The Community for Technology Leaders
Green Image
Issue No. 12 - December (2010 vol. 22)
ISSN: 1041-4347
pp: 1766-1780
Qinyuan Feng , Peking University, Beijing
Ling Liu , Georgia Institute of Technology, Atlanta
Yafei Yang , University of Rhode Island, Kingston
Yan Lindsay Sun , University of Rhode Island, Kingston
Yafei Dai , Peking University, Beijing
ABSTRACT
With the popularity of voting systems in cyberspace, there is growing evidence that current voting systems can be manipulated by fake votes. This problem has attracted many researchers working on guarding voting systems in two areas: relieving the effect of dishonest votes by evaluating the trust of voters, and limiting the resources that can be used by attackers, such as the number of voters and the number of votes. In this paper, we argue that powering voting systems with trust and limiting attack resources are not enough. We present a novel attack named as Reputation Trap (RepTrap). Our case study and experiments show that this new attack needs much less resources to manipulate the voting systems and has a much higher success rate compared with existing attacks. We further identify the reasons behind this attack and propose two defense schemes accordingly. In the first scheme, we hide correlation knowledge from attackers to reduce their chance to affect the honest voters. In the second scheme, we introduce robustness-of-evidence, a new metric, in trust calculation to reduce their effect on honest voters. We conduct extensive experiments to validate our approach. The results show that our defense schemes not only can reduce the success rate of attacks but also significantly increase the amount of resources an adversary needs to launch a successful attack.
INDEX TERMS
Voting system, trust mechanism, reputation system, security.
CITATION
Qinyuan Feng, Ling Liu, Yafei Yang, Yan Lindsay Sun, Yafei Dai, "Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses", IEEE Transactions on Knowledge & Data Engineering, vol. 22, no. , pp. 1766-1780, December 2010, doi:10.1109/TKDE.2009.214
92 ms
(Ver 3.1 (10032016))