Trust Evaluation in Anarchy: A Case Study on Autonomous Networks

With the explosive growth of network techniques, in particular wireless communications, the traditional centralized, fixed networks can no longer satisfy the enormous demands on network connectivity, data storage and information exchanges. New types of networks, such as pervasive computing networks, mobile ad hoc networks and P2P networks, emerged in recent years in order to provide solutions for the increasing requirements on networked services. All those networks are autonomous networks, because they are distributed and self-organized. As a case study, we employ a specific application – distributed trust management – to understand and analyze the behavior and properties of these “anarchical” autonomous networks. We propose a statistical trust evaluation rule, prove its convergence and investigate its characteristics when the system is at the steady state. Our investigation results in several conclusions for the design of trust evaluation rules, some of which are unexpected if we do not have the stationary distribution at hand. Our study shows the importance and necessity of applying theoretical analyses to understand the complex characteristics of distributed, self-organized, autonomous networks.

[1]  西森 秀稔 Statistical physics of spin glasses and information processing : an introduction , 2001 .

[2]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[3]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[4]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[5]  Ueli Maurer,et al.  Modelling a Public-Key Infrastructure , 1996, ESORICS.

[6]  H. Nishimori Statistical Physics of Spin Glasses and Information Processing , 2001 .

[7]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[8]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[9]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[10]  Srdjan Capkun,et al.  BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.

[11]  Virgil D. Gligor,et al.  On Inter-Realm Authentication in Large Distributed Systems , 1993, J. Comput. Secur..

[12]  Thomas Beth,et al.  Valuation of Trust in Open Networks , 1994, ESORICS.

[13]  Jitendra Padhye,et al.  Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.

[14]  Joan Feigenbaum,et al.  The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.

[15]  Hector Garcia-Molina,et al.  Limited reputation sharing in P2P systems , 2004, EC '04.

[16]  B. Lampson,et al.  Authentication in distributed systems: theory and practice , 1991, TOCS.

[17]  Srdjan Capkun,et al.  Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.

[18]  Robert Tappan Morris,et al.  Link-level measurements from an 802.11b mesh network , 2004, SIGCOMM '04.

[19]  Virgil D. Gilgor,et al.  On inter-realm authentication in large distributed systems , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.

[20]  Josef Kittler Autonomic Communication , 2005, Lecture Notes in Computer Science.

[21]  Virgil D. Gligor,et al.  Security of Emergent Properties in Ad-Hoc Networks (Transcript of Discussion) , 2004, Security Protocols Workshop.

[22]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[23]  Massimo Franceschetti,et al.  On the throughput capacity of random wireless networks , 2004 .

[24]  Béla Bollobás,et al.  Random Graphs: Notation , 2001 .

[25]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[26]  Sharon L. Milgram,et al.  The Small World Problem , 1967 .

[27]  Eric Bonabeau,et al.  Decision Spread in the Corporate Board Network , 2003, Adv. Complex Syst..

[28]  Jeffrey I. Schiller,et al.  An Authentication Service for Open Network Systems. In , 1998 .

[29]  David J. Aldous,et al.  Lower bounds for covering times for reversible Markov chains and random walks on graphs , 1989 .

[30]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[31]  J. Laurie Snell,et al.  Markov Random Fields and Their Applications , 1980 .

[32]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[33]  Bhaskar Krishnamachari,et al.  Sharp thresholds For monotone properties in random geometric graphs , 2003, STOC '04.