Engineering Trust Based Collaborations in a Global Computing Environment (original) (raw)
Related papers
Enhanced Reputation Mechanism for Mobile Ad Hoc Networks
Lecture Notes in Computer Science, 2004
Interactions between entities unknown to each other are inevitable in the ambient intelligence vision of service access anytime, anywhere. Trust management through a reputation mechanism to facilitate such interactions is recognized as a vital part of mobile ad hoc networks, which features lack of infrastructure, autonomy, mobility and resource scarcity of composing lightweight terminals. However, the design of a reputation mechanism is faced by challenges of how to enforce reputation information sharing and honest recommendation elicitation. In this paper, we present a reputation model, which incorporates two essential dimensions, time and context, along with mechanisms supporting reputation formation, evolution and propagation. By introducing the notion of recommendation reputation, our reputation mechanism shows effectiveness in distinguishing truth-telling and lying agents, obtaining true reputation of an agent, and ensuring reliability against attacks of defame and collusion.
A robust reputation system for mobile ad-hoc networks
Proceedings of P2PEcon, 2004
Reputation systems in mobile ad-hoc networks can be tricked by the spreading of false reputation ratings, be it false accusations or false praise. Simple solutions such as exclusively relying on one's own direct observations have drawbacks, as they do not make use of all the information available. We propose a fully distributed reputation system that can cope with false disseminated information. In our approach, everyone maintains a reputation rating and a trust rating about everyone else that they care about. From time to time first-hand reputation information is exchanged with others; using a modified Bayesian approach we designed and present in this paper, only second-hand reputation information that is not incompatible with the current reputation rating is accepted. Thus, reputation ratings are slightly modified by accepted information. Trust ratings are updated based on the compatibility of second-hand reputation information with prior reputation ratings. Data is entirely distributed: someone's reputation and trust is the collection of ratings maintained by others. We enable node redemption and prevent the sudden exploitation of good reputation built over time by introducing re-evaluation and reputation fading. We present the application of our generic reputation system to the context of neighborhood watch in mobile ad-hoc networks, specifically to the CONFIDANT [3] protocol for the detection and isolation of nodes exhibiting routing or forwarding misbehavior. We evaluate the performance by simulation.
An incentive compatible reputation mechanism for ubiquitous computing environments
International Journal of Information Security, 2007
The vision of ubiquitous computing is becoming a reality thanks to the advent of portable devices and the advances in wireless networking technologies. It aims to facilitate user tasks through seamless utilization of services available in the surrounding environments. In such distributed environments featuring openness, interactions, especially service provision and consumption, between entities that are unknown or barely known to each other, are commonplace. Trust management through reputation mechanism to facilitate such interactions is recognized as an important element of ubiquitous computing. It is, however, faced by the problems of how to stimulate reputation information sharing and honest recommendation elicitation. We present in this paper an incentive compatible reputation mechanism to facilitate the trustworthiness evaluation in ubiquitous computing environments. It is based on probability theory and supports reputation evolution and propagation. Our reputation mechanism not only shows robustness against lies, but also stimulates honest and active recommendations. The latter is realized by ensuring that active and honest recommenders, compared to inactive or dishonest ones, can elicit the most honest (helpful) recommendations and thus suffer the least number of wrong trust decisions, as validated by simulation based evaluation.
A Candour-based Trust and Reputation Management System for Mobile Ad Hoc Networks
The decentralized administrative controlled-nature of mobile ad hoc networks (MANETs) presents security vulnerabilities which can lead to attacks such as malicious modification of packets. To enhance security in MANETs, Trust and Reputation Management systems (TRM) have been developed to serve as measures in mitigating threats arising from unusual behaviours of nodes. In this paper we propose a candour-based trust and reputation system which measures and models reputation and trust propagation in MANETs. In the proposed model Dirichlet Probability Distribution is employed in modelling the individual reputation of nodes and the trust of each node is computed based on the node’s actual network performance and the quality of the recommendations it gives about other nodes. Cooperative nodes in our model will be rewarded for expanding their energy in forwarding packets for other nodes or for disseminating genuine recommendations. Uncooperative nodes are isolated and denied the available network resources. We employed the Ruffle algorithm which will ensure that cooperative nodes are allowed to activate sleep mode when their service is not required in forwarding packets for its neighbouring trustworthy nodes. The proposed TRM system enshrines fairness in its mode of operation as well as creating an enabling environment free from bias. It will also ensure a connected and capacity preserving network of trustworthy nodes.
A Graph-Based Approach to Address Trust and Reputation in Ubiquitous Networks
2013 IEEE Seventh International Symposium on Service-Oriented System Engineering, 2013
The increasing popularity of virtual computing environments such as Cloud and Grid computing is helping to drive the realization of ubiquitous and pervasive computing. However, as computing becomes more entrenched in everyday life, the concepts of trust and risk become increasingly important. In this paper, we propose a new graph-based theoretical approach to address trust and reputation in complex ubiquitous networks. We formulate trust as a function of quality of a task and time required to authenticate agent-toagent relationship based on the Zero-Common Knowledge (ZCK) authentication scheme. This initial representation applies a graph theory concept, accompanied by a mathematical formulation of trust metrics. The approach we propose increases awareness and trustworthiness to agents based on the values estimated for each requested task; we conclude by stating our plans for future work in this area.
PATROL: a comprehensive reputation-based trust model
International Journal of Internet Technology and Secured Transactions, 2007
In this paper, we present PATROL, a general and comprehensive reputation-based trust model for distributed computing. The proposed model is an enhancement over our previous model, TRUMMAR, and aims at achieving a truly unique model that incorporates most concepts that are essential to determining trust-based decisions. Among the concepts upon which the trust model is based are reputation values, direct experiences, trust in the credibility of a host to give recommendations, decay of information with time based on a dynamic decay factor, first impressions, similarity, popularity, activity, cooperation between hosts, in addition to a hierarchy of host systems. The simulations performed on this model confirm its correctness and its adaptability to different environments and situations.
Reputation and Trust-based Systems for Ad Hoc and Sensor Networks
Reputation and trust are two very useful tools that are used to facilitate decision making in diverse fields from an ancient fish market to state-of-the-art ecommerce. Reputation is the opinion of one entity about another. In an absolute context, it is the trustworthiness of an entity . Trust, on the other hand, is the expectation of one entity about the actions of another . For over three decades, formal studies have been done on how reputation and trust can affect decision making abilities in uncertain conditions. Only recently has trust and reputation been adapted to wireless communication networks. Trust is a multidimensional entity which, if effectively modeled, can resolve many problems in wireless communication networks.
TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation
The IEEE/ACS International Conference on Pervasive Services, 2004
In this paper we present TRUMMAR, a reputationbased trust model that mobile agent systems can use to protect agents from malicious hosts. TRUMMAR is unique in being a truly comprehensive model since it accounts, in a unified framework, for a multitude of concepts such as prior-derived reputation, first impression, loss of reputation information with time, hierarchy of host systems (neighbors, friends, and strangers), and the inclusion of interaction results in reputation calculation. TRUMMAR is also general enough to be applied to any distributed system. We show simulation results that verify the correctness of this model and the effects of its various parameters.
A Reputation Mechanism to Support Cooperation of IoT Devices
2019
A critical issue for small and low-cost Internet of Things (IoT) devices facing multiple complex, advanced and interactive tasks trying to save their power resources. To reach these goals IoT devices can use the capabilities of nearby devices having suitable resources, given that they make their resources available for free or with a determined cost. In such a context, IoT devices can take significant benefits by exploiting the social attitude of software agents to mutually interact and cooperate with other agents they consider as trustworthy. However, in wide communities it is common that a lot of members are unreferenced with respect to the own trustworthiness and, therefore, the task of carrying out a reliable choice about a potential partner can be very difficult. To tackle such an issue, we propose an agent framework where each IoT device is associated with an agent that helps its device in choosing reliable partners for its tasks. To this aim, we designed a reputation model im...