Reputation-Based Trust for a Cooperative Agent-Based Backup Protection Scheme

This paper explores integrating a reputation-based trust mechanism with an agent-based backup protection system to help protect against malicious or byzantine failures. A distributed cooperative trust system has the potential to add an additional layer of protection designed to operate with greater autonomy. This trust component enables the agents in the system to make assessments using an estimate of the trustworthiness of cooperating protection agents based on their responsiveness and the consistency of their responses when compared with their peers. Results illustrate the improved decision-making capability of agents who incorporate this cooperative trust method in the presence of failures in neighboring relays.

[1]  James S. Thorp,et al.  Expose hidden failures to prevent cascading outages [in power systems] , 1996 .

[2]  Jian-Wei Wang,et al.  Cascade-based attack vulnerability on the US power grid. , 2009 .

[3]  W. Wang,et al.  Collaborative Trust in Multi-agent System , 2007, 16th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2007).

[4]  Jesse C Arnold Professor Emeritus,et al.  Introduction to Probability and Statistics: Principles and Applications for Engineering and the Computing Sciences , 1990 .

[5]  J. Lewis Blackburn,et al.  Protective Relaying: Principles And Applications , 2006 .

[6]  Jason Leigh,et al.  Reliable Blast UDP : predictable high performance bulk data transfer , 2002, Proceedings. IEEE International Conference on Cluster Computing.

[7]  Vinay M. Igure,et al.  Security issues in SCADA networks , 2006, Comput. Secur..

[8]  Pierluigi Siano,et al.  Adaptive relays for overhead line protection , 2007 .

[9]  Member Ieee,et al.  Developing an Agent-based Backup Protection System for Transmission Networks , 2002 .

[10]  Ken Barnes,et al.  Introduction to SCADA Protection and Vulnerabilities , 2004 .

[11]  Gary C. Kessler,et al.  An Overview of Steganography for the Computer Forensics Examiner , 2004 .

[12]  D.V. Coury,et al.  A primary and backup cooperative protection system based on wide area agents , 2004, 2004 IEEE/PES Transmision and Distribution Conference and Exposition: Latin America (IEEE Cat. No. 04EX956).

[13]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[14]  Deborah Estrin,et al.  Advances in network simulation , 2000, Computer.

[15]  Kenji Ishida,et al.  Parallel Downloading Method using HTTP over UDP for High Loss Rate and Delay Networks , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).

[16]  Mukesh Singhal,et al.  Trust Management in Distributed Systems , 2007, Computer.

[17]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[18]  George W Bush,et al.  The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets , 2003 .

[19]  Mark S. Fox,et al.  An ontology of trust: formal semantics and transitivity , 2006, ICEC '06.

[20]  Bryan Krekel,et al.  Capability of the People's Republic of China to Conduct Cyber Warfare and Computer Network Exploitation , 2009 .

[21]  William Shaw,et al.  Cybersecurity for SCADA Systems , 2006 .

[22]  R. Moxley,et al.  High-speed distribution protection made easy: communications-assisted protection schemes for distribution applications , 2005, 58th Annual Conference for Protective Relay Engineers, 2005..

[23]  Jiang Ying,et al.  A Trust Management Model Based on Multi-agent System , 2008, 2008 ISECS International Colloquium on Computing, Communication, Control, and Management.

[24]  Mohammad Shahidehpour,et al.  Communication and Control in Electric Power Systems: Applications of Parallel and Distributed Processing , 2003 .

[25]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2008, TOSN.

[26]  Stephen Marsh Trust and Reliance in Multi-Agent Systems: A Preliminary Report , 2007 .

[27]  A. Jøsang,et al.  Challenges for Robust Trust and Reputation Systems , 2009 .

[28]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[29]  Peter G. Neumann,et al.  Toward a safer and more secure cyberspace , 2007, CACM.

[30]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[31]  James S. Thorp,et al.  Agent Technology Applied to the Protection of Power Systems , 2003 .

[32]  K. Schwalm National Strategy to Secure Cyberspace , 2006 .

[33]  Scott Graham,et al.  Collaborative, trust-based security mechanisms for a regional utility intranet , 2009, 2009 IEEE Power & Energy Society General Meeting.

[34]  Prathima Agrawal,et al.  Voice performance in WLAN networks - an experimental study , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[35]  Sarvapali D. Ramchurn,et al.  Trust in multi-agent systems , 2004, The Knowledge Engineering Review.

[36]  David S. Wall,et al.  CYBERCRIME AND THE CULTURE OF FEAR , 2008 .

[37]  James C. Mulvenon,et al.  The People’s Liberation Army in the Information Age: , 1999 .

[38]  R. Giovanini,et al.  EPOCHS: a platform for agent-based electric power and communication simulation built from commercial off-the-shelf components , 2006, IEEE Transactions on Power Systems.

[39]  Dewen Wang,et al.  Multiagents-based wide area protection with best-effort adaptive strategy , 2009 .

[40]  Bing Chen,et al.  Implementing VoIP: a voice transmission performance progress report , 2004, IEEE Communications Magazine.

[41]  Yao-Hua Tan,et al.  Trust in Cyber-societies: Integrating the Human and Artificial Perspectives , 2000, Lecture Notes in Computer Science.

[42]  Alberto Leon-Garcia,et al.  Communication Networks , 2000 .

[43]  Arun G. Phadke,et al.  Power System Relaying , 1992 .

[44]  Anthony M. Sleva Protective Relay Principles , 2009 .

[45]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[46]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[47]  A. V. Meier Electric power systems : a conceptual introduction , 2006 .

[48]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.