Voting systems with trust mechanisms in cyberspace: Vulnerabilities and defenses
Document Type
Article
Date of Original Version
11-12-2010
Abstract
With the popularity of voting systems in cyberspace, there is growing evidence that current voting systems can be manipulated by fake votes. This problem has attracted many researchers working on guarding voting systems in two areas: relieving the effect of dishonest votes by evaluating the trust of voters, and limiting the resources that can be used by attackers, such as the number of voters and the number of votes. In this paper, we argue that powering voting systems with trust and limiting attack resources are not enough. We present a novel attack named as Reputation Trap (RepTrap). Our case study and experiments show that this new attack needs much less resources to manipulate the voting systems and has a much higher success rate compared with existing attacks. We further identify the reasons behind this attack and propose two defense schemes accordingly. In the first scheme, we hide correlation knowledge from attackers to reduce their chance to affect the honest voters. In the second scheme, we introduce robustness-of-evidence, a new metric, in trust calculation to reduce their effect on honest voters. We conduct extensive experiments to validate our approach. The results show that our defense schemes not only can reduce the success rate of attacks but also significantly increase the amount of resources an adversary needs to launch a successful attack. © 2006 IEEE.
Publication Title, e.g., Journal
IEEE Transactions on Knowledge and Data Engineering
Volume
22
Issue
12
Citation/Publisher Attribution
Feng, Qinyuan, Yan L. Sun, Ling Liu, Yafei Yang, and Yafei Dai. "Voting systems with trust mechanisms in cyberspace: Vulnerabilities and defenses." IEEE Transactions on Knowledge and Data Engineering 22, 12 (2010): 1766-1780. doi: 10.1109/TKDE.2009.214.