19,162 research outputs found
Specifying and analysing reputation systems with coordination languages
Reputation systems are nowadays widely used to support decision making in networked systems. Parties in such systems rate each other and use shared ratings to compute reputation scores that drive their interactions. The existence of reputation systems with remarkable differences calls for formal approaches to their analysis. We present a verification methodology for reputation systems that is based on the use of the coordination language Klaim and related analysis tools. First, we define a parametric Klaim specification of a reputation system that can be instantiated with different reputation models. Then, we consider stochastic specification obtained by considering actions with random (exponentially distributed) duration. The resulting specification enables quantitative analysis of properties of the considered system. Feasibility and effectiveness of our proposal is demonstrated by reporting on the analysis of two reputation models
Reputation Model with Forgiveness Factor for Semi-Competitive E-Business Agent Societies
In this paper we introduce a new reputation model for agents engaged in e-business transactions. Our model enhances classic reputation models by adding forgiveness factor and new sources of reputation information based on agents groups. The model was implemented using JADE multi-agent platform and initially evaluated for e-business scenarios comprising societies of buyer and seller agents.
Reputation-based trust evaluations through diversity
Non peer reviewedPostprin
The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach
Wireless sensor networks consist of a large number of distributed sensor
nodes so that potential risks are becoming more and more unpredictable. The new
entrants pose the potential risks when they move into the secure zone. To build
a door wall that provides safe and secured for the system, many recent research
works applied the initial authentication process. However, the majority of the
previous articles only focused on the Central Authority (CA) since this leads
to an increase in the computation cost and energy consumption for the specific
cases on the Internet of Things (IoT). Hence, in this article, we will lessen
the importance of these third parties through proposing an enhanced
authentication mechanism that includes key management and evaluation based on
the past interactions to assist the objects joining a secured area without any
nearby CA. We refer to a mobility dataset from CRAWDAD collected at the
University Politehnica of Bucharest and rebuild into a new random dataset
larger than the old one. The new one is an input for a simulated authenticating
algorithm to observe the communication cost and resource usage of devices. Our
proposal helps the authenticating flexible, being strict with unknown devices
into the secured zone. The threshold of maximum friends can modify based on the
optimization of the symmetric-key algorithm to diminish communication costs
(our experimental results compare to previous schemes less than 2000 bits) and
raise flexibility in resource-constrained environments.Comment: 27 page
A Trust-based Recruitment Framework for Multi-hop Social Participatory Sensing
The idea of social participatory sensing provides a substrate to benefit from
friendship relations in recruiting a critical mass of participants willing to
attend in a sensing campaign. However, the selection of suitable participants
who are trustable and provide high quality contributions is challenging. In
this paper, we propose a recruitment framework for social participatory
sensing. Our framework leverages multi-hop friendship relations to identify and
select suitable and trustworthy participants among friends or friends of
friends, and finds the most trustable paths to them. The framework also
includes a suggestion component which provides a cluster of suggested friends
along with the path to them, which can be further used for recruitment or
friendship establishment. Simulation results demonstrate the efficacy of our
proposed recruitment framework in terms of selecting a large number of
well-suited participants and providing contributions with high overall trust,
in comparison with one-hop recruitment architecture.Comment: accepted in DCOSS 201
Quality of Information in Mobile Crowdsensing: Survey and Research Challenges
Smartphones have become the most pervasive devices in people's lives, and are
clearly transforming the way we live and perceive technology. Today's
smartphones benefit from almost ubiquitous Internet connectivity and come
equipped with a plethora of inexpensive yet powerful embedded sensors, such as
accelerometer, gyroscope, microphone, and camera. This unique combination has
enabled revolutionary applications based on the mobile crowdsensing paradigm,
such as real-time road traffic monitoring, air and noise pollution, crime
control, and wildlife monitoring, just to name a few. Differently from prior
sensing paradigms, humans are now the primary actors of the sensing process,
since they become fundamental in retrieving reliable and up-to-date information
about the event being monitored. As humans may behave unreliably or
maliciously, assessing and guaranteeing Quality of Information (QoI) becomes
more important than ever. In this paper, we provide a new framework for
defining and enforcing the QoI in mobile crowdsensing, and analyze in depth the
current state-of-the-art on the topic. We also outline novel research
challenges, along with possible directions of future work.Comment: To appear in ACM Transactions on Sensor Networks (TOSN
Preliminary specification and design documentation for software components to achieve catallaxy in computational systems
This Report is about the preliminary specifications and design documentation for software components to achieve Catallaxy in computational systems. -- Die Arbeit beschreibt die Spezifikation und das Design von Softwarekomponenten, um das Konzept der Katallaxie in Grid Systemen umzusetzen. Eine Einführung ordnet das Konzept der Katallaxie in bestehende Grid Taxonomien ein und stellt grundlegende Komponenten vor. Anschließend werden diese Komponenten auf ihre Anwendbarkeit in bestehenden Application Layer Netzwerken untersucht.Grid Computing
Agent Based E-Market: Framework, Design, and Implementation
Attempt has been made to design and develop a complete adoptive Multi Agent System pertaining to merchant brokering stage of Customer Buying Behaviour Model with the intent of appropriate framework. Intelligent agents are autonomous entity which observe and act upon an environment. In general, they are software robots and vitally used in variety of e-Business applications. This paper focuses on the discussions on electronic markets and the adoptive role, which agents can play in information transformation for automating e-market transactions. It is proposed to develop a framework for agent-based electronic markets for buyers and sellers totally with the assistance of software agents.Agent Oriented e-Business, Agent Oriented e-Markets, Buyer/Seller Agents, Java, Multi Agent Systems
- …