [22] determined that fake users are highly correlated to each other, and he proposed an algorithm based on principal component analysis. Wang et al [23] proposed an approach to eliminate maliciousness among the peers based on the neighbor similarity of peers in a group peer-to-peer (P2P) ecommerce network. These studies inspired us to propose an approach based on user similarities.…”
Section: A Robust Cf Based On Similarities For Service Recommendationmentioning
confidence: 99%
“…By utilizing the social network structure and its dynamics, Trifunovic et al [35] proposed two supplementary methods to build social trust: dominant social trust and implicit social trust. In their article on transactions, Wang et al [36] obtained the similarity between the same group of neighbours based on the interest of one pair of partners, and they used the two points Pi and Pj to represent two neighbours and define the Jaccard similarity trust relation between two nodes through Jaccard measurement. Jin et al [37] proposed a trust model based on the evaluation of group similarity; this model can compute the global trust value with similarity between groups as the recommendation reliability, the local trust value, and global trust value can be provided by this model based on the recommended reliability, and they evaluated the model from the perspective of security.…”
Section: Similarity Trustmentioning
confidence: 99%
“…In the works of the authors [23], as a rule, there are methods using hard protection: password protection, cryptographic protection, as well as signature analysis and group detection. These methods are used in networks MANET, IoF, P2P [24], which are not so much limited in resources as groups of mobile robots.…”
Section: Implementation and Detection Of Ddos Attacksmentioning
confidence: 99%