Trust Dynamics: A Data-Driven Simulation Approach

  • Olufunmilola Onolaja
  • Rami Bahsoon
  • Georgios Theodoropoulos
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 358)


Reputation and trust-based models have gained popularity recently because they have been shown to be promising in the area of trust management. Despite this fact, building reliable systems still remains a challenge. Proposed models focus on historical and online information to determine the reputation of domain members. However, the dynamic nature of reputation and trust requires an equally dynamic approach to computing and resolving trust related issues in any domain. This paper proposes a reliable and novel dynamic framework that utilises a data-driven approach for trust management. The framework uses past interactions, recent and anticipated future trust values of every identity in the domain. The proposed framework is critically evaluated and compared with existing work through experiments. The advantage of this proactive framework compared to other approaches is that informed decisions about the domain can be made before misbehaviour occurs.


trust dynamics trust management reputation 


  1. 1.
    Balakrishnan, V., Varadharajan, V., Lucs, P., Tupakula, U.: Trust enhanced secure mobile ad-hoc network routing. In: Advanced Information Networking and Applications Workshops AINAW, vol. 1, pp. 27–33 (2007)Google Scholar
  2. 2.
    Buchegger, S., Le Boudec, J.: Self-policing mobile ad hoc networks by reputation systems. IEEE Communications Magazine 43(7), 101–107 (2005)CrossRefGoogle Scholar
  3. 3.
    Buchegger, S., Le Boudec, J.: Performance analysis of the CONFIDANT protocol (Cooperation of nodes: Fairness In Dynamic Ad-hoc Networks). In: Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc. pp. 226–236 (2002)Google Scholar
  4. 4.
    Chen, H., Wu, H., Hu, J., Gao, C.: Event-based trust framework model in wireless sensor networks. In: Proceedings of the International Conference on Networking, Architecture, and Storage, NAS, pp. 359–364. IEEE Computer Society, Los Alamitos (2008)CrossRefGoogle Scholar
  5. 5.
    Gambetta, D.: Can we trust? trust: making and breaking cooperative relations edn. Basil Blackwell, New York (1988)Google Scholar
  6. 6.
    Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks 4(3), 15:1–15:37 (2008)CrossRefGoogle Scholar
  7. 7.
    He, Q., Wu, D., Khosla, P.: SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In: Proceedings of WCNC Wireless Communications and Networking Conference, vol. 2, pp. 825–830. IEEE, Los Alamitos (2004)Google Scholar
  8. 8.
    Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 42(1), 1–31 (2009)CrossRefGoogle Scholar
  9. 9.
    Hu, J., Burmester, M.: Lars - a locally aware reputation system for mobile ad hoc networks. In: Proceedings of the ACM SE Regional Conference, vol. 2006, pp. 119–123 (2006)Google Scholar
  10. 10.
    Kamvar, S., Schlosser, M., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the 12th international conference on World Wide Web WWW, pp. 640–651. ACM, New York (2003)Google Scholar
  11. 11.
    Kennedy, C., Theodoropoulos, G.: Intelligent management of data driven simulations to support model building in the social sciences. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006. LNCS, vol. 3993, pp. 562–569. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  12. 12.
    Kennedy, C., Theodoropoulos, G., Sorge, V., Ferrari, E., Lee, P., Skelcher, C.: AIMSS: An architecture for data driven simulations in the social sciences. In: Shi, Y., van Albada, G.D., Dongarra, J., Sloot, P.M.A. (eds.) ICCS 2007. LNCS, vol. 4487, pp. 1098–1105. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Kollock, P.: The production of trust in online markets. Advances in Group Processes 16 (1999)Google Scholar
  14. 14.
    Lian, Q., Zhang, Z., Yang, M., Zhao, B.Y., Dai, Y., Li, X.: An empirical study of collusion behavior in the maze p2p file-sharing system. In: Proceedings of the 27th IEEE International Conference on Distributed Computing Systems, vol. 56 (2007)Google Scholar
  15. 15.
    Madey, G., Szabo, G., Barabasi, A.: WIPER: The integrated wireless phone based emergency response system. In: Alexandrov, V.N., van Albada, G.D., Sloot, P.M.A., Dongarra, J. (eds.) ICCS 2006, Part III. LNCS, vol. 3993, pp. 417–424. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. 16.
    Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pp. 255–265 (2000)Google Scholar
  17. 17.
    Michiardi, P., Molva, R.: CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, vol. 100, pp. 107–121 (2002)Google Scholar
  18. 18.
    Onolaja, O., Bahsoon, R., Theodoropoulos, G.: An architecture for dynamic trust monitoring in mobile networks. In: Meersman, R., Herrero, P., Dillon, T. (eds.) OTM 2009 Workshops. LNCS, vol. 5872, pp. 494–503. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  19. 19.
    Onolaja, O., Bahsoon, R., Theodoropoulos, G.: Conceptual framework for dynamic trust monitoring and prediction. Procedia Computer Science 1(1), 1241–1250 (2010); ICCS 2010Google Scholar
  20. 20.
    Srinivasan, A., Teitelbaum, J., Liang, H., Wu, J., Cardei, M.: Reputation and Trust-based Systems for Ad Hoc and Sensor Networks. In: Algorithms and Protocols for Wireless Ad Hoc Networks. Wiley & Sons, Chichester (2008)Google Scholar

Copyright information

© International Federation for Information Processing 2011

Authors and Affiliations

  • Olufunmilola Onolaja
    • 1
  • Rami Bahsoon
    • 1
  • Georgios Theodoropoulos
    • 1
  1. 1.The School of Computer ScienceUniversity of BirminghamUK

Personalised recommendations