Skip to main content

An Energy Aware Approach to Trust Management Systems for Embedded Multi-Agent Systems

  • Conference paper
  • First Online:
Software Engineering for Resilient Systems (SERENE 2019)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 11732))

Included in the following conference series:

  • 394 Accesses

Abstract

With the growing interest toward pervasive systems such as the Internet of Things or Cyber-Physical Systems, embedded multi-agent systems have been increasingly investigated. In these systems, agents cooperate to achieve their local goals and a global goal that would be impossible for an isolated agent to achieve. However, the dark side of this collaboration is that agents can easily be victim of malicious attacks coming from untrustworthy agents. Consequently, trust management systems are designed to help agents choosing trustworthy counterparts to cooperate based on available information. But gathering the necessary information may be too expensive in terms of energy for small embedded agents and not relevant in all contexts. We propose a solution that allows agents to manage the energy consumption associated with information gathering. Our solution uses a Multi-Armed Bandit algorithm, which is a reinforcement learning technique to allow the agents to adapt themselves and their energy consumption to the context.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Badanidiyuru, A., Kleinberg, R., Slivkins, A.: Bandits with knapsacks. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 207–216. IEEE (2013)

    Google Scholar 

  2. Bonnefoi, R., Besson, L., Moy, C., Kaufmann, E., Palicot, J.: Multi-armed bandit learning in IoT networks: learning helps even in non-stationary settings. In: Marques, P., Radwan, A., Mumtaz, S., Noguet, D., Rodriguez, J., Gundlach, M. (eds.) CrownCom 2017. LNICST, vol. 228, pp. 173–185. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-76207-4_15

    Chapter  Google Scholar 

  3. Chen, R., Bao, F., Guo, J.: Trust-based service management for social internet of things systems. IEEE Trans. Dependable Secure Comput. 13(6), 684–696 (2016)

    Article  Google Scholar 

  4. Chen, R., Guo, J., Bao, F.: Trust management for SOA-based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9(3), 482–495 (2016)

    Article  Google Scholar 

  5. Cho, J.H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. (CSUR) 48(2), 28 (2015)

    Article  Google Scholar 

  6. Ding, W., Qin, T., Zhang, X.D., Liu, T.Y.: Multi-armed bandit with budget constraint and variable costs. In: Twenty-Seventh AAAI Conference on Artificial Intelligence (2013)

    Google Scholar 

  7. Granatyr, J., Botelho, V., Lessing, O.R., Scalabrin, E.E., Barthès, J.P., Enembreck, F.: Trust and reputation models for multiagent systems. ACM Comput. Surv. (CSUR) 48(2), 27 (2015)

    Article  Google Scholar 

  8. Jamont, J., Occello, M.: Meeting the challenges of decentralised embedded applications using multi-agent systems. IJAOSE 5(1), 22–68 (2015). https://doi.org/10.1504/IJAOSE.2015.078435

    Article  Google Scholar 

  9. Jamont, J.-P., Occello, M., Mendes, E.: Decentralized intelligent real world embedded systems: a tool to tune design and deployment. In: Demazeau, Y., Ishida, T., Corchado, J.M., Bajo, J. (eds.) PAAMS 2013. LNCS (LNAI), vol. 7879, pp. 133–144. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38073-0_12

    Chapter  Google Scholar 

  10. Jennings, N.R., Sycara, K., Wooldridge, M.: A roadmap of agent research and development. Auton. Agent. Multi-Agent Syst. 1(1), 7–38 (1998)

    Article  Google Scholar 

  11. Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(9), 1086–1093 (2010)

    Article  Google Scholar 

  12. Maarouf, I., Baroudi, U., Naseer, A.R.: Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Commun. 3(5), 846–858 (2009)

    Article  Google Scholar 

  13. Mendoza, C.V.L., Kleinschmidt, J.H.: A distributed trust management mechanism for the internet of things using a multi-service approach. Wireless Pers. Commun. 103(3), 2501–2513 (2018)

    Article  Google Scholar 

  14. Ozdemir, S.: Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput. Commun. 31(17), 3941–3953 (2008)

    Article  Google Scholar 

  15. Pinyol, I., Sabater-Mir, J.: Computational trust and reputation models for open multi-agent systems: a review. Artif. Intell. Rev. 40(1), 1–25 (2013)

    Article  Google Scholar 

  16. Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. Knowl. Eng. Rev. 19(1), 1–25 (2004)

    Article  Google Scholar 

  17. Rezgui, A., Eltoweissy, M.: \(\mu \)RACER: a reliable adaptive service-driven efficient routing protocol suite for sensor-actuator networks. IEEE Trans. Parallel Distrib. Syst. 20(5), 607–622 (2009)

    Google Scholar 

  18. Ries, S.: Engineering trust in ubiquitous computing. In: Proceedings of Workshop on Software Engineering Challenges for Ubiquitous Computing, Lancaster, UK (2006)

    Google Scholar 

  19. Ries, S., Kangasharju, J., Mühlhäuser, M.: A classification of trust systems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006. LNCS, vol. 4277, pp. 894–903. Springer, Heidelberg (2006). https://doi.org/10.1007/11915034_114

    Chapter  Google Scholar 

  20. Robbins, H.: Some aspects of the sequential design of experiments. Bull. Am. Math. Soc. 58(5), 527–535 (1952)

    Article  MathSciNet  MATH  Google Scholar 

  21. da Rocha Costa, A.C., Hübner, J.F., Bordini, R.H.: On entering an open society. In: XI Brazilian Symposium on Artificial Intelligence, vol. 535, p. 546. Citeseer (1994)

    Google Scholar 

  22. Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities-trust modeling, trust inference and attacks. Knowl.-Based Syst. 106, 150–163 (2016)

    Article  Google Scholar 

  23. Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artif. Intell. Rev. 24(1), 33–60 (2005)

    Article  MATH  Google Scholar 

  24. Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)

    Article  Google Scholar 

  25. Tran-Thanh, L., Chapman, A., de Cote, E.M., Rogers, A., Jennings, N.R.: Epsilon-first policies for budget-limited multi-armed bandits. In: Twenty-Fourth AAAI Conference on Artificial Intelligence (2010)

    Google Scholar 

  26. Vercouter, L., Jamont, J.P.: Lightweight trusted routing for wireless sensor networks. In: Demazeau, Y., Pěchoucěk, M., Corchado, J.M., Pérez, J.B. (eds.) Advances on Practical Applications of Agents and Multiagent Systems. AINSC, vol. 88, pp. 87–96. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19875-5_11

    Chapter  Google Scholar 

  27. Vercouter, L., Jamont, J.: Lightweight trusted routing for wireless sensor networks. Prog. AI 1(2), 193–202 (2012). https://doi.org/10.1007/s13748-012-0017-7

    Article  Google Scholar 

  28. Xia, Y., et al.: Finite budget analysis of multi-armed bandit problems. Neurocomputing 258, 13–29 (2017)

    Article  Google Scholar 

  29. Yu, H., Shen, Z., Leung, C., Miao, C., Lesser, V.R.: A survey of multi-agent trust management systems. IEEE Access 1, 35–50 (2013)

    Article  Google Scholar 

  30. Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867–880 (2012)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oum-El-Kheir Aktouf .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Darroux, A., Jamont, JP., Aktouf, OEK., Mercier, A. (2019). An Energy Aware Approach to Trust Management Systems for Embedded Multi-Agent Systems. In: Calinescu, R., Di Giandomenico, F. (eds) Software Engineering for Resilient Systems. SERENE 2019. Lecture Notes in Computer Science(), vol 11732. Springer, Cham. https://doi.org/10.1007/978-3-030-30856-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-30856-8_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-30855-1

  • Online ISBN: 978-3-030-30856-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics