This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 2005 proceedings.

An Agent-based Trust and Reputation Management Scheme for Wireless Sensor Networks∗ Azzedine Boukerche

Xu Li

PARADISE Research Laboratory

PARADISE Research Laboratory

SITE, University of Ottawa, Canada

SITE, University of Ottawa, Canada

[email protected]

[email protected]

Abstract The operation of wireless sensor networks (WSNs) is functionally affected by the selfish and/or malicious network nodes; and their resource constraints complicate the design of any WSN-based protocol and application. Rating nodes’ trust and reputation have proven to be an effective solution to improve security, to support decision-making and to promote node collaboration in both wired and wireless networks. However, existing approaches to trust and reputation management emphasize mostly on trust and reputation modeling and ignore the overhead problems brought by their proposed schemes. In this paper, taking into consideration the power and bandwidth constraints of WSNs, we propose a novel Agent-based Trust and Reputation Management scheme (ATRM) from a system design point of view. Our objective is to manage trust and reputation with minimal overhead in terms of extra messages and time delay. The main contribution of our work is the introduction of a localized trust and reputation management strategy, which reduces both communication cost and acquisition latency.

1

Introduction

Trust is the degree of belief about the future behavior of other entities, which is based on the one’s the past experience with and observation of their actions [1]; and its properties can be summarized as: subjectivity [2], non-transitivity [3], temporalness [4], contextualness and dynamicity as well as non-monotonicity [1]. Additionally, another characteristic of trust, unidirection, can be derived from subjectiveness and non-transitiveness. Reputation is another complex notion, which is quite different from but easily confused with trust. In a community, reputation of an entity is the global perception about the entity’s behavior norms based on the trust that other entities hold in the entity [1, 5]. The characteristics of reputation include objectivity, temporalness, contextualness [6], and dynamicity as well as non-monotonicity. After Blaze, Feigenbaum, and Lacy ∗ This work was partially sponsored by the Canada Research Chair Program, NSERC, Canada Foundation for Innovation Funds, and OIT/Ontario Distinguished Researcher Award.

IEEE Globecom 2005

1857

formally introduced “trust management” as a separate component of security in network services and gave an overall definition of trust management problem in [7], a great deal of comprehensive research focusing especially on trust and reputation management follows. Research shows that rating nodes’ trust and reputation is an effective approach in distributed environments to improve security [8, 9], to support decision-making [10, 11], and to promote node collaboration [12]. Nowadays, trust and reputation management is attracting more and more attention from researchers and becoming an essential part of many network-based applications. Flooding the network with request messages is a useful tool for data-searching in a fully distributed environment. However, since message transfer consumes both bandwidth and energy, the trust and reputation management schemes causing large amounts of traffic by flooding the network with request messages are not desirable in WSNs known for their bandwidth and energy constraints. In addition, because trust and reputation information are usually requested by nodes before they start communicating with each others, the trust and reputation management schemes with poor trust and reputation acquisition latency are not acceptable in situations with strict real-time requirements, like battle fields and emergency rescue. Under these circumstances, we propose a novel Agent-based Trust and Reputation Management scheme (ATRM) for WSNs; the main objective of our scheme is to manage trust and reputation with minimal overhead in terms of extra messages and time delay. The ATRM is based on a clustered WSN with backbone and on a mobile agent system; it introduces a trust and reputation local management strategy with the help from the mobile agent running on each node. In the ATRM, no centralized repositories are needed, and trust aggregation and reputation propagation requires neither network-wide flooding nor long acquisition-latency.

2

Related Work

Blaze, Feigenbaum, and Lacy [7] proposed a unified decentralized trust management system, PolicyMaker, based

0-7803-9415-1/05/$20.00 © 2005 IEEE

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 2005 proceedings.

on a simple language for describing security policies, credentials and relationships. PolicyMaker works like a database engine. Its basic function is to process queries, each of which is a request to determine if a particular public key or a set of particular public keys are permitted to perform a particular action according to local policy. Similar systems include KeyNote [13], RT [14] and TPL [15]. Kamvar, Schlosser, and Garcia-Molina [10] proposed a reputation management algorithm, called EigenTrust, for peer-to-peer (P2P) networks. In EigenTrust, a node’s local trust is considered differnet from its global reputation; trust aggregation is done using a transitive trust mechanism: a requester asks its friends for their opinions about the evaluated node, and then it asks for the opinions of its friends’ friends, and then it asks for the opinions of its friends’ friends’ friends, and so on. This kind of asking process ends after a pre-determined number of iterations. Taking into account the dynamicity of mobile ad-hoc networks (MANETs), Ren and his colleagues [2] proposed a certificate-based trust establishment scheme. They addressed the trust establishment with the dynamically joining and leaving node under the assumption of existing sparse social relationships among nodes. The scheme requires a bootstrapping phase during which a secret dealer is required. After the bootstrapping phase, network becomes fully functional with no need of the secure dealer, and the trust establishment for any two nodes turns into a certificate chain detection problem in a certificate graph. Buchegger and Boudec [5] presented a reputation system for MANETs and P2P networks, which is featured with the elimination of the affection on reputation from incompatible recommendation. In this algorithm, a node periodically publishes its first-hand information about another node. By using the received recommendation and its own immediate experience, a node updates the repuation of another node accordingly. In order to reduce traffic, the first-hand information publication is confined to a subset of nodes. Some proposed schemes like [7] are designed for wired networks (e.g., P2P networks) and thus not suitable for WSNs where nodes have resource constraints. The ones such as [5, 2] are developed for wireless networks, but they focus mostly on trust and reputation modeling and seldom emphasize the network performance problem. As trust information is distributed into the entire network, reputation computation requires network-wide flooding for trust aggregation. Whether reputation computation is periodical or on-demand, it will results in packet collision and energy loss. Although the scheme presented in [5] restricts flooding to a subnet of nodes, how to determine the subset such that it covers all the nodes (or a sufficient number of nodes) holding the required trust information becomes a problem.

3

The Proposed Scheme ATRM

In this section, we presents our proposed Agent-based Trust and Reputation Management scheme (ATRM).

IEEE Globecom 2005

1858

The ATRM is based on a clustered WSN with backbone, and its core is a mobile agent system. The ATRM requires that every node locally hold a mobile agent which is in charge of administrating the trust and reputation of its hosting node. Before starting any transaction, the requester asks its local mobile agent to obtain the reputation information of the provider by directly querying the provider’s local mobile agent. Based on the provider’s reputation, the requester decides whether to start the transaction or not. After a transaction is finished, the requester makes a trust evaluation on the provider according to the Quality of Service (QoS) it gets from the provider during the transaction, and then it submits the evaluation to its local mobile agent which then passes the evalutation to the provider’s local mobile agent. Using the collected trust evaluation, a mobile agent periodically performs repuation computation for its hosting node.

3.1

Network Model and Assumptions

Sufficient backbone nodes with multiple long-range radios are randomly scattered in the WSN. Every node has a unique ID by which it can be distinguished from others. Through a secure routing protocol, all the nodes (including backbone nodes) together compose a low-level network using a short-range radio, which is referred to as the original network. Likewise, the backbone nodes additionally constitute a high-level network, backbone network, via a long-range radio. The original network is dynamically partitioned by an effective clustering algorithm running on every node into a number of clusters, each of which has a backbone node elected as cluster head. Both backbone and non-backbone nodes may fail or become unavailable due to system crash, power exhaust or any other reason, however, the rest of the original network and backbone network is still connected. Since mobile agents are designed to travel over the entire network and run on remote nodes, they must be launched by trusted entities. And clearly, compromised mobile agents may not provide expected services and can actually constitute a threat to network security. Therefore, in ATRM, we assume 1) that there is a trusted authority which is responsible for generating and launching mobile agents and 2) that mobile agents are resilient against unauthorized analysis and modification towards their computation logic.

3.2

System Architecture

ATRM consists of four key components, which are an Agent Launcher (AL), Trust and Reputation Assessors (TRAs), Trust Instruments (t-Instruments), Reputation Certificates (r-Certificates). We are going to introduce these four components in this section. • Agent Launcher (AL): An AL is an always-existing and presumably-trusted authority responsible for generating and launching TRAs into the network. It may be a piece of software, a node or an organization, and it could be either inside or outside the network. In ATRM, there is only one

0-7803-9415-1/05/$20.00 © 2005 IEEE

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 2005 proceedings.

AL that launches one TRA each time in a broadcast fashion into the backbone network. Before launching a TRA, the AL associates it with a symmetric secret key AK and a monotonically increased version number (starting from 1). The purpose of AK is to secure trust aggregation and reputation propagation, while the version number is used to support agent consistency verification. In case the AK of the current T RA is stolen or broken, the AL may periodically launch a new TRA with a higher version number and a fresh AK to replace old ones according to application-specific security requirements. • Trust and Reputation Assessor (TRA): A TRA is a mobile agent generated by the AL. It is designed to be distributed into every node and to provide its hosting node with trust and reputation management service. Each node holds a replica of the TRA of current version. For an arbitrary node ni , its replica TRA, T RA(ni ), locally maintains four data structures, i.e., a trust evaluation table T abeval , a t-Instrument table T abinstr , a r-Certificate buffer Bufcert , and a LowVersion message counter CN T ER. The trust evaluations that ni recently made on other nodes are kept in T abval , while the t-Instruments issued to ni by the local replica TRAs of other nodes are stored in T abinstr . Bufcert accommodates ni ’s r-Certificate last issued by T RA(ni ). As for CN T ER, it is incremented whenever T RA(ni ) receives a LowVersion message from a node for the first time since the last CN T ER resetting. T abeval is composed of four fields, ID, CT X, EV AL, and T S, among which ID and CT X together constitute the primary key of the table. Field ID contains the IDs of the evaluated nodes; field CT X implies trust contexts; field EV AL stores the trust evaluation values; field T S holds the time when evaluations are made. For any node nj , its entry for an arbitrary context C in the T abeval of node ni is denoted by Entryeval (nj , C ). T abinstr contains five fields, including ID, CT X, IN ST R, T S and ACK, of which ID and CT X together constitute the primary key of the table. Field ID contains the IDs of t-Instrument issuers; field ACK reflects how may times a t-Instrument issuance is acknowledged, and its default value is 1. For any node nj , its entry for an arbitrary context C in the T abinstr of node ni is denoted by Entryinstr (nj , C ). A replica TRA stays on its host until it is replaced by a higher-version TRA, and in the meantime, it offers its host the trust and reputation management service. When TRA replacement takes place, the new local TRA will take over all the data structures maintained by the old one and reset CN T ER to 0. Detailed description about TRA’s functionality can be found in Section ??. • Trust Instruments (t-Instruments): A t-Instrument is a segment of data issued by the local replica T RA of a node (issuer) to another node (issuee). It is stored in the T abinstr on its issuee node. Considering any two nodes ni and nj , the t-Instrument issued by T RA(ni ) to nj under context C is defined as: T I(ni , nj , C ) = EAK (D, H(D)), where D =

IEEE Globecom 2005

1859

(ID(ni ), ID(nj ), C , T, ti,j ) and T is a timestamp implying the time when the t-Instrument is issued. By above definition, we can see that a t-Instrument implicitly indicates the temporalness property of trust by the use of a timestamp T . t-Instrument issuance is driven by transactions; and it involves message transmission between the local replica TRAs of issuers and issuees. A more detailed description about t-Instrument issuance can be found in Section ??. • Reputation Certificates (r-Certificates): A rCertificate is a segment of data issued by a replica TRA to its host. A node’s r-Certificate is locally stored in the Bufcert on the node itself and periodically refreshed by the local replica TRA. If there are k concerned contexts, for any node ni , its r-Certificate is defined as: RC(ni ) = EAK (R, H(R)), where R = (ID(ni ), T, ((r1 , C1 ), (r2 , C2 ), · · · , (rk , Ck ))) and T is a timestamp implying the time when the r-Certificate is issued. This formula is explained as follows: ni ’s reputation is r1 under context C1 , r2 under the context C2 , · · · , and rk under context Ck at time point T . This definition implicitly reflects the contextualness and temporalness properties of reputation. Description about r-Certificate acquisition and issuance can be found in Section ??.

3.3

How It Works

The execution of ATRM involves two phases, i.e., the network initialization phase and the service-offering phase. As soon as ATRM starts, the network initialization phase is initiated. The purpose of this phase is to distribute a TRA to every node. What follows is the service-offering phase during which the trust and reputation service is provided. In this subsection, we are going to go through the detail of these two phases. [1] Network Initialization Phase: The network initialization phase consists of two stages. In the first stage, the AL launches a TRA in the backbone network in a broadcast fashion. Considering an arbitrary node nj in the backbone network, when it receives a TRA for the first time, nj makes a replication of the TRA and then forwards the TRA to all its immediate neighbors in the backbone network. If nj receives an already-received TRA, it just discards the TRA and pretends nothing happened. Once nj has a replica TRA, it enters the second stage. In the second stage, nj checks if it itself is a cluster head. If so, nj broadcasts its replica TRA within its cluster in the original network to distribute the replica TRA to all its cluster members, or keeps silent otherwise. The network initialization phase is run at the beginning of the execution of ATRM, and it may also be re-run later from time to time to update replica TRAs depending on application-specific security requirements. [2] Service-offering Phase: As long as a node has a local replica TRA, the trust and reputation service provided by the replica TRA is available to the node, and thus we say that the node is in the service-offering phase. The trust and reputation service is composed mainly of four types of sub-

0-7803-9415-1/05/$20.00 © 2005 IEEE

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 2005 proceedings.

services, r-Certificate acquisition, t-Instrument issuance, r-Certificate issuance and trust management routine. The first two sub-services are transaction-driven and involve the message transmission between transaction requester (nreq ) and provider (npro ), whereas, the other two sub-services involve merely local processing periodically performed by the replica TRA of each node. r-Certificate Acquisition is initiated by T RA(nreq ) in the pre-transaction process just before the start of T ran . Its objective is to obtain the reputation of npro , based on which nreq is able to decide whether to start T ran with npro . Because the r-Certificate reflecting npro ’s reputation is locally stored by npro and managed by T RA(npro ), nreq just commissions its own replica TRA, T RA(nreq ), to directly ask T RA(npro ) for npro ’s r-Certificate. The detail of r-Certificate acquisition process is depicted below. At nreq side, T RA(nreq ) sends a CertRequest message carrying its version number to T RA(npro ) and then expects a reply message from it. If T RA(nreq ) does not get any reply from T RA(npro ) during a given period of time δcert , it will retry by sending a CertRequest message again to T RA(npro ). If still no response from T RA(npro ) after θcert (a pre-configured number of) retries, T RA(nreq ) considers that there is no T RA(npro ) at all and notifies nreq of the absence of T RA(npro )(This is referred to as Case 1). If T RA(nreq ) gets a LowVersion message from T RA(npro ) within θcert retries, in the cast that it is the first time (since the last CN T ER resetting) that T RA(nreq ) realizes npro has a high version of T RA, T RA(nreq ) increments CN T ER and notifies nreq that it need to be updated (This is referred to as Case 2.); in the other case, T RA(nreq ) pretends nothing happened. If the response is a HighVersion message, T RA(nreq ) notifies nreq that T RA(npro ) is out-of-date (This is referred to as Case 3). If what T RA(nreq ) receives is a CertReply message, T RA(nreq ) validates the RC(npro ) contained in the message by the following steps: decrypt the RC(npro ), and retrieve the R. Recall RC(ni ) = EAK (R, H(R)); compute the hash digest of R, H  (R); retrieve H(R) from RC(npro ), and compare it with H  (R). If the validity check is passed, T RA(nreq ) computes the trust of npro , based on the trust evaluation on npro in Lval (if any) and the reputation data retrieved from RC(npro ), using its self-contained computation logic, and it then passes nreq the computation result(This is referred to as Case 4); otherwise, it considers that the r-Certificate is illegally modified by npro and notifies nreq of the situation(This is referred to as Case 5). In Case 2, if CN T ER is equal to or greater than a threshold value θcnt , nreq asks its cluster head for the latest version of the TRA; otherwise, it goes for other transaction partner instead of npro . In Case 4, based on the computation result, nreq makes the decision on whether it starts transaction T ran with npro . In the other cases, what nreq is going to do depends on nreq ’s local policy.

IEEE Globecom 2005

1860

At npro side, upon receiving the CertRequest message from T RA(nreq ), T RA(npro ) retrieves the version number of T RA(nreq ) from the message to check if it itself is of the same version as T RA(nreq ). In the case that their version numbers are consistent, T RA(npro ) encapsulates the r-Certificate of npro , RC(npro ) (stored in Bufcert ), into a CertReply message and sends the message to T RA(nreq ) (This is referred to as Case 6). In the case that the version number of T RA(npro ) is higher than that of T RA(nreq ), T RA(npro ) sends a LowVersion message to T RA(nreq ) (This is referred to as Case 7). In the other case, if this situation ever happened with nreq (since last CN T ER resetting), or if it already received a LowVersion message from nreq , T RA(npro ) pretends nothing happened; otherwise, T RA(npro ) sends a HighVersion message to T RA(nreq ), increments CN T ER, and notifies its host npro that it need to be updated (This is referred to as Case 8). In Case 6, if T RA(npro ) later receives nreq ’s transaction request, it could accept or reject it. In Case 7, npro pretends nothing happened. In Case 8, if CN T ER is equal to or greater than θcnt , npro asks its cluster head for the latest version of the TRA; otherwise, it pretends nothing happened. t-Instrument Issuance is triggered by T RA(nreq ) in the post-transaction process right after the termination of T ran . The detail of t-Instrument issuance is presented as follows. At nreq side, upon the termination of T ran , based on the QoS obtained from npro during T ran , nreq makes a trust evaluation on npro for every related context C . A trust evaluation has the following form: (ID(npro ), C , treq,pro , T ) where T is the time when the evaluation is made. Then, nreq submits these trust evaluations to T RA(nreq ). For every trust evaluation (ID(npro ), C , treq,pro , T ) submitted by nreq , T RA(nreq ) updates Entryeval (npro , C ) with (treq,pro , T ) (if no such an entry, T RA(nreq ) creates one first), and then generates a t-Instrument T I(nreq , npro , C , T ) accordingly, sends it to T RA(npro ), and then expects an ACK message from T RA(npro ). If T RA(nreq ) does not receive from T RA(npro ) the ACK message corresponding to a issued t-Instrument in a certain period of time δinstr , it will resend the t-Instrument and expect an ACK message again. The t-Instrument issuance can be retried maximally θinstr (a pre-configured number of) times. At npro side, after receiving T I(nreq , npro , C ) from nreq , T RA(npro ) verifies its validity in the same way as a r-Certificate is validated. If T I(nreq , npro , C ) is invalid, it is simply discarded by T RA(npro ). Otherwise, T RA(npro ) first retrieves the timestamp T from T I(nreq , npro , C ) and then looks up Entryinstr (nreq , C ). If Entryinstr (nreq , C ) (shortly Entryinstr ) does not yet exists, T RA(npro ) first creates in T abinstr a new entry Entryinstr (nreq , C ) with

0-7803-9415-1/05/$20.00 © 2005 IEEE

This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE GLOBECOM 2005 proceedings.

T I(nreq , npro , C ) and T , and then sends an ACK message back to T RA(nreq ). If Entryinstr already exists, in the case of Entryinstr .T S < T , T RA(npro ) first updates Entryinstr .IN ST R and Entryinstr .T S respectively with T I(nreq , npro , C ) and T , and then sends an ACK message back to T RA(nreq ), and afterwards resets Entryinstr .ACK to 1; in the case of Entryinstr .T S = T and Entryinstr .ACK < θack , T RA(npro ) sends an ACK message back to T RA(nreq ) and then increments Entryinstr .ACK; in all other cases, T RA(npro ) discards T I(nreq , npro , C , T ) and pretends nothing happened. r-Certificate Issuance is executed periodically by replica TRAs based on the t-Instruments of their hosts. It involves two types of operations, computing reputation and generating r-Certificate. For any node ni , T RA(ni ) computes the reputation of its host ni based on the old r-Certificate in Bufcert and the t-Instruments in T abinstr using its self-contained computation logic. Since t-Instruments are context-specific, the computation result will not be a single value but a set of such values each of which represents ni ’s reputation in a specific context at the time T when it is computed. Afterwards, T RA(ni ) generates a r-Certificate with timestamp T for ni based on the computation result of previous step, and replaces the old r-Certificate in Bufcert with the new one, and then empties T abinstr .

Trust Management Routine is periodically carried out by every replica TRA to maintain the T abeval on its hosting node. Because of the temporalness of trust and the limit of local storage space, stale trust evaluation values should be removed from the T abeval . In each run of the routine, the replica TRA checks the difference between the current time and the timestamp of each entry in the T abeval . If the difference is bigger than a threshold value δvalid , the entry is removed.

4 Conclusions Trust and reputation management is an important issue in distributed autonomous environments such as wireless ad-hoc networks. Its solution should be carefully developed in accordance with the underlying network model in order to gain optimal network performance. We proposed a novel agent-based trust and reputation management scheme (ATRM) for wireless sensor networks (WSNs). ATRM introduces a trust and reputation local storage strategy, which makes trust aggregation and reputation propagation become straightforward without requiring network-wide flooding, and thus reducing reputation acquisition latency. We discuss the implemenation of our ATRM and made preliminary evaluation on the performance of ATRM based on experimental results.

IEEE Globecom 2005

1861

References [1] A. Abdul-Rahman and S. Hailes. “Supporting Trust in Virtual Communities”. In Proc. of the 33rd Ann. Hawaii Int’l Conf. System Sciences, V 6, p. 6007–6016, 2000. [2] K. Ren, T. Li, Z. Wan, F. Bao, R. H. Deng, and K. Kim. “Highly reliable trust establishment scheme in ad hoc networks”. J. of Computer Networks, p. 687–699, 2004. [3] B. Christianson and W. S. Harbison. “Why Isn’t Trust Transitive?”. In Proceedings of Security Protocols International Workshop, pages 171–176. University of Cambridge, 1996. [4] F. Azzedin and M. Maheswaran. “Towards Trust-Aware Resource Management in Grid Computing Systems”. In Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID’02), pages 452– 457, Berlin, Germany, May 2002. [5] S. Buchegger and J.Y.L. Boudec. “A robust reputation system for P2P and mobile ad-hoc networks”. In Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, Jun. 2004. [6] L. Mui, M. Mohtashemi, and A. Halberstadt. “A Computational Model of Trust and Reputation”. In Proceedings of the 35th Hawaii International Conference on System Sciences, pages 188–196, 2002. [7] M. Blaze, J. Feigenbaum, and J. Lacy. “Decentralized Trust Management”. In Proceedings of 1996 IEEE Conference on Privacy and Security, pages 164–173, Oakland, U.S., 1996. [8] A. Boukerche, K. El-Khatib, X. Li, and L. Korba. “A Novel Solution for Achieving Anonymity in Wireless Ad hoc Networks”. In Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad hoc, Sensor, and Ubiquitous Networks 2004, p. 30–38. [9] Z. Liu, A. W. Joy, and R. A. Thompson. “A Dynamic Trust Model for Mobile Ad Hoc Networks”. In Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS’04), pages 80–85, Suzhou, China, May 2004. [10] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. “The Eigentrust Algorithm for Reputation Management in P2P Networks”. In Proc. of the 12th Int’l World Wide Web [11] Y. Wang and J. Vassileva. “Trust and Reputation Model in Peer-to-Peer Networks”. In Proceedings of the 3rd International Conference on Peer-to-Peer Computing (P2P’03), pages 150–157, Linkoping, Sweden, Sep. 2003. [12] Q. He, O. D. Wu, and P. Khosla. “SORI: A Secure and Objective Reputation-based Incentive Scheme for Ad-hoc Networks”. In Proc. of IEEE Wireless Comm. and Networking Conf., 2004. [13] M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. “RFC 2704 - The KeyNote Trust Management System Version 2”, Sep. 1999. (Available at http://www.faqs.org /rfcs/rfc2704.html on May 06, 2005). [14] N. Li and J. Mitchell. “RT: A Role-based Trust-management Framework”. In Proc. of the 3rd DARPA Information Survivability Conf. and Exposition, p. 201–212, 2003. [15] A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid. “Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers”. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 2–14, Berkeley, U.S., May 2000. [16] Xu Li. “Secure and Anonymous Routing in Wireless Ad-hoc Networks”. Master’s Thesis, Uni. of Ottawa, May. 2005.

0-7803-9415-1/05/$20.00 © 2005 IEEE

An Agent-based Trust and Reputation Management ...

passes the evalutation to the provider's local mobile agent. Using the collected trust evaluation, a mobile agent period- ically performs repuation computation for its hosting node. 3.1 Network Model and Assumptions. Sufficient backbone nodes with multiple long-range ra- dios are randomly scattered in the WSN. Every node ...

103KB Sizes 0 Downloads 230 Views

Recommend Documents

Trust Management and Trust Negotiation in an ...
and a digital signature from the issuer. Every attribute certificate contains an attribute named subject; the other attribute-value pairs provide information about the ...

Trust Management and Trust Negotiation in an ...
trust management and trust negotiation systems such as RT [9], Cassandra [2], and ... pkfile denotes the name of a file containing a public-key certificate. ctv is the name of ... or a view of certtable (s). privilege type is an SQL privilege type. g

reputation management - Weber Shandwick
for presentations, media interviews and public speaking. Social and digital: Up-to-date advice on maximising social media and digital engagement, and the role.

STARK COUNTY CONNECTIONS REPUTATION MANAGEMENT ...
STARK COUNTY CONNECTIONS REPUTATION MANAGEMENT MAGAZINE.pdf. STARK COUNTY CONNECTIONS REPUTATION MANAGEMENT ...

Reputation Management Consultants.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying.

An Incentive Compatible Reputation Mechanism
present electronic business interactions as traditional legal enforcement is impossible .... system. However, for π (as defined by Equation (2)) to supply stable truth-telling .... and agreed that its partner can file reputation reports at the end o

Online Reputation Management for High School Students.pdf ...
Online Reputation Management for High School Students.pdf. Online Reputation Management for High School Students.pdf. Open. Extract. Open with. Sign In.

Online Reputation Management For Dummies
Click the button below to register a free account and download the file. Books Synopsis : More important than ever--how to manage your online reputation.

CHI2014 Reputation Management - Research at Google
Apr 26, 2014 - Reputation Management in the Internet Age ... We describe how users view reputation management chores as necessary but ... business due to a hostile takeover. ..... Of course, in some cases reputation harm to an individual.

Digital Reputation-Privacy and Reputation Online Resourcse for ...
Digital Reputation-Privacy and Reputation Online Resourcse for Educators.pdf. Digital Reputation-Privacy and Reputation Online Resourcse for Educators.pdf.

pdf-175\litigation-communication-crisis-and-reputation-management ...
... of the apps below to open or edit this item. pdf-175\litigation-communication-crisis-and-reputation-management-in-the-legal-process-by-thomas-beke.pdf.

Best Online Reputation Management Companies.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Main menu.

“CONFESS”. An Incentive Compatible Reputation ...
that we allow the provider to confess defection, before ask- ing the consumer ... The management of each hotel decides upfront the in- .... of service. PROOF. Starting from the intuitive assumption that it is not rational for any hotel to declare a q