DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

  • Wendy Maiden
  • Ioanna Dionysiou
  • Deborah Frincke
  • Glenn Fink
  • David E. Bakken
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6514)


For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, trust management is important for the acceptance of the mobile agent sensors and to protect the system from malicious behavior by insiders and entities that have penetrated network defenses. This paper examines the trust relationships, evidence, and decisions in a representative system and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. We propose the DualTrust conceptual trust model. By addressing the autonomic manager’s bi-directional primary relationships in the ACS architecture, DualTrust is able to monitor the trustworthiness of the autonomic managers, protect the sensor swarm in a scalable manner, and provide global trust awareness for the orchestrating autonomic manager.


Trust management autonomic computing systems reputation mobile agent DualTrust 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Maiden, W.M., Haack, J.N., Fink, G.A., McKinnon, A.D., Fulp, E.W.: Trust Management in Swarm-Based Autonomic Computing Systems. In: Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, pp. 46–53 (2009)Google Scholar
  2. 2.
    Dorigo, M., Maniezzo, V., Colorni, A.: The Ant System: Optimization by a Colony of Cooperating Agents. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 26(1), 29–41 (1996)CrossRefGoogle Scholar
  3. 3.
    Hoffmeyer, J.: The Swarming Body. In: Semiotics around the world: Synthesis in diversity. Proceedings of the Fifth Congress of the International Association for Semiotic Studies, Berkeley 1994, pp. 937–940. Mouton de Gruyter, Berlin (1997)Google Scholar
  4. 4.
    Kephart, J.O., Chess, D.M.: The Vision of Autonomic Computing. Computer 36, 41–50 (2003)CrossRefGoogle Scholar
  5. 5.
    An Architectural Blueprint for Autonomic Computing, 4th edn. Technical report, IBM Corporation, New York (2006),
  6. 6.
    Haack, J.N., Fink, G.A., Maiden, W.M., McKinnon, A.D., Fulp, E.W.: Mixed-Initiative Cyber Security: Putting humans in the right loop. In: The First International Workshop on Mixed-Initiative Multiagent Systems (MIMS) (2009),
  7. 7.
    Wolpert, D., Tumer, K.: An Introduction to Collective Intelligence, Technical Report NASA-ARC-IC-99-63, NASA Ames Research Center, California (1999)Google Scholar
  8. 8.
    Maiden, W.M.: Trust Management Considerations for the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions, Technical Report PNNL-19117, Pacific Northwest National Laboratory, Richland, Washington (2010),
  9. 9.
    Jansen, W., Karygiannis, T.: NIST Special Publication 800-19 – Mobile Agent Security. Technical report, National Institute of Standards and Technology, Gaithersburg, Maryland (1999)Google Scholar
  10. 10.
    Lin, K.-J., Lu, H., Yu, T., Tai, C.: A Reputation and Trust Management Broker Framework for Web Applications. In: Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Service, pp. 262–269 (2005)Google Scholar
  11. 11.
    Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Trust Enhanced Security for Mobile Agents. In: Seventh IEEE International Conference on E-Commerce Technology, pp. 231–238 (2005)Google Scholar
  12. 12.
    Tan, H.K., Moreau, L.: Certificates for Mobile Code Security. In: Proceedings of the 2002 ACM Symposium on Applied Computing, pp. 76–81. ACM, New York (2002)CrossRefGoogle Scholar
  13. 13.
    Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Security and Trust Management in Mobile Agents: A New Perspective. In: 2nd International Conference on Mobile Technology, Applications and Systems, pp. 1–9 (2005)Google Scholar
  14. 14.
    Lin, C., Varadharajan, V.: Trust Enhanced Security - A New Philosophy for Secure Collaboration of Mobile Agents. In: International Conference on Collaborative Computing: Networking, Applications and Worksharing, pp. 1–8 (2006)Google Scholar
  15. 15.
    Xiong, L., Liu, L.: PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering 16, 843–857 (2004)CrossRefGoogle Scholar
  16. 16.
    Stakhanova, N., Basu, S., Wong, J., Stakhanov, O.: Trust Framework for P2P Networks Using Peer-Profile Based Anomaly Technique. In: 25th IEEE International Conference on Distributed Computing Systems Workshops, pp. 203–209 (2005)Google Scholar
  17. 17.
  18. 18.
    Better Business Bureau,
  19. 19.
    Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-Peer Information System. In: Proceedings of the Tenth International Conference on Information and Knowledge Management, pp. 310–317. ACM, New York (2001)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Wendy Maiden
    • 1
    • 2
  • Ioanna Dionysiou
    • 2
    • 3
  • Deborah Frincke
    • 1
    • 2
  • Glenn Fink
    • 1
  • David E. Bakken
    • 2
  1. 1.Pacific Northwest National LaboratoryRichlandUSA
  2. 2.School of Electrical Engineering and Computer ScienceWashington State UniversityPullmanUSA
  3. 3.Department of Computer ScienceUniversity of NicosiaNicosiaCyprus

Personalised recommendations