B-Trust: Bayesian Trust Framework for Pervasive Computing

  • Daniele Quercia
  • Stephen Hailes
  • Licia Capra
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3986)


Without trust, pervasive devices cannot collaborate effectively, and without collaboration, the pervasive computing vision cannot be made a reality. Distributed trust frameworks may support trust and thus foster collaboration in an hostile pervasive computing environment. Existing frameworks deal with foundational properties of computational trust. We here propose a distributed trust framework that satisfies a broader range of properties. Our framework: (i) evolves trust based on a Bayesian formalization, whose trust metric is expressive, yet tractable; (ii) is lightweight; (iii) protects user anonymity, whilst being resistant to “Sybil attacks” (and enhancing detection of two collusion attacks); (iv) integrates a risk-aware decision module. We evaluate the framework through four experiments.


Direct Experience Decision Module Pervasive Computing Trust Level Trust Formation 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Abdul-Rahman, A., Hailes, S.: Using Recommendations for Managing Trust in Distributed Systems. In: Proceedings of IEEE Malaysia International Conference on Communication, Kuala Lumpur, Malaysia (November 1997)Google Scholar
  2. 2.
    Aczel, A.D.: Chance. High Stakes, London (2005)Google Scholar
  3. 3.
    Arai, M., Chiba, A., Iwasaki, K.: Measurement and modeling of burst packet losses in Internetend-to-end communications. In: Proceedings of the IEEE International Symposium on Dependable Computing, Hong Kong, pp. 260–267 (1999)Google Scholar
  4. 4.
    Buchegger, Boudec, J.-Y.L.: A robust reputation system for p2p and mobile ad-hoc networks. In: Proceedings of the 2nd Workshop on the Economics of Peer-to-Peer Systems, Cambridge, MA, USA (June 2004)Google Scholar
  5. 5.
    Carbone, M., Nielsen, M., Sassone, V.: A Formal Model for Trust in Dynamic Networks. In: Proceedings of the 1st IEEE International Conference on Software Engineering and Formal Methods, Brisbane, Australia, pp. 54–63 (September 2003)Google Scholar
  6. 6.
    Dimmock, N.: How much is ‘enough’? Risk in Trust-based Access Control. In: Proceedings of the 12th IEEE International Workshop on Enabling Technologies, Washington, DC, USA, p. 281 (June 2003)Google Scholar
  7. 7.
    Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  8. 8.
    Gambetta, D.: Can we trust trust? In: Gambetta, D. (ed.) Trust, Making and Breaking Cooperative Relations, pp. 213–237. Basil Blackwell, Oxford (1998)Google Scholar
  9. 9.
    Liu, J., Issarny, V.: Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 48–62. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  10. 10.
    Mui, L., Mohtsahemi, M., Ang, C., Szolovits, P., Halberstadt, A.: Ratings in Distributed Systems: A Bayesian Approach. In: Proceedings of the 11th Workshop on Information Technologies and Systems, New Orleans, Louisiana, USA (December 2001)Google Scholar
  11. 11.
    Quercia, D., Hailes, S.: MATE: Mobility and Adaptation with Trust and Expected-utility. The International Journal of Internet Technology and Secured Transactions (to appear)Google Scholar
  12. 12.
    Quercia, D., Hailes, S.: Risk Aware Decision Framework for Trusted Mobile Interactions. In: Proceedings of the 1st IEEE/CreateNet International Workshop on The Value of Security through Collaboration, Athens, Greece (September 2005)Google Scholar
  13. 13.
    Quercia, D., Lad, M., Hailes, S., Capra, L., Bhatti, S.: STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions. In: Proceedings of the 21st ACM Symposium on Applied Computing, Dijon, France (April 2006)Google Scholar
  14. 14.
    Quercia, D., Capra, L., Hailes, S.: TATA: Towards Anonymous Trusted Authentication. In: Proceedings of the 4th International Conference on Trust Management, Pisa, Italy. LNCS, Springer, Heidelberg (2006)Google Scholar
  15. 15.
    Ross, S.: A first course in probability. Macmillan College Pub. Co., Basingstoke (1994)MATHGoogle Scholar
  16. 16.
    Seigneur, J.-M., Jensen, C.D.: Trading Privacy for Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 93–107. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  17. 17.
    Suryanarayana, G., Taylo, R.N.: A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications. ISR Technical Report number UCI-ISR-04-6, University of California (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Daniele Quercia
    • 1
  • Stephen Hailes
    • 1
  • Licia Capra
    • 1
  1. 1.Department of Computer ScienceUniversity College LondonLondonUK

Personalised recommendations