CellTrust: a reputation model for C2C commerce

The improvement of wireless technologies and the increasing spread of mobile phones open new possibilities to perform mobile Customer-to-Customer commercial activities. In this new scenario, where users cannot rely on stable connections, it assumes a great relevance how to trust the counterpart in a transaction and how to avoid that a disconnection, possible in wireless connections, can encourage users to cheat. To tackle these issues we propose a feedback-based reputation mechanism able to detect malicious users better than other state-of-the-art techniques, as shown by the large number of experiments run to measure the accuracy of the compared methods in the most common situations.

[1]  Michael R. Baye,et al.  The Economics of the Internet and E-commerce , 2002, Advances in Applied Microeconomics.

[2]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[3]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[4]  Mario Paolucci,et al.  Reputation in Artificial Societies , 2002, Multiagent Systems, Artificial Societies, and Simulated Organizations.

[5]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[6]  Nilmini Wickramasinghe,et al.  Security of a Mobile Transaction: A Trust Model , 2004, Electron. Commer. Res..

[7]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[9]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[10]  Audun Jøsang,et al.  Technologies for Trust in Electronic Commerce , 2004, Electron. Commer. Res..

[11]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[12]  李幼升,et al.  Ph , 1989 .

[13]  Timothy W. Finin,et al.  Neighborhood-Consistent Transaction Management for Pervasive Computing Environments , 2003, DEXA.

[14]  Andreas Steffen Security in Embedded Systems , 2005, The Industrial Information Technology Handbook.

[15]  Ronggong Song,et al.  Trust in E-services: Technologies, Practices and Challenges , 2007 .

[16]  Henry Tirri,et al.  Transaction management for m-commerce at a mobile terminal , 2006, Electron. Commer. Res. Appl..

[17]  George Ghinea,et al.  Trust model for certificate revocation in ad hoc networks , 2008, Ad Hoc Networks.

[18]  Beatrice Gralton,et al.  Washington DC - USA , 2008 .

[19]  Srivaths Ravi,et al.  Security in embedded systems: Design challenges , 2004, TECS.

[20]  Giuseppe M. L. Sarnè,et al.  Blue: A Reputation-Based Multi-Agent System to Support C2C in P2P Bluetooth Networks , 2006, ICE-B.

[21]  Yves Pigneur,et al.  Towards a holistic analysis of mobile payments: A multiple perspectives approach , 2006, Electron. Commer. Res. Appl..

[22]  Rino Falcone,et al.  The Socio-cognitive Dynamics of Trust: Does Trust Create Trust? , 2000, Trust in Cyber-societies.

[23]  Audun Jøsang,et al.  Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..

[24]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[25]  Karl Aberer,et al.  P2P reputation management: Probabilistic estimation vs. social networks , 2006, Comput. Networks.

[26]  Haiyun Luo,et al.  Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..

[27]  P A Putland,et al.  Electronic payment systems , 1997 .

[28]  J. Nunamaker,et al.  Proceedings of the 32nd Hawaii International Conference on System Sciences , 1999 .

[29]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[30]  王玉峰,et al.  Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment , 2008 .

[31]  Jordi Sabater-Mir,et al.  REGRET: reputation in gregarious societies , 2001, AGENTS '01.

[32]  José M. Molina,et al.  Fuzzy referral based cooperation in social networks of agents , 2005 .

[33]  Avishai Wool,et al.  Cracking the Bluetooth PIN , 2005, MobiSys '05.

[34]  Lik Mui,et al.  Notions of reputation in multi-agents systems: a review , 2002, AAMAS '02.

[35]  Javier Carbó,et al.  TRUST MANAGEMENT THROUGH FUZZY REPUTATION , 2003 .

[36]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[37]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[38]  Bob Rietjens,et al.  Trust and reputation on eBay: Towards a legal framework for feedback intermediaries , 2006 .

[39]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[40]  Sarvapali D. Ramchurn,et al.  Trust in multi-agent systems , 2004, The Knowledge Engineering Review.

[41]  Anupam Joshi,et al.  P2P M-commerce in pervasive environments , 2002, SECO.

[42]  Stewart S. Miller Parallel Databases , 2001, High-Performance Web Databases.

[43]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[44]  Andreas Birk,et al.  Boosting cooperation by evolving trust , 2000, Appl. Artif. Intell..

[45]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[46]  Karl Aberer,et al.  P-Grid: A Self-Organizing Access Structure for P2P Information Systems , 2001, CoopIS.

[47]  Carlisle M. Adams,et al.  X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP , 1999, RFC.

[48]  Muthucumaru Maheswaran,et al.  A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.

[49]  Virginia Franke Kleist,et al.  A Transaction Cost Model of Electronic Trust: Transactional Return, Incentives for Network Security and Optimal Risk in the Digital Economy , 2004, Electron. Commer. Res..

[50]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[51]  Yao-Hua Tan,et al.  An outline of a trust model for electronic commerce , 2000, Appl. Artif. Intell..

[52]  Giorgos Zacharia,et al.  Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..

[53]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[54]  Haiyun Luo,et al.  Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .

[55]  J. Boudec,et al.  The Impact of Liars on Reputation in Social Networks , 2005 .

[56]  Timothy W. Finin,et al.  In reputation we believe: query processing in mobile ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[57]  David A. Karp eBay hacks - 100 industrial strength tips and tools , 2003 .

[58]  Claudia Roncancio,et al.  A Survey of Mobile Transactions , 2004, Distributed and Parallel Databases.

[59]  S. Buchegger,et al.  A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .