Security

Voting Systems With Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses

Free registration required

Executive Summary

With the popularity of voting systems in cyberspace, there is growing evidence that current voting systems can be manipulated by fake votes. This problem has attracted many researchers working on guarding voting systems in two areas: relieving the effect of dishonest votes by evaluating the trust of voters, and limiting the resources that can be used by attackers, such as the number of voters and the number of votes. This paper argues that powering voting systems with trust and limiting attack resources are not enough. This paper presents a novel attack named as Reputation Trap (RepTrap). The case study and experiments show that this new attack needs much less resources to manipulate the voting systems.

  • Format: PDF
  • Size: 600.8 KB