{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T15:38:41Z","timestamp":1770219521787,"version":"3.49.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,7,13]],"date-time":"2013-07-13T00:00:00Z","timestamp":1373673600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/2.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2013,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Indirect trust computation based on recommendations form an important component in trust-based access control models for pervasive environment. It can provide the service provider the confidence to interact with unknown service requesters. However, recommendation-based indirect trust computation is vulnerable to various types of attacks. This paper proposes a defense mechanism for filtering out dishonest recommendations based on a measure of dissimilarity function between the two subsets. A subset of recommendations with the highest measure of dissimilarity is considered as a set of dishonest recommendations. To analyze the effectiveness of the proposed approach, we have simulated three inherent attack scenarios for recommendation models (bad mouthing, ballot stuffing, and random opinion attack). The simulation results show that the proposed approach can effectively filter out the dishonest recommendations based on the majority rule. A comparison between the exiting schemes and our proposed approach is also given.<\/jats:p>","DOI":"10.1186\/1687-1499-2013-189","type":"journal-article","created":{"date-parts":[[2013,7,13]],"date-time":"2013-07-13T00:14:26Z","timestamp":1373674466000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["A mechanism for detecting dishonest recommendation in indirect trust computation"],"prefix":"10.1186","volume":"2013","author":[{"given":"Naima","family":"Iltaf","sequence":"first","affiliation":[]},{"given":"Abdul","family":"Ghafoor","sequence":"additional","affiliation":[]},{"given":"Uzman","family":"Zia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,13]]},"reference":[{"key":"777_CR1","first-page":"184","volume-title":"Workshop on Formal Aspects of Security and Trust","author":"W Wagealla","year":"2003","unstructured":"Wagealla W, Carbone M, English C, Terzis S, Nixon P: A formal model on trust lifecycle management. In Workshop on Formal Aspects of Security and Trust. Pisa; 9\u201312 September 2003:184-195."},{"key":"777_CR2","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1007\/3-540-44875-6_10","volume-title":"1st International Conference on Trust Management","author":"C English","year":"2003","unstructured":"English C, Wagealla W, Nixon P, Terzis S, McGettrick A, Lowe H: Trusting collaboration in global computing. In 1st International Conference on Trust Management. Hiedelberg: Springer; 2003:136-149."},{"key":"777_CR3","first-page":"153","volume-title":"Proceedings of the First IEEE International Conference on Pervasive Computing Communications","author":"B Shand","year":"2003","unstructured":"Shand B, Dimmock N, Bacon J: Trust for ubiquitous,transparent collaboration. In Proceedings of the First IEEE International Conference on Pervasive Computing Communications. Los Alamitos: IEEE; 2003:153-160."},{"key":"777_CR4","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1109\/EUC.2008.149","volume":"2","author":"MK Deno","year":"2008","unstructured":"Deno MK, Sun T: Probabilistic trust management in pervasive computing. IEEE\/IFIP Int. Conf. Embedded Ubiquitous Comput 2008, 2: 610-615.","journal-title":"IEEE\/IFIP Int. Conf. Embedded Ubiquitous Comput"},{"key":"777_CR5","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1186\/1687-1499-2012-119","volume":"2012","author":"N Iltaf","year":"2012","unstructured":"Iltaf N, Ghafoor A, Hussain M: Modeling interaction using trust and recommendation in ubiquitous computing environment. EURASIP J. Wireless Commun. Netw 2012, 2012: 119. 10.1186\/1687-1499-2012-119","journal-title":"EURASIP J. Wireless Commun. Netw"},{"key":"777_CR6","first-page":"687","volume":"9","author":"F Almenarez","year":"2011","unstructured":"Almenarez F, Marin A, Diaz D, Cortes A, Campo C, Garcia C: Trust management for multimedia P2P applications in autonomic networking. Adhoc Netw 2011, 9: 687-690.","journal-title":"Adhoc Netw"},{"issue":"1","key":"777_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1592451.1592452","volume":"42","author":"K Hoffman","year":"2009","unstructured":"Hoffman K, Zage D, Nita-Rotaru C: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 2009, 42(1):1-31.","journal-title":"ACM Comput. Surv"},{"key":"777_CR8","doi-asserted-by":"crossref","first-page":"495","DOI":"10.1109\/FSKD.2009.303","volume-title":"Sixth International Conference on Fuzzy Systems and Knowledge Discovery","author":"Z Zhang","year":"2009","unstructured":"Zhang Z, Feng X: New methods for deviation-based outlier detection in large database. In Sixth International Conference on Fuzzy Systems and Knowledge Discovery. Los Alamitos: IEEE; 2009:495-499."},{"issue":"2","key":"777_CR9","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A Josang","year":"2007","unstructured":"Josang A, Ismail R, Boyd C: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 2007, 43(2):618-644. 10.1016\/j.dss.2005.05.019","journal-title":"Decis. Support Syst"},{"issue":"7","key":"777_CR10","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L Xiong","year":"2004","unstructured":"Xiong L, Liu L: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Engr 2004, 16(7):843-857. 10.1109\/TKDE.2004.1318566","journal-title":"IEEE Trans. Knowl. Data Engr"},{"key":"777_CR11","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1145\/501158.501175","volume-title":"3rd ACM Conference on Electronic Commerce","author":"M Chen","year":"2001","unstructured":"Chen M, Singh JP: Computing and using reputations for internet ratings. In 3rd ACM Conference on Electronic Commerce. New York: ACM; 2001:154-162."},{"key":"777_CR12","first-page":"38","volume-title":"8th International Conference on Web Information Systems Engineering","author":"Z Malik","year":"2007","unstructured":"Malik Z, Bouguettaya A: Evaluating rater credibility for reputation assessment of web services. In 8th International Conference on Web Information Systems Engineering. Heidelberg: Springer; 2007:38-49."},{"key":"777_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1362542.1362546","volume":"4","author":"S Ganeriwal","year":"2008","unstructured":"Ganeriwal S, Balzano LK, Srivastava MB: Reputation-based framework for high integrity sensor networks. ACM Trans. Sensor Netw. 2008, 4: 1-37.","journal-title":"ACM Trans. Sensor Netw"},{"issue":"4","key":"777_CR14","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","volume":"18","author":"R Zhou","year":"2007","unstructured":"Zhou R, Hwang K: Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distributed Syst. 2007, 18(4):460-473.","journal-title":"IEEE Trans. Parallel Distributed Syst"},{"key":"777_CR15","first-page":"246","volume-title":"IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications","author":"X Liu","year":"2012","unstructured":"Liu X, Datta A, Fang H, Zhang J: Detecting imprudence of reliable sellers in online auction sites. In IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications. Los Alamitos: IEEE; 2012:246-253."},{"issue":"2","key":"777_CR16","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.dss.2006.11.003","volume":"43","author":"C Ziegler","year":"2007","unstructured":"Ziegler C, Golbeck J: Investigating interactions of trust and interest similarity, Decision Support Systems. 2007, 43(2):460-475.http:\/\/dx.doi.org\/10.1016\/j.dss.2006.11.003","journal-title":"Decision Support Systems"},{"key":"777_CR17","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1109\/ASONAM.2010.40","volume-title":"2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","author":"I Varlamis","year":"2010","unstructured":"Varlamis I, Eirinaki M, Louta M: A study on social network metrics and their application in trust networks. In 2010 International Conference on Advances in Social Networks Analysis and Mining (ASONAM). Los Alamitos: IEEE; 2010:168-175."},{"key":"777_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/978-3-642-28942-2_9","volume-title":"Hybrid Artificial Systems","author":"E Davoodi","year":"2012","unstructured":"Davoodi E, Afsharchi M, Kianmehr K: A social network-based approach to expert recommendation system. In Hybrid Artificial Systems. Heidelberg: Springer; 2012:91-102."},{"key":"777_CR19","first-page":"203","volume-title":"32nd International ACM SIGIR Conference on Research and Development in Information Retrieval","author":"H Ma","year":"2006","unstructured":"Ma H, King I, Lyu M: Learning to recommend with social trust ensemble. In 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM; 2006:203-210."},{"key":"777_CR20","volume-title":"Proceedings of the Workshop on Security and Privacy in Pervasive Computing, SPPC\u201904","author":"F Almenarez","year":"2004","unstructured":"Almenarez F, Marin A, Diaz D, Cortes A, Campo C, Garcia C: Managing ad-hoc trust relationships in pervasive computing environments. In Proceedings of the Workshop on Security and Privacy in Pervasive Computing, SPPC\u201904. Vienna; 20 April 2004."},{"key":"777_CR21","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1145\/352871.352889","volume-title":"2nd ACM Conference on Electronic Commerce","author":"C Dellarocas","year":"2000","unstructured":"Dellarocas C: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In 2nd ACM Conference on Electronic Commerce. New York: ACM; 2000:150-157."},{"key":"777_CR22","volume-title":"Comput. Intell","author":"S Liu","year":"2012","unstructured":"Liu S, Zhang J, Miao C, Theng Y, Kot A: An integrated clustering-based approach to filtering unfair multi-nominal testimonies. Comput. Intell. 2012. http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1467-8640.2012.00464.x\/full"},{"key":"777_CR23","first-page":"106","volume-title":"3rd International Joint Conference on Autonomous Agents and Multi Agent Systems","author":"A Whitby","year":"2005","unstructured":"Whitby A, Josang A, Indulska J: Filtering out unfair ratings in Bayesian reputation systems. In 3rd International Joint Conference on Autonomous Agents and Multi Agent Systems. Washington: IEEE; 2005:106-117."},{"issue":"9","key":"777_CR24","doi-asserted-by":"publisher","first-page":"2502","DOI":"10.1093\/ietisy\/e89-d.9.2502","volume":"89","author":"J Weng","year":"2006","unstructured":"Weng J, Miao C, Goh A: An entropy-based approach to protecting rating systems from unfair testimonies. IEICE Trans. Inf. Syst 2006, 89(9):2502-2511.","journal-title":"IEICE Trans. Inf. Syst"},{"issue":"2","key":"777_CR25","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/j.jss.2009.09.040","volume":"83","author":"SI Ahamed","year":"2010","unstructured":"Ahamed SI, Haque M, Endadul M, Rahman F, Talukder N: Design, analysis, and deployment of omnipresent formal trust model (FTM) with trust bootstrapping for pervasive environments. J. Syst. Software 2010, 83(2):253-270. 10.1016\/j.jss.2009.09.040","journal-title":"J. Syst. Software"},{"issue":"3","key":"777_CR26","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.comcom.2010.01.023","volume":"34","author":"MK Deno","year":"2011","unstructured":"Deno MK, Sun T, Woungang I: Trust management in ubiquitous computing: a Bayesian approach. Comput. Commun. 2011, 34(3):398-406. 10.1016\/j.comcom.2010.01.023","journal-title":"Comput. Commun"},{"key":"777_CR27","first-page":"164","volume-title":"2nd International Conference on Data Mining and Knowledge Discovery","author":"A Arning","year":"1996","unstructured":"Arning A, Agrawal R, Raghavan P: A linear method for deviation detection in large databases. In 2nd International Conference on Data Mining and Knowledge Discovery. Portland: AAAI; 1996:164-169."},{"key":"777_CR28","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/0005-2795(75)90109-9","volume":"405","author":"BW Matthews","year":"1975","unstructured":"Matthews BW: Comparison of the predicted and observed secondary structure of T4 phage lysozyme. Biochim. Biophys. Acta 1975, 405: 442-451. 10.1016\/0005-2795(75)90109-9","journal-title":"Biochim. Biophys. Acta"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-189.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1687-1499-2013-189\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1687-1499-2013-189.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T01:07:43Z","timestamp":1630544863000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/1687-1499-2013-189"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,13]]},"references-count":28,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["777"],"URL":"https:\/\/doi.org\/10.1186\/1687-1499-2013-189","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,13]]},"assertion":[{"value":"16 December 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2013","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 July 2013","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"189"}}