Abstract
With the growing interest toward pervasive systems such as the Internet of Things or Cyber-Physical Systems, embedded multi-agent systems have been increasingly investigated. In these systems, agents cooperate to achieve their local goals and a global goal that would be impossible for an isolated agent to achieve. However, the dark side of this collaboration is that agents can easily be victim of malicious attacks coming from untrustworthy agents. Consequently, trust management systems are designed to help agents choosing trustworthy counterparts to cooperate based on available information. But gathering the necessary information may be too expensive in terms of energy for small embedded agents and not relevant in all contexts. We propose a solution that allows agents to manage the energy consumption associated with information gathering. Our solution uses a Multi-Armed Bandit algorithm, which is a reinforcement learning technique to allow the agents to adapt themselves and their energy consumption to the context.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Badanidiyuru, A., Kleinberg, R., Slivkins, A.: Bandits with knapsacks. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp. 207–216. IEEE (2013)
Bonnefoi, R., Besson, L., Moy, C., Kaufmann, E., Palicot, J.: Multi-armed bandit learning in IoT networks: learning helps even in non-stationary settings. In: Marques, P., Radwan, A., Mumtaz, S., Noguet, D., Rodriguez, J., Gundlach, M. (eds.) CrownCom 2017. LNICST, vol. 228, pp. 173–185. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-76207-4_15
Chen, R., Bao, F., Guo, J.: Trust-based service management for social internet of things systems. IEEE Trans. Dependable Secure Comput. 13(6), 684–696 (2016)
Chen, R., Guo, J., Bao, F.: Trust management for SOA-based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9(3), 482–495 (2016)
Cho, J.H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. (CSUR) 48(2), 28 (2015)
Ding, W., Qin, T., Zhang, X.D., Liu, T.Y.: Multi-armed bandit with budget constraint and variable costs. In: Twenty-Seventh AAAI Conference on Artificial Intelligence (2013)
Granatyr, J., Botelho, V., Lessing, O.R., Scalabrin, E.E., Barthès, J.P., Enembreck, F.: Trust and reputation models for multiagent systems. ACM Comput. Surv. (CSUR) 48(2), 27 (2015)
Jamont, J., Occello, M.: Meeting the challenges of decentralised embedded applications using multi-agent systems. IJAOSE 5(1), 22–68 (2015). https://doi.org/10.1504/IJAOSE.2015.078435
Jamont, J.-P., Occello, M., Mendes, E.: Decentralized intelligent real world embedded systems: a tool to tune design and deployment. In: Demazeau, Y., Ishida, T., Corchado, J.M., Bajo, J. (eds.) PAAMS 2013. LNCS (LNAI), vol. 7879, pp. 133–144. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38073-0_12
Jennings, N.R., Sycara, K., Wooldridge, M.: A roadmap of agent research and development. Auton. Agent. Multi-Agent Syst. 1(1), 7–38 (1998)
Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: best practices. Comput. Commun. 33(9), 1086–1093 (2010)
Maarouf, I., Baroudi, U., Naseer, A.R.: Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks. IET Commun. 3(5), 846–858 (2009)
Mendoza, C.V.L., Kleinschmidt, J.H.: A distributed trust management mechanism for the internet of things using a multi-service approach. Wireless Pers. Commun. 103(3), 2501–2513 (2018)
Ozdemir, S.: Functional reputation based reliable data aggregation and transmission for wireless sensor networks. Comput. Commun. 31(17), 3941–3953 (2008)
Pinyol, I., Sabater-Mir, J.: Computational trust and reputation models for open multi-agent systems: a review. Artif. Intell. Rev. 40(1), 1–25 (2013)
Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. Knowl. Eng. Rev. 19(1), 1–25 (2004)
Rezgui, A., Eltoweissy, M.: \(\mu \)RACER: a reliable adaptive service-driven efficient routing protocol suite for sensor-actuator networks. IEEE Trans. Parallel Distrib. Syst. 20(5), 607–622 (2009)
Ries, S.: Engineering trust in ubiquitous computing. In: Proceedings of Workshop on Software Engineering Challenges for Ubiquitous Computing, Lancaster, UK (2006)
Ries, S., Kangasharju, J., Mühlhäuser, M.: A classification of trust systems. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006. LNCS, vol. 4277, pp. 894–903. Springer, Heidelberg (2006). https://doi.org/10.1007/11915034_114
Robbins, H.: Some aspects of the sequential design of experiments. Bull. Am. Math. Soc. 58(5), 527–535 (1952)
da Rocha Costa, A.C., Hübner, J.F., Bordini, R.H.: On entering an open society. In: XI Brazilian Symposium on Artificial Intelligence, vol. 535, p. 546. Citeseer (1994)
Ruan, Y., Durresi, A.: A survey of trust management systems for online social communities-trust modeling, trust inference and attacks. Knowl.-Based Syst. 106, 150–163 (2016)
Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artif. Intell. Rev. 24(1), 33–60 (2005)
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76, 146–164 (2015)
Tran-Thanh, L., Chapman, A., de Cote, E.M., Rogers, A., Jennings, N.R.: Epsilon-first policies for budget-limited multi-armed bandits. In: Twenty-Fourth AAAI Conference on Artificial Intelligence (2010)
Vercouter, L., Jamont, J.P.: Lightweight trusted routing for wireless sensor networks. In: Demazeau, Y., Pěchoucěk, M., Corchado, J.M., Pérez, J.B. (eds.) Advances on Practical Applications of Agents and Multiagent Systems. AINSC, vol. 88, pp. 87–96. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-19875-5_11
Vercouter, L., Jamont, J.: Lightweight trusted routing for wireless sensor networks. Prog. AI 1(2), 193–202 (2012). https://doi.org/10.1007/s13748-012-0017-7
Xia, Y., et al.: Finite budget analysis of multi-armed bandit problems. Neurocomputing 258, 13–29 (2017)
Yu, H., Shen, Z., Leung, C., Miao, C., Lesser, V.R.: A survey of multi-agent trust management systems. IEEE Access 1, 35–50 (2013)
Yu, Y., Li, K., Zhou, W., Li, P.: Trust mechanisms in wireless sensor networks: attack analysis and countermeasures. J. Netw. Comput. Appl. 35(3), 867–880 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Darroux, A., Jamont, JP., Aktouf, OEK., Mercier, A. (2019). An Energy Aware Approach to Trust Management Systems for Embedded Multi-Agent Systems. In: Calinescu, R., Di Giandomenico, F. (eds) Software Engineering for Resilient Systems. SERENE 2019. Lecture Notes in Computer Science(), vol 11732. Springer, Cham. https://doi.org/10.1007/978-3-030-30856-8_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-30856-8_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-30855-1
Online ISBN: 978-3-030-30856-8
eBook Packages: Computer ScienceComputer Science (R0)