Attack category | Countermeasure |
Data Integrity Attacks
(Both for data stored and data routed between nodes)
|
- Public key infrastructures and encryption (see Credence [], PeerTrust [])
- Majority voting mechanisms (see PeerTrust [])
- Trusted third parties (see EigenTrust [], TrustMe[])
- Other cryptographic algorithms/protocols, such as self-certifying data
[], signed files (see Past []),
information dispersal (see Publius [], Mnemosyne
[]), secret sharing schemes (see [])
|
Data Confidentiality Attacks (both for data stored and routed)
|
- Public key infrastructures and encryption (see XRep [], EigenTrust [])
- Secure routing protocols []
|
Identification-Related Attacks (e.g. pseudospoofing, Sybill attack,
ID-stealth, decoy and white-washing
[], impersonation attacks [])
|
- Trusted identity-certifying agents []
- Public key infrastructures and certificates []
|
Bootstrapping Phase Attacks
(e.g. malicious node insertions in the network)
|
- Majority quorum approaches []
- Resource-based reputation approaches []
|