Trust Propagation in Small Worlds

The possibility of a massive, networked infrastructure of diverse entities partaking in collaborative applications with each other increases more and more with the proliferation of mobile devices and the development of ad hoc networking technologies. In this context, traditional security measures do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can be propagated through relatively short paths connecting entities. Our work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology.

[1]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[2]  Christian Damsgaard Jensen,et al.  Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .

[3]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[4]  Mario Cloutier,et al.  Six Degrees of Separation Six Degrees of Separation , 1994 .

[5]  Yutaka Matsuo,et al.  Clustering using Small World Structure , 2002 .

[6]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[7]  Stephen Farrell,et al.  Secure ubiquitous computing based on entity recognition , 2001 .

[8]  Frank Stajano,et al.  Security for Ubiquitous Computing , 2002, ICISC.

[9]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[10]  Stanley Milgram,et al.  An Experimental Study of the Small World Problem , 1969 .

[11]  Lada A. Adamic The Small World Web , 1999, ECDL.

[12]  D. Watts,et al.  Small Worlds: The Dynamics of Networks between Order and Randomness , 2001 .

[13]  Jon M. Kleinberg,et al.  The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.

[14]  M. Newman Clustering and preferential attachment in growing networks. , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[15]  M E J Newman,et al.  Identity and Search in Social Networks , 2002, Science.

[16]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[17]  Srdjan Capkun,et al.  Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.

[18]  Munindar P. Singh,et al.  Trust and reputation management in a small-world network , 2000, Proceedings Fourth International Conference on MultiAgent Systems.

[19]  Stephen Farrell,et al.  End-to-end trust in pervasive computing starts with recognition , 2003 .