Skip to main content

Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8564))

Abstract

This paper presents a framework for trust evaluation through monitoring, in particular, to address the question of how to derive trust from observations of certain properties. We propose a trust model based on subjective logic to represent trust through the notion of an opinion and to include aspects of uncertainty in a systematic fashion. Moreover, we analyze requirements for opinion generators and introduce novel parameterized generators that capture the requirements for opinion generators much better than current generators do. In addition, we show how a decision can be made based on trust monitoring within a certain context. The proposed trust evaluation framework is demonstrated with a case study of a Body Area Sensor Network. The results and examples show that the opinion generators can effectively work with various types of properties, including dependability, security and functionality related properties.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Aivaloglou, E., Gritzalis, S.: Hybrid trust and reputation management for sensor networks. Wireless Networks 16(5), 1493–1510 (2010)

    Article  Google Scholar 

  2. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173 (May 1996)

    Google Scholar 

  3. Bui, V., Verhoeven, R., Lukkien, J., Kocielnik, R.: A trust evaluation framework for sensor readings in body area sensor networks. In: ICST International Conference on Body Area Networks, Boston, Massachusetts, USA (September 2013)

    Google Scholar 

  4. Bui, V.T., Lukkien, J.J., Verhoeven, R.: Toward a trust management model for a configurable body sensor platform. In: Proceedings of the 6th International Conference on Body Area Networks (BodyNets 2011), pp. 23–26 (2011)

    Google Scholar 

  5. Dey, A.K.: Understanding and using context. Personal Ubiquitous Computing 5(1), 4–7 (2001)

    Article  Google Scholar 

  6. Ding, S., Ma, X.J., Yang, S.L.: A software trustworthiness evaluation model using objective weight based evidential reasoning approach. Knowledge and Information Systems, 1–19 (2011)

    Google Scholar 

  7. Hasan, Z., Krischkowsky, A., Tscheligi, M.: Modelling user-centered-trust (UCT) in software systems: Interplay of trust, affect and acceptance model. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 92–109. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  8. He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: Retrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. on Information Technology in Biomedicine 16(4), 623–632 (2012)

    Article  Google Scholar 

  9. Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: assigning roles to strangers. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 2–14 (2000)

    Google Scholar 

  10. Jøsang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)

    Article  MathSciNet  Google Scholar 

  11. Jøsang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference, ACSC 2006, Australia, pp. 85–94 (2006)

    Google Scholar 

  12. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM, NY (2003)

    Google Scholar 

  13. Manchala, D.: Trust metrics, models and protocols for electronic commerce transactions. In: Proceedings of the 18th International Conference on Distributed Computing Systems, pp. 312–321 (May 1998)

    Google Scholar 

  14. Sun, Y., Han, Z., Yu, W., Liu, K.: A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM), pp. 1–13 (2006)

    Google Scholar 

  15. Trust4All: Trust4All project (2007), http://www.win.tue.nl/trust4all/summary.html

  16. Xiong, L., Liu, L.: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)

    Article  Google Scholar 

  17. Yan, Z., Prehofer, C.: Autonomic trust management for a component-based software system. IEEE Trans. Dependable Secur. Comput. 8(6), 810–823 (2011)

    Article  Google Scholar 

  18. Zhang, J., Shankaran, R., Orgun, M., Varadharajan, V., Sattar, A.: A dynamic trust establishment and management framework for wireless sensor networks. In: Proceedings of the 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), pp. 484–491 (December 2010)

    Google Scholar 

  19. Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A quantitative trust establishment framework for reliable data packet delivery in manets. In: Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, SASN 2005, pp. 1–10. ACM, NY (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Bui, V., Verhoeven, R., Lukkien, J. (2014). Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant. In: Holz, T., Ioannidis, S. (eds) Trust and Trustworthy Computing. Trust 2014. Lecture Notes in Computer Science, vol 8564. Springer, Cham. https://doi.org/10.1007/978-3-319-08593-7_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08593-7_13

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08592-0

  • Online ISBN: 978-3-319-08593-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics