Abstract
Multi-agent distributed systems are characterized by autonomous entities that interact with each other to provide, and/or request, different kinds of services. In several contexts, especially when a reward is offered according to the quality of service, individual agents (or coordinated groups) may act in a selfish way. To prevent such behaviours, distributed Reputation Management Systems (RMSs) provide every agent with the capability of computing the reputation of the others according to direct past interactions, as well as indirect opinions reported by their neighbourhood. This last point introduces a weakness on gossiped information that makes RMSs vulnerable to malicious agents’ intent on disseminating false reputation values. Given the variety of application scenarios in which RMSs can be adopted, as well as the multitude of behaviours that agents can implement, designers need RMS evaluation tools that allow them to predict the robustness of the system to security attacks, before its actual deployment. To this aim, we present a simulation software for the vulnerability evaluation of RMSs and illustrate three case studies in which this tool was effectively used to model and assess state-of-the-art RMSs.
- V. Agate, A. De Paola, G. Lo Re, and M. Morana. 2016. A simulation framework for evaluating distributed reputation management systems. In Proceedings of the 13th International Conference on Distributed Computing and Artificial Intelligence. Springer International Publishing, Cham, 247–254.Google Scholar
- V. Agate, A. De Paola, G. Lo Re, and M. Morana. 2016. Vulnerability evaluation of distributed reputation management systems. In Proceedings of the New Frontiers in Quantitative Methods in Informatics (InfQ’16). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, 1–8.Google Scholar
- V. Agate, A. De Paola, G. Lo Re, and M. Morana. 2018. A platform for the evaluation of distributed reputation algorithms. In Proceedings of the IEEE/ACM 22nd International Symposium on Distributed Simulation and Real Time Applications (DS-RT’18). IEEE, New York, NY, 1–8.Google Scholar
- Alessandro Aldini. 2014. A calculus for trust and reputation systems. In Trust Management VIII, Jianying Zhou, Nurit Gal-Oz, Jie Zhang, and Ehud Gudes (Eds.). Springer, Berlin, 173–188.Google Scholar
- Alessandro Aldini. 2018. Design and verification of trusted collective adaptive systems. ACM Trans. Model. Comput. Simul. 28, 2 (2018), 1–27.Google ScholarDigital Library
- Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang, Muneera Albabtain, and Alhanof Abuhaimed. 2013. Reputation-based trust systems for wireless sensor networks: A comprehensive review. In Trust Management VII, Carmen Fernández-Gago, Fabio Martinelli, Siani Pearson, and Isaac Agudo (Eds.). Springer, Berlin, 66–82.Google Scholar
- F. M. Awuor, C.-Y. Wang, and T.-C. Tsai. 2018. Motivating content sharing and trustworthiness in mobile social networks. IEEE Access 6 (2018), 28339–28355.Google ScholarCross Ref
- S. Ba and P. A. Pavlou. 2002. Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quart. 26, 3 (2002), 243–268.Google ScholarDigital Library
- Amir Jalaly Bidgoly and Behrouz Tork Ladani. 2013. Quantitative verification of beta reputation system using PRISM probabilistic model checker. In Proceedings of the 10th International ISC Conference on Information Security and Cryptology (ISCISC’13). IEEE, New York, NY, 1–6.Google ScholarCross Ref
- Amir Jalaly Bidgoly and Behrouz Tork Ladani. 2015. Modelling and quantitative verification of reputation systems against malicious attackers. Comput. J. 58, 10 (2015), 2567–2582.Google ScholarCross Ref
- Amir Jalaly Bidgoly and Behrouz Tork Ladani. 2016. Modeling and quantitative verification of trust systems against malicious attackers. Comput. J. 59, 7 (2016), 1005–1027.Google ScholarCross Ref
- Diego De Siqueira Braga, Marco Niemann, Bernd Hellingrath, and Fernando Buarque De Lima Neto. 2018. Survey on computational trust and reputation models. ACM Comput. Survey 51, 5 (2018), 1–40.Google ScholarDigital Library
- P. Chandrasekaran and B. Esfandiari. 2015. Toward a testbed for evaluating computational trust models: Experiments and analysis. J. Trust Manage. 2, 1 (2015), 1–27.Google ScholarCross Ref
- C. Crapanzano, F. Milazzo, A. De Paola, and G. Lo Re. 2010. Reputation management for distributed service-oriented architectures. In Proceedings of the 4th IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop (SASOW’10). IEEE, New York, NY, 160–165.Google Scholar
- CVSS. 2015. Common Vulnerability Scoring System v3.0. Retrieved from https://www.first.org/cvss.Google Scholar
- A. De Paola and A. Tamburo. 2008. Reputation management in distributed systems. In Proceedings of the 3rd International Symposium on Communications, Control and Signal Processing (ISCCSP’08). IEEE, New York, NY, 666–670.Google Scholar
- John R. Douceur. 2002. The sybil attack. In Proceedings of the International Workshop on Peer-to-Peer Systems. Springer, Gewerbestr, Switzerland, 251–260.Google ScholarCross Ref
- M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica. 2004. Free-riding and whitewashing in peer-to-peer systems. In Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems. Association for Computing Machinery, New York, NY, 228–236.Google Scholar
- K. K. Fullam, T. B. Klos, G. Muller, J. Sabater, A. Schlosser, Z. Topol, K. S. Barber, J. S. Rosenschein, L. Vercouter, and M. Voss. 2005. A specification of the agent reputation and trust (ART) testbed: Experimentation and competition for trust in agent societies. In Proceedings of the 4th International joint Conference on Autonomous Agents and Multiagent Systems. ACM, New York, NY, 512–518.Google Scholar
- Seyed Asgary Ghasempouri and Behrouz Tork Ladani. 2020. Model checking of robustness properties in trust and reputation systems. Future Gen. Comput. Syst. 108 (2020), 302–319. DOI:https://doi.org/10.1016/j.future.2020.02.070Google ScholarCross Ref
- Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, and Han-Chieh Chao. 2014. Management and applications of trust in Wireless Sensor Networks: A survey. J. Comput. Syst. Sci. 80, 3 (2014), 602–617. DOI:https://doi.org/10.1016/j.jcss.2013.06.014Special Issue on Wireless Network Intrusion.Google ScholarDigital Library
- F. Hendrikx, K. Bubendorfer, and R. Chard. 2015. Reputation systems: A survey and taxonomy. J. Parallel Distrib. Comput. 75 (2015), 184–197.Google ScholarDigital Library
- K. Hoffman, D. Zage, and C. Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. ACM Comput. Surveys. 42, 1 (2009), 1–31.Google ScholarDigital Library
- Amir Jalaly Bidgoly and Behrouz Tork Ladani. 2016. Benchmarking reputation systems: A quantitative verification approach. Comput. Hum. Behav. 57 (2016), 274–291. DOI:https://doi.org/10.1016/j.chb.2015.12.024Google ScholarDigital Library
- D. Jelenc, R. Hermoso, J. Sabater-Mir, and D. Trček. 2013. Decision making matters: A better way to evaluate trust models. Knowl.-Based Syst. 52 (2013), 147–164.Google ScholarDigital Library
- Siwei Jiang, Jie Zhang, and Yew-Soon Ong. 2013. An evolutionary model for constructing robust trust networks. In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS’13), Vol. 13. International Foundation for Autonomous Agents and Multiagent Systems, Richland, SC, 813–820.Google Scholar
- Håvard D. Johansen, Robbert Van Renesse, Ymir Vigfusson, and Dag Johansen. 2015. Fireflies: A secure and scalable membership and gossip service. ACM Trans. Comput. Syst. 33, 2 (2015), 5.Google ScholarDigital Library
- Audun Jøsang. 2007. Trust and reputation systems. In Foundations of Security Analysis and Design IV. Springer, Gewerbestr, Switzerland, 209–245.Google Scholar
- Audun Josang and Roslan Ismail. 2002. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference, Vol. 5. BLED Proceeding, Slovenia, 2502–2511.Google Scholar
- S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. 2003. The Eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web. Association for Computing Machinery, New York, NY, 640–651.Google Scholar
- Reid Kerr and Robin Cohen. 2007. Towards provably secure trust and reputation systems in e-marketplaces. In Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems. Association for Computing Machinery, New York, NY, 1–3.Google ScholarDigital Library
- R. Kerr and R. Cohen. 2010. TREET: The trust and reputation experimentation and evaluation testbed. Electronic Commerce Res. 10, 3 (Dec. 2010), 271–290.Google ScholarDigital Library
- E. Koutrouli and A. Tsalgatidou. 2016. Reputation systems evaluation survey. ACM Comput. Surveys 48, 3 (2016), 35.Google ScholarDigital Library
- Nabila Labraoui, Mourad Gueroui, and Larbi Sekhri. 2015. On-off attacks mitigation against trust systems in wireless sensor networks. In IFIP International Conference on Computer Science and its Applications. Springer, Gewerbestr, Switzerland, 406–415.Google ScholarCross Ref
- Ze Li and Haiying Shen. 2011. Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mobile Comput. 11, 8 (2011), 1287–1303.Google ScholarDigital Library
- Q. Lian, Z. Zhang, M. Yang, B. Y. Zhao, Y. Dai, and X. Li. 2007. An empirical study of collusion behavior in the Maze P2P file-sharing system. In Proceedings of the 27th International Conference on Distributed Computing Systems (ICDCS’07). IEEE, New York, NY, 56–56.Google Scholar
- N. A. Lynch. 1996. Distributed Algorithms. Morgan Kaufmann, San Francisco, CA.Google ScholarDigital Library
- F. G. Mármol and G. M. Pérez. 2009. TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In Proceedings of the IEEE International Conference on Communications (ICC’09). IEEE, New York, NY, 1–5.Google Scholar
- S. Marti and H. Garcia-Molina. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Comput. Netw. 50, 4 (2006), 472–484.Google ScholarDigital Library
- Fabio Martinelli. 2005. Towards an integrated formal analysis for security and trust. In Proceedings of the International Conference on Formal Methods for Open Object-Based Distributed Systems. Springer, Gewerbestr, Switzerland, 115–130.Google ScholarDigital Library
- Pietro Michiardi and Refik Molva. 2002. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security. Springer, Gewerbestr, Switzerland, 107–121.Google Scholar
- Tim Muller, Yang Liu, Sjouke Mauw, and Jie Zhang. 2014. On robustness of trust systems. In Proceedings of the IFIP International Conference on Trust Management. Springer, Gewerbestr, Switzerland, 44–60.Google ScholarCross Ref
- P. Naghizadeh and M. Liu. 2016. Perceptions and truth: A mechanism design approach to crowd-sourcing reputation. IEEE/ACM Trans. Netw. 24, 1 (2016), 163–176.Google ScholarDigital Library
- Kevin Regan, Pascal Poupart, and Robin Cohen. 2006. Bayesian reputation modeling in e-marketplaces sensitive to subjectivity, deception and change. In Proceedings of the Association for the Advancement of Artificial Intelligence (AAAI’06). Association for the Advancement of Artificial Intelligence, Palo Alto, CA, 1206–1212.Google Scholar
- A. Salehi-Abari and T. White. 2012. DART: A distributed analysis of reputation and trust framework. Comput. Intell. 28, 4 (2012), 642–682.Google ScholarDigital Library
- Vladimiro Sassone, Karl Krukow, and Mogens Nielsen. 2007. Towards a formal framework for computational trust. In Formal Methods for Components and Objects, Frank S. de Boer, Marcello M. Bonsangue, Susanne Graf, and Willem-Paul de Roever (Eds.). Springer, Berlin, 175–184.Google Scholar
- Anna Satsiou and Leandros Tassiulas. 2009. Reputation-based resource allocation in P2P systems of rational users. IEEE Trans. Parallel Distrib. Syst. 21, 4 (2009), 466–479.Google ScholarDigital Library
- Chithra Selvaraj and Sheila Anand. 2012. A survey on security issues of reputation management systems for peer-to-peer networks. Comput. Sci. Rev. 6, 4 (2012), 145–160.Google ScholarDigital Library
- Pengzhi Shi and Haiguang Chen. 2012/08. RASN: Resist on-off attack for wireless sensor networks. In Proceedings of the International Conference on Computer Application and System Modeling. Atlantis Press, Paris, France, 690–693. DOI:https://doi.org/10.2991/iccasm.2012.175Google Scholar
- Mudhakar Srivatsa, Li Xiong, and Ling Liu. 2005. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of the 14th international conference on World Wide Web. Association for Computing Machinery, New York, NY, 422–431.Google ScholarDigital Library
- Y. Sun and Y. Liu. 2012. Security of online reputation systems: The evolution of attacks and defenses. IEEE Signal Process. Mag. 29, 2 (2012), 87–97.Google ScholarCross Ref
- S. Tadelis. 2016. The economics of reputation and feedback systems in e-commerce marketplaces. IEEE Internet Comput. 20, 1 (2016), 12–19.Google ScholarDigital Library
- W. T. Luke Teacy, Jigar Patel, Nicholas R. Jennings, and Michael Luck. 2006. Travos: Trust and reputation in the context of inaccurate information sources. Auton. Agents Multi-Agent Syst. 12, 2 (2006), 183–198.Google ScholarDigital Library
- George Theodorakopoulos and John S. Baras. 2006. On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Select. Areas Commun. 24, 2 (2006), 318–328.Google ScholarDigital Library
- E. Vasilomanolakis, S. Karuppayah, M. Mühlhäuser, and M. Fischer. 2015. Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surveys 47, 4 (2015), 55.Google ScholarDigital Library
- O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad. 2015. A survey on trust and reputation models for Web services: Single, composite, and communities. Decision Support Syst. 74 (2015), 121–134.Google ScholarDigital Library
- Dongxia Wang, Tim Muller, Athirai A. Irissappane, Jie Zhang, and Yang Liu. 2015. Using information theory to improve the robustness of trust systems. In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems. International Foundation for Autonomous Agents and Multiagent Systems, 791–799.Google Scholar
- Dongxia Wang, Tim Muller, Jie Zhang, and Yang Liu. 2015. Quantifying robustness of trust systems against collusive unfair rating attacks using information theory. In Proceedings of the International Joint Conferences on Artificial Intelligence. International Joint Conferences on Artificial Intelligence, 111–117.Google Scholar
- K. Wang, X. Qi, L. Shu, D.-J. Deng, and J. J. Rodrigues. 2016. Toward trustworthy crowdsourcing in the social internet of things. IEEE Wireless Commun. 23, 5 (2016), 30–36.Google ScholarDigital Library
- A. G. West, S. Kannan, I. Lee, and O. Sokolsky. 2010. An evaluation framework for reputation management systems. In Trust Modeling and Management in Digital Environments: From Social Concept to System Development. IGI Global, Hershey, PA, 282–308.Google Scholar
- Y. Zhang, W. Wang, and S. Lü. 2007. Simulating trust overlay in p2p networks. In Proceedings of the Computational Science (ICCS’07). Springer, Berlin, 632–639.Google Scholar
Index Terms
- A Simulation Software for the Evaluation of Vulnerabilities in Reputation Management Systems
Recommendations
A platform for the evaluation of distributed reputation algorithms
DS-RT '18: Proceedings of the 22nd International Symposium on Distributed Simulation and Real Time ApplicationsIn distributed environments, where unknown entities cooperate to achieve complex goals, intelligent techniques for estimating agents' truthfulness are required. Distributed Reputation Management Systems (RMSs) allow to accomplish this task without the ...
A coalition formation mechanism for trust and reputation-aware multi-agent systems
SBIA'12: Proceedings of the 21st Brazilian conference on Advances in Artificial IntelligenceMost multi-agent systems engineering methodologies propose the clear definition of roles and organizations. However, in distributed environments where agents with distinct capabilities coexist and cooperate to solve problems, having a rigid organization ...
Learning trust strategies in reputation exchange networks
AAMAS '06: Proceedings of the fifth international joint conference on Autonomous agents and multiagent systemsAn agent's trust decision strategy consists of the agent's policies for making trust-related decisions, such as who to trust, how trustworthy to be, what reputations to believe, and when to tell truthful reputations. In reputation exchange networks, ...
Comments