TrustSets: using trust to detect deceitful agents in a distributed information collecting system

  • Quang-Anh Nguyen Vu
  • Richard Canal
  • Benoit Gaudou
  • Salima Hassas
  • Frédéric Armetta
Original Research


This paper addresses the issue of maintaining information coherence and its robustness in a multi-agent system, that collectively gathers information from distributed sources and where some sources may be defective (deliberately or not). In this context, the collective information gathered by the system is a progressive (non linear) aggregation of information collected individually by each agent. Therefore, each agent has direct information (collected by itself) and indirect information (obtained through communication with other agents). System coherence is defined by compatibility of collected information about the explored environment with actual information of the environment. System resilience is defined by the capability to maintain information coherence, despite the existence and increase of faulty agents within the system. In this context, we propose a new trust-based mechanism to detect defective agents and limit the dissemination of deceitful information in the system, thus reducing its impact on the process of collective information gathering.


Multi-agents system Self-organizing Trust Coherence Robustness Resilience TrustNet Mapping 


  1. Amouroux E, Quang C, Boucher A, Drogoul A (2007) GAMA: an environment for implementing and running spatially explicit multi-agent simulations. In: 10th Pacific Rim international workshop on multi-agents (PRIMA), ThailandGoogle Scholar
  2. Buchegger S, Le Boudec J (2003) The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt’03: modeling and optimization in mobile, ad hoc and wireless networksGoogle Scholar
  3. Falcone R, Castelfranchi C (1998) Social trust: cognitive anatomy, social importance, quantification and dynamics. In: Autonomous Agents ’98 workshop on “Deception, Fraud and Trust in Agent Societies”, Minneapolis, USA, pp 35–49Google Scholar
  4. Huynh TD, Jennings NR, Shadbolt NR (2006) An integrated trust and reputation model for open multi-agent systems. J Auton Agents Multi-Agent Syst 13:119–154CrossRefGoogle Scholar
  5. Jiang T, Baras JS (2006) Trust evaluation in anarchy: a case study on autonomous networks. In: 25th IEEE international conference on computer communications (INFOCOM)Google Scholar
  6. Jiang YC, Xia ZY, Zhong YP, Zhang SY (2005) Autonomous trust construction in multi-agent systems: a graph theory methodology. Adv Eng Softw 36(2):59–66CrossRefGoogle Scholar
  7. Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: WWW ’03: Proceedings of the 12th international conference on World Wide Web. ACM, New York, pp 640–651Google Scholar
  8. Kim TK, Seo HS (2008) A trust model using fuzzy logic in wireless sensor network. In: Proceedings of world academy of science, engineering and technology, vol 32Google Scholar
  9. Leonard J, Durrant-Whyte H (1991) Simultaneous map building and localisation for an autonomous mobile robot. In: Proceedings of IEEE international workshop on intelligent robots and systems (IROS), Osaka, pp 1442–1447Google Scholar
  10. Marsh S (1994) Formalising trust as a computational concept. PhD thesis, University of SterlingGoogle Scholar
  11. Marti S, Garcia-Molina H (2004) Limited reputation sharing in p2p systems. In: EC’04: Proceedings of the 5th ACM conference on electronic commerce, ACM, New York, pp 91–101Google Scholar
  12. Mui L, Mohtashemi M, Halberstadt A (2002) Notions of reputation in multi-agent systems: a review. In: Proceedings of AAMAS’02. ACM, Bologna, pp 280–287Google Scholar
  13. Nguyen Vu QA, Gaudou B, Canal R, Hassas S (2009) Coherence and robustness in a disturbed MAS. In: 2009 IEEE-RIVF international conference on computing and communication technologies. IEEE, pp 1–4Google Scholar
  14. Nguyen Vu QA, Gaudou B, Canal R, Armetta F, Hassas S (2010) TrustSets: using trust to detect deceitful agents in a distributed information collecting system. In: RIVF 2010: IEEE RIVF international conference on computing and communication technologies, research, innovation, and vision for the future, Hanoi, VietnamGoogle Scholar
  15. Sabater-Mir J (2002) Trust and reputation for agent societies. PhD thesis, Universitat Autonoma de BarcelonaGoogle Scholar
  16. Schillo M, Funk P, Rovatsos M (1999) Who can you trust: dealing with deception. In: Proceedings of Autonomous Agents ’99 workshop on “Deception, Fraud, and Trust in Agent Societies”, Seattle, USA, pp 81–94Google Scholar
  17. Schillo M, Funk P, Rovatsos M (2000) Using trust for detecting deceitful agents in artificial societies. Appl Artif Intell (Special Issue on Trust, Deception and Fraud in Agent Societies) 14(8):825–848Google Scholar
  18. Xiong L, Liu L (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16:843–857CrossRefGoogle Scholar
  19. Yu B, Singh MP (2000) A social mechanism of reputation management in electronic communities. In: Proceedings of CIA ’00. Springer, Berlin, pp 154–165Google Scholar
  20. Zacharia G, Maes P (2000) Trust management through reputation mechanisms. Appl Artif Intell 14:881–907CrossRefGoogle Scholar
  21. Zia TA (2008) Reputation-based trust management in wireless sensor networks. In: 2008 International conference on intelligent sensors, sensor networks and information processing. IEEE, pp 163–166Google Scholar

Copyright information

© Springer-Verlag 2012

Authors and Affiliations

  • Quang-Anh Nguyen Vu
    • 1
  • Richard Canal
    • 3
  • Benoit Gaudou
    • 2
  • Salima Hassas
    • 1
  • Frédéric Armetta
    • 1
  1. 1.Laboratoire GAMAUniversité Claude Bernard Lyon 1LyonFrance
  2. 2.Institut de Recherche en Informatique de Toulouse (UMR CNRS 5505), Université de ToulouseToulouseFrance
  3. 3.IFI, Equipe MSI; IRD, UMI 209 UMMISCO, Institut de la Francophonie pour l’InformatiqueVietnam National UniversityHanoiVietnam

Personalised recommendations