A new adaptive trust and reputation model for Mobile Agent Systems

Abstract Mobile agents (MAs) are being widely used in distributed applications development. The motivation behind the interest in MAs is derived from the various advantages they offer, such as, autonomous behavior, mobility and intelligence. Also, their small size and requirement of a low bandwidth are other attractive features. However, the dynamic behavior of agents and hosts in Mobile Agent Systems (MASs) has posed a challenging problem. Maintaining good performance is important for MASs to guarantee the quality of provided services. To address both of these issues we propose a new adaptive trust and reputation model for MASs. The proposed model provides users with the means to assess service providers and decision making basis on who to interact with. It combines direct and indirect witnesses' experience evaluations. It also assesses the honesty of witnesses to filter out false evaluations. In addition, new “Incentive and Penalty” and “Second Chance” approaches are incorporated into the model to motivate an honest behavior and accommodate changes in the system. A testbed is conducted to show how the system adapts to changes in witnesses' behavior. Also a framework for comparison is also developed to evaluate and compare the proposed model and compare it to other existing models found in the literature.

[1]  Jordi Sabater-Mir,et al.  Reputation-based decisions for logic-based cognitive agents , 2010, Autonomous Agents and Multi-Agent Systems.

[2]  Jamal Bentahar,et al.  CRM : An efficient trust and reputation model for agent computing , 2011 .

[3]  David Stuart Robertson,et al.  Secure information sharing in social agent interactions using information flow analysis , 2018, Eng. Appl. Artif. Intell..

[4]  Jong Hyuk Park,et al.  Secure and efficient public key management in next generation mobile networks , 2011, Personal and Ubiquitous Computing.

[5]  Yanjun Zuo,et al.  A reputation-based model for mobile agent migration for information search and retrieval , 2017, Int. J. Inf. Manag..

[6]  Guiran Chang,et al.  Surveying and Analyzing Security, Privacy and Trust Issues in Cloud Computing Environments , 2011 .

[7]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[8]  Jordi Sabater-Mir,et al.  Social ReGreT, a reputation model based on social relations , 2001, SECO.

[9]  S. Buchegger,et al.  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .

[10]  Amirreza Masoumzadeh,et al.  A survey of security issue in multi-agent systems , 2011, Artificial Intelligence Review.

[11]  Giuseppe M. L. Sarnè,et al.  An agent‐oriented, trust‐aware approach to improve the QoS in dynamic grid federations , 2015, Concurr. Comput. Pract. Exp..

[12]  Boi Faltings,et al.  An incentive compatible reputation mechanism , 2003, AAMAS '03.

[13]  Kwangjo Kim,et al.  Secure authenticated group key agreement protocol in the MANET environment , 2008, Inf. Secur. Tech. Rep..

[14]  Yousof Al-Hammadi,et al.  BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications , 2017, Secur. Commun. Networks.

[15]  Jong Hyuk Park,et al.  A scalable and efficient key escrow model for lawful interception of IDBC‐based secure communication , 2011, Int. J. Commun. Syst..

[16]  Francesco Buccafurri,et al.  Experimenting with Certified Reputation in a Competitive Multi-Agent Scenario , 2016, IEEE Intelligent Systems.

[17]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[18]  Mihaela Ulieru,et al.  The State of the Art in Trust and Reputation Systems: A Framework for Comparison , 2010, J. Theor. Appl. Electron. Commer. Res..

[19]  Chan Yeob Yeun,et al.  Recent Advances in VANET Security: A Survey , 2015, 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall).

[20]  Alicia Y. C. Tang,et al.  Certainty, trust and evidence: Towards an integrative model of confidence in multi-agent systems , 2015, Comput. Hum. Behav..

[21]  Chuanlei Zhang,et al.  BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks , 2016, J. Netw. Comput. Appl..

[22]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[23]  Vijay Varadharajan,et al.  MobileTrust: a trust enhanced security architecture for mobile agent systems , 2010, International Journal of Information Security.

[24]  Jie Zhang,et al.  Filtering unfair ratings from dishonest advisors in multi-criteria e-markets: a biclustering-based approach , 2015, Autonomous Agents and Multi-Agent Systems.

[25]  Jie Zhang,et al.  A biclustering-based approach to filter dishonest advisors in multi-criteria e-marketplaces , 2014, AAMAS.

[26]  G. Geetha,et al.  Data Security in Free Roaming Mobile Agents , 2011 .

[27]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[28]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[29]  Mahmoud Al-Qutayri,et al.  A secure mobile agent protocol for vehicular communication systems , 2015, 2015 11th International Conference on Innovations in Information Technology (IIT).

[30]  Timothy W. Guinnane,et al.  Trust: A Concept Too Many , 2005 .

[31]  Chih-Hsiung Tu,et al.  On-line learning migration: from social learning theory to social presence theory in a CMC environment , 2000, J. Netw. Comput. Appl..

[32]  Samira Sadaoui,et al.  A dynamic stage-based fraud monitoring framework of multiple live auctions , 2016, Applied Intelligence.

[33]  Yang Liu,et al.  Towards Robust and Effective Trust Management for Security: A Survey , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[34]  Mahmoud Al-Qutayri,et al.  Secure Mobile Agent Protocol for Vehicular Communication Systems in Smart Cities , 2018 .

[35]  Tao Gu,et al.  A service-oriented middleware for building context-aware services , 2005, J. Netw. Comput. Appl..

[36]  Chan Yeob Yeun Digital Signature with Message Recovery and Authenticated Encryption (Signcryption) - A Comparison , 1999, IMACC.

[37]  Domenico Rosaci,et al.  Trust measures for competitive agents , 2012, Knowl. Based Syst..

[38]  Valtteri Niemi,et al.  Generic Authentication Architecture , 2008 .