A Framework for Agent-Based Trust Management in Online Auctions

Current electronic commerce applications such as online auction systems are not trustworthy due to a lack of effective trust management mechanisms. A trustworthy online auction system requires a dynamic trust management module that can detect abnormal bidding activities in real-time, notify the involved users, and cancel the corresponding auction immediately. In this paper, we present a general framework for agent-based trust management (ATM) in online auctions. The ATM module consists of three types of agents, namely the monitoring agent, the analysis agent and the security agent. A monitoring agent can monitor a bidder and detect any abnormal bidding behavior; while the analysis agent and the security agent can analyze state-based information and history information of a bidder, and make decisions on skill detection, respectively. We illustrate the communication protocol among various agents, and demonstrate our agent-based trust management approach for online auctions using a prototype ATM module developed with JADE.

[1]  Andrew B. Whinston,et al.  Shill bidding in multi-round online auctions , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[2]  Haiping Xu,et al.  Model checking bidding behaviors in internet concurrent auctions , 2007, Comput. Syst. Sci. Eng..

[3]  Joan Feigenbaum,et al.  KeyNote : Trust management for public-key infrastructures. Discussion , 1999 .

[4]  Vitaly Shmatikov,et al.  Reputation-Based Trust Management ∗ , 2003 .

[5]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[6]  N. Shahmehri,et al.  An Integration of Reputation-based and Policy-based Trust Management , 2005 .

[7]  Joan Feigenbaum,et al.  REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.

[8]  Haiping Xu,et al.  Real-Time Trust Management in Agent Based Online Auction Systems , 2007, SEKE.

[9]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[10]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[11]  Jarrod Trevathan,et al.  Detecting Collusive Shill Bidding , 2007, Fourth International Conference on Information Technology (ITNG'07).

[12]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[13]  M. Parashar,et al.  Context-aware Dynamic Access Control for Pervasive Applications , 2004 .

[14]  Agostino Poggi,et al.  Developing Multi-agent Systems with JADE , 2007, ATAL.

[15]  Joan Feigenbaum,et al.  KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.

[16]  Xu Li,et al.  An agent-based trust and reputation management scheme for wireless sensor networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[17]  Morris Sloman,et al.  Trust Management Tools for Internet Applications , 2003, iTrust.