Abstract
Computational trust and reputation models are used to aid the decision-making process in complex dynamic environments, where we are unable to obtain perfect information about the interaction partners. In this paper we present a comparison of our proposed hidden Markov trust model to the Beta reputation system. The hidden Markov trust model takes the time between observations into account, it also distinguishes between system states and uses methods previously applied to intrusion detection for the prediction of which state an agent is in. We show that the hidden Markov trust model performs better when it comes to the detection of changes in behavior of agents, due to its larger richness in model features. This means that our trust model may be more realistic in dynamic environments. However, the increased model complexity also leads to bigger challenges in estimating parameter values for the model. We also show that the hidden Markov trust model can be parameterized so that it responds similarly to the Beta reputation system.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Balakrishnan, V., Varadharajan, V., Tupakula, U., Lucs, P.: TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks. In: ICON 2007: 15th IEEE International Conference on Networks, pp. 182–187. IEEE, Los Alamitos (2007)
Buchegger, S., Le Boudec, J.: A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems (2004)
Dewan, P., Dasgupta, P., Bhattacharya, A.: On using reputations in ad hoc networks to counter malicious nodes. In: ICPADS 2004: Proceedings of the Tenth International Conference on Parallel and Distributed Systems. IEEE, Los Alamitos (2004)
Dingledine, R., Freedman, M., Molnar, D.: Accountability. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly, Sebastopol (2001)
Haslum, K., Moe, M.E.G., Knapskog, S.: Real-time Intrusion Prevention and Security Analysis of Networks using HMMs. In: Proceedings of the Fourth IEEE LCN Workshop on Network Security (WNS 2008). IEEE, Los Alamitos (2008)
Jøsang, A., Haller, J.: Dirichlet Reputation Systems. In: Proceedings of the Second IEEE International Conference on Availability, Reliability and Security (ARES 2007). IEEE, Los Alamitos (2007)
Jøsang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)
Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255–265. ACM, New York (2000)
Moe, M.E.G., Helvik, B.E., Knapskog, S.J.: TSR: Trust-based Secure MANET Routing using HMMs. In: Proceedings of the 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2008). ACM, New York (2008)
Moe, M.E.G., Tavakolifard, M., Knapskog, S.J.: Learning Trust in Dynamic Multiagent Environments using HMMs. In: Proceedings of the 13th Nordic Workshop on Secure IT Systems (NordSec 2008) (2008)
Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2431–2439 (2002)
Nielsen, M., Krukow, K., Sassone, V.: A Bayesian Model for Event-based Trust. Electronic Notes on Theoretical Computer Science (ENTCS) 172, 499–521 (2007)
Rabiner, L.R.: A tutorial on hidden markov models and selected applications in speech recognition. In: Readings in speech recognition, pp. 267–296 (1990)
Rasmusson, L., Jansson, S.: Simulated Social Control for Secure Internet Commerce. In: Proceedings of the 1996 Workshop on New Security Paradigms (NSPW 1996). ACM, New York (1996)
Ross, S.M.: Continuous-Time Markov Chains. In: Introduction to Probability Models, 8th edn., pp. 349–390. Academic Press, London (2003)
Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review 24(1), 33–60 (2005)
Sutton, R., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (1998)
Whitby, A., Jøsang, A., Indulska, J.: Filtering out unfair ratings in bayesian reputation systems. In: Proceedings of the 7th International Workshop on Trust in Agent Societies (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 IFIP International Federation for Information Processing
About this paper
Cite this paper
Moe, M.E.G., Helvik, B.E., Knapskog, S.J. (2009). Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments. In: Ferrari, E., Li, N., Bertino, E., Karabulut, Y. (eds) Trust Management III. IFIPTM 2009. IFIP Advances in Information and Communication Technology, vol 300. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02056-8_18
Download citation
DOI: https://doi.org/10.1007/978-3-642-02056-8_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02055-1
Online ISBN: 978-3-642-02056-8
eBook Packages: Computer ScienceComputer Science (R0)