Trust Modeling with Context Representation and Generalized Identities

We present a trust model extension that attempts to relax the assumptions that are currently taken by the majority of existing trust models: (i) proven identity of agents, (ii) repetitive interactions and (iii) similar trusting situations. The proposed approach formalizes the situation (context) and/or trusted agent identity in a multi-dimensional Identity-Context feature space, and attaches the trustworthiness evaluations to individual elements from this metric space, rather than to fixed identity tags (e.g. AIDs, addresses). Trustworthiness of the individual elements of the I-C space can be evaluated using any trust model that supports weighted aggregations and updates, allowing the integration of the mechanism with most existing work. Trust models with the proposed extension are appropriate for deployment in dynamic, ad-hoc and mobile environments, where the agent platform can't guarantee the identity of the agents and where the cryptography-based identity management techniques may be too costly due to the unreliable and costly communication.

[1]  David G. Stork,et al.  Pattern Classification , 1973 .

[2]  Jordi Sabater-Mir,et al.  Reputation and social network analysis in multi-agent systems , 2002, AAMAS '02.

[3]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[4]  Munindar P. Singh,et al.  Developing trust in large-scale peer-to-peer systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.

[5]  Sarvapali D. Ramchurn,et al.  Trust in multi-agent systems , 2004, The Knowledge Engineering Review.

[6]  Daniel Kudenko,et al.  Adaptive Agents and Multi-Agent Systems , 2003, Lecture Notes in Computer Science.

[7]  Sarvapali D. Ramchurn,et al.  Trust in Multiagent Systems , 2004 .

[8]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[9]  Jordi Sabater-Mir,et al.  Social ReGreT, a reputation model based on social relations , 2001, SECO.

[10]  L. Foltyn,et al.  Autonomous Protection Mechanism for Joint Networks in Coalition Operations , 2007, 2007 International Conference on Integration of Knowledge Intensive Multi-Agent Systems.

[11]  Munindar P. Singh,et al.  Detecting deception in reputation management , 2003, AAMAS '03.

[12]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[13]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[14]  Audun Jøsang,et al.  Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..

[15]  Nicholas R. Jennings,et al.  On Handling Inaccurate Witness Reports , 2005 .

[16]  G. Zacharia Collaborative reputation mechanisms for online communities , 1999 .

[17]  Andreas Birk,et al.  Boosting cooperation by evolving trust , 2000, Appl. Artif. Intell..

[18]  Michal Pechoucek,et al.  Expectations and deployment of agent technology in manufacturing and defence: case studies , 2005, AAMAS '05.

[19]  William Stallings,et al.  Cryptography and network security - principles and practice (3. ed.) , 2014 .

[20]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[21]  William Stallings,et al.  Cryptography and network security (2nd ed.): principles and practice , 1998 .

[22]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[23]  Vipin Kumar,et al.  Chapter 3 MINDS-Minnesota Intrusion Detection System , .

[24]  Michal Pechoucek,et al.  Trust model for open ubiquitous agent systems , 2005, IEEE/WIC/ACM International Conference on Intelligent Agent Technology.

[25]  Sarvapali D. Ramchurn,et al.  DEVISING A TRUST MODEL FOR MULTI-AGENT INTERACTIONS USING CONFIDENCE AND REPUTATION , 2004, Appl. Artif. Intell..

[26]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.