The Community for Technology Leaders
RSS Icon
Issue No.02 - March/April (2012 vol.9)
pp: 261-274
Anupam Das , University of Illinois at Urbana Champaign, Champaign
Security and privacy issues have become critically important with the fast expansion of multiagent systems. Most network applications such as pervasive computing, grid computing, and P2P networks can be viewed as multiagent systems which are open, anonymous, and dynamic in nature. Such characteristics of multiagent systems introduce vulnerabilities and threats to providing secured communication. One feasible way to minimize the threats is to evaluate the trust and reputation of the interacting agents. Many trust/reputation models have done so, but they fail to properly evaluate trust when malicious agents start to behave in an unpredictable way. Moreover, these models are ineffective in providing quick response to a malicious agent's oscillating behavior. Another aspect of multiagent systems which is becoming critical for sustaining good service quality is the even distribution of workload among service providing agents. Most trust/reputation models have not yet addressed this issue. So, to cope with the strategically altering behavior of malicious agents and to distribute workload as evenly as possible among service providers; we present in this paper a dynamic trust computation model called "SecuredTrust.” In this paper, we first analyze the different factors related to evaluating the trust of an agent and then propose a comprehensive quantitative model for measuring such trust. We also propose a novel load-balancing algorithm based on the different factors defined in our model. Simulation results indicate that our model compared to other existing models can effectively cope with strategic behavioral change of malicious agents and at the same time efficiently distribute workload among the service providing agents under stable condition.
Multiagent system, trust management, reputation model, load balancing, malicious behavior.
Anupam Das, "SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems", IEEE Transactions on Dependable and Secure Computing, vol.9, no. 2, pp. 261-274, March/April 2012, doi:10.1109/TDSC.2011.57
[1] N.R. Jennings, “An Agent-Based Approach for Building Complex Software Systems,” Comm. ACM, vol. 44, no. 4, pp. 35-41, 2001.
[2] R. Steinmetz and K. Wehrle, Peer-to-Peer Systems and Applications. Springer-Verlag, 2005.
[3] Gnutella, http:/, 2000.
[4] Kazaa, http:/, 2011.
[5] edonkey2000, http:/, 2000.
[6] I. Foster, C. Kesselman, and S. Tuecke, “The Anatomy of the Grid: Enabling Scalable Virtual Organizations,” Int'l J. High Performance Computing Applications, vol. 15, no. 3, pp. 200-222, 2001.
[7] T. Berners-Lee, J. Hendler, and O. Lassila, “The Semantic Web,” Scientific Am., pp. 35-43, May 2001.
[8] D. Saha and A. Mukherjee, “Pervasive Computing: A Paradigm for the 21st Century,” Computer, vol. 36, no. 3, pp. 25-31, Mar. 2003.
[9] S.D. Ramchurn, D. Huynh, and N.R. Jennings, “Trust in Multi-Agent Systems,” The Knowledge Eng. Rev., vol. 19, no. 1, pp. 1-25, 2004.
[10] P. Dasgupta, “Trust as a Commodity,” Trust: Making and Breaking Cooperative Relations, vol. 4, pp. 49-72, 2000.
[11] P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, “Reputation Systems,” Comm. ACM, vol. 43, no. 12, pp. 45-48, 2000.
[12] A.A. Selcuk, E. Uzun, and M.R. Pariente, “A Reputation-Based Trust Management System for P2P Networks,” Proc. IEEE Int'l Symp. Cluster Computing and the Grid (CCGRID '04), pp. 251-258, 2004.
[13] M. Gupta, P. Judge, and M. Ammar, “A Reputation System for Peer-to-Peer Networks,” Proc. 13th Int'l Workshop Network and Operating Systems Support for Digital Audio and Video (NOSSDAV '03), pp. 144-152, 2003.
[14] K. Aberer and Z. Despotovic, “Managing Trust in a Peer-2-Peer Information System,” Proc. 10th Int'l Conf. Information and Knowledge Management (CIKM '01), pp. 310-317, 2001.
[15] L. Mui, M. Mohtashemi, and A. Halberstadt, “A Computational Model of Trust and Reputation for E-Businesses,” Proc. 35th Ann. Hawaii Int'l Conf. System Sciences (HICSS '02), pp. 2431-2439, 2002.
[16] L. Mui, “Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks,” PhD thesis, MIT, lmuidocs, Dec. 2002.
[17] F. Cornelli, E. Damiani, S.D. Capitani, S. Paraboschi, and P. Samarati, “Choosing Reputable Servents in a P2P Network,” Proc. 11th ACM World Wide Web Conf. (WWW '02), pp. 376-386, May 2002.
[18] Y. Wang and J. Vassileva, “Bayesian Network-Based Trust Model,” Proc. IEEE/WIC Int'l Conf. Web Intelligence (WI '03), pp. 372-378, Oct. 2003.
[19] S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina, “The EigenTrust Algorithm for Reputation Management in P2P Networks,” Proc. 12th ACM Int'l World Wide Web Conf. (WWW '03), pp. 640-651, 2003.
[20] L. Xiong and L. Li, “Peertrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities,” IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 843-857, July 2004.
[21] M. Srivatsa, L. Xiong, and L. Liu, “TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks,” Proc. 14th ACM Int'l Conf. World Wide Web (WWW '05), pp. 422-431, 2005.
[22] Z. Runfang and H. Kai, “PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing,” IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 4, pp. 460-473, Apr. 2007.
[23] B. Li, M. Xing, J. Zhu, and T. Che, “A Dynamic Trust Model for the Multi-Agent Systems,” Proc. IEEE Int'l Symp. Information Processing (ISIP '08), pp. 500-504, 2008.
[24] Y. Zhang, S. Chen, and G. Yang, “SFTrust: A Double Trust Metric Based Trust Model in Unstructured P2P Systems,” Proc. IEEE Int'l Symp. Parallel and Distributed Processing (ISPDP '09), pp. 1-7, 2009.
[25] J. Hu, Q. Wu, and B. Zhou, “FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust Model,” Proc. IEEE Ninth Int'l Conf. Young Computer Scientists (ICYCS '08), pp. 1963-1968, 2008.
[26] X. Wang and L. Wang, “P2P Recommendation Trust Model,” Proc. IEEE Eighth Int'l Conf. Intelligent Systems Design and Applications (ISDA '08), pp. 591-595, 2008.
[27] L. Wen, P. Lingdi, L. Kuijin, and C. Xiaoping, “Trust Model of Users' Behavior in Trustworthy Internet,” Proc. IEEE WASE Int'l Conf. Information Eng. (ICIE '09), pp. 403-406, 2009.
[28] R. Aringhieri, E. Damiani, S.D. Capitani, S. Paraboschi, and P. Samarati, “Fuzzy Techniques for Trust and Reputation Management in Anonymous Peer-to-Peer Systems: Special Topic Section on Soft Approaches to Information Retrieval and Information Access on the Web,” J. Am. Soc. for Information Science and Technology, vol. 57, pp. 528-537, 2006.
[29] E. Damiani, S.D. Capitani, S. Paraboschi, and P. Samarati, “Managing and Sharing Servants' Reputations in P2P Systems,” IEEE Trans. Knowledge and Data Eng., vol. 15, no. 4, pp. 840-854, July/Aug. 2003.
[30] D. Wen, W. Huaimin, J. Yan, and Z. Peng, “A Recommendation-Based Peer-to-Peer Trust Model,” J. Software, vol. 15, no. 4, pp. 571-583, 2004.
[31] J. Sabater and C. Sierra, “REGRET: A Reputation Model for Gregarious Societies,” Proc. Fourth Workshop Deception, Fraud and Trust in Agent Societies, pp. 61-69, 2001.
[32] J. Sabater and C. Sierra, “Social Regret, A Reputation Model Based on Social Relations,” ACM SIGecom Exchanges - Chains of Commitment, vol. 3, pp. 44-56, Dec. 2001.
[33] J. Sabater and C. Sierra, “Reputation and Social Network Analysis in Multi-Agent Systems,” Proc. First Int'l Joint Conf. Autonomous Agents and Multi-Agent Systems (AAMAS '02), pp. 475-482, 2002.
[34] L. Xiong and L. Liu, “A Reputation-Based Trust Model for Peer-to-Peer Ecommerce Communities,” Proc. Fourth ACM Conf. Electronic Commerce (EC '03), pp. 228-229, 2003.
[35] T.D. Huynh, N.R. Jennings, and N.R. Shadbolt, “An Integrated Trust and Reputation Model for Open Multi-Agent Systems,” Autonomous Agents and Multi-Agent Systems, vol. 13, no. 2, pp. 119-154, 2006.
[36] N.R. Jennings, T.D. Huynh, and N.R. Shadbolt, “FIRE: An Integrated Trust and Reputation Model for Open Multi-Agent Systems,” Proc. 16th European Conf. Artificial Intelligence (ECAI '04), pp. 18-22, 2004.
[37] T.D. Huynh, N.R. Shadbolt, and N.R. Jennings, “Developing an Integrated Trust and Reputation Model for Open Multi-Agent Systems,” Proc. Seventh Int'l Workshop Trust in Agent Societies, pp. 65-74, 2004.
[38] J. Sabater, M. Paolucci, and R. Conte, “Repage: REPutation and ImAGE among Limited Autonomous Partners,” J. Artificial Societies and Social Simulation, vol. 9, no. 2, 2006.
[39] I. Pinyol and J. Sabater-Mir, “Pragmatic-Strategic Reputation-Based Decisions in BDI Agents,” Proc. Eighth Int'l Conf. Autonomous Agents and Multiagent Systems (AAMAS '09), vol. 2, pp. 1001-1008, 2009.
[40] R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, and M. Tennenholtz, “Trust-Based Recommendation Systems: An Axiomatic Approach,” Proc. 17th ACM Int'l Conf. World Wide Web (WWW '08), pp. 199-208, 2008.
[41] J.J. Qi and Z.Z. Li, “Managing Trust for Secure Active Networks,” Proc. Central and Eastern European Conf. Multi-Agent Systems (CEEMAS '05), pp. 628-631, 2005.
[42] Y. Zhang, K. Wang, K. Li, W. Qu, and Y. Xiang, “A Time-Decay Based P2P Trust Model,” Proc. Int'l Conf. Networks Security, Wireless Comm. and Trusted Computing, vol. 2, pp. 235-238, 2009.
[43] Jbuilder, , 2011.
[44] R. McNab and F. Howell, “Using Java for Discrete Event Simulation,” Proc. 12th UK Computer and Telecomm. Performance Eng. Workshop, pp. 219-228,, 1996.
[45] F. Howell, “The SimJava Home Page,” uk/home/hasesimjava , 1999.
[46] J.B. Grizzard, V. Sharma, C. Nunnery, B.B. Kang, and D. Dagon, “Peer-to-Peer Botnets: Overview and Case Study,” Proc. First Conf. First Workshop Hot Topics in Understanding Botnets, pp. 1-8, 2007.
[47] CNN Tech nology, “Expert: Botnets No. 1 Emerging Internet Threat,” 2006.
[48] The New York Times, “Attack of the Zombie Computers Is a Growing Threat,” Jan. 2007.
[49] E. Adar and B.A. Huberman, “Free Riding on Gnutella,” First Monday, vol. 5, no. 10, 2000.
[50] P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, “Reputation Systems,” Comm. ACM, vol. 43, no. 12, pp. 45-48, 2000.
[51] H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman, “Sybilguard: Defending against Sybil Attacks via Social Networks,” Proc. ACM SIGCOMM, pp. 267-278, 2006.
[52] E.J. Friedman and P. Resnick, “The Social Cost of Cheap Pseudonyms,” J. Economics and Management Strategy, vol. 10, pp. 173-199, 1998.
48 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool