Trust in ubiquitous computing is about finding trustworthy partners for risky interactions in presence of uncertainty about identity, motivation, and goals of the potential interactions partners. In this paper, we present new approaches for estimating the trustworthiness of entities and for filtering and weighting recommendations, which we integrate in our trust model, called CertainTrust. We evaluate the robustness of our trust model using an canonical set of population mixes based on a classification of typical entity behaviors. The simulation is based on user traces collected in the Reality Mining project. The evaluation shows the applicability of our trust model to collaboration in opportunistic networks and its advantages in comparison to a distributed variant of the Beta Reputation System.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Download to read the full chapter text
Chapter PDF
References
Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of Hawaii International Conference on System Sciences (2000).
Billhardt, H. et al.: Trust-based service provider selection in open environments. In: ACM SAC ’07, pp. 1375-1380. ACM Press, New York, NY, USA (2007).
Buchegger, S., Le Boudec, J.Y.: A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks. In: P2PEcon 2004 (2004)
Douceur, J.R.: The sybil attack. In: IPTPS ’01: Revised Papers from the 1st Int. Workshop on Peer-to-Peer Systems, pp. 251-260 (2002)
Eagle, N., Pentland, A.S.: Reality mining: sensing complex social systems. Per-sonal Ubiquitous Comput. 10(4), 255-268 (2006).
Golbeck, J.: Computing and applying trust in web-based social networks. Ph.D. thesis, University of Maryland, College Park (2005)
Heinemann, A.: Collaboration in Opportunistic Networks. Ph.D. thesis, Technische Universität Darmstadt (2007).
Hui, P. et al.: Pocket switched networks and human mobility in conference envi-ronments. In: WDTN ’05: Proceeding of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, pp. 244-251 (2005).
Jøsang, A.: A logic for uncertain probabilities. International Journal of Uncer-tainty, Fuzziness and Knowledge-Based Systems 9(3), 279-212 (2001)
Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Conference on Electronic Commerce (2002)
Marsh, S.: Formalising trust as a computational concept. Ph.D. thesis, University of Stirling (1994).
Quercia, D., Hailes, S., Capra, L.: B-Trust: Bayesian trust framework for perva-sive computing. In: 4th Int. Conf. on Trust Management, pp. 298-312 (2006)
Ries, S.: CertainTrust: A trust model for users and agents. In: ACM SAC ’07, pp. 1599 - 1604 (2007)
Sabater, J., Sierra, C.: Reputation and social network analysis in multi-agent systems. In: Proceedings of the AAMAS, pp. 475-482 (2002).
Teacy, W.T. et al.: TRAVOS: Trust and reputation in the context of inaccurate information sources. In: Proceedings of the AAMAS 12(2), 183-198 (2006).
Whitby, A., Jøsang, A., Indulska., J.: Filtering out unfair ratings in bayesian reputation systems. Icfain Journal of Management Research 4(2), 48 - 64 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Ries, S., Heinemann, A. (2008). Analyzing the Robustness of CertainTrust. In: Karabulut, Y., Mitchell, J., Herrmann, P., Jensen, C.D. (eds) Trust Management II. IFIPTM 2008. IFIP – The International Federation for Information Processing, vol 263. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09428-1_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-09428-1_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09427-4
Online ISBN: 978-0-387-09428-1
eBook Packages: Computer ScienceComputer Science (R0)