Skip to main content

Trust Propagation in Small Worlds

  • Conference paper
  • First Online:
Trust Management (iTrust 2003)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2692))

Included in the following conference series:

Abstract

The possibility of a massive, networked infrastructure of diverse entities partaking in collaborative applications with each other increases more and more with the proliferation of mobile devices and the development of ad hoc networking technologies. In this context, traditional security measures do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can be propagated through relatively short paths connecting entities. Our work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling, Department of Computer Science and Mathematics (1994)

    Google Scholar 

  2. McKnight, D., Chervany, N.: The Meanings of Trust. MISRC 96-04, University of Minnesota, Management Informations Systems Research Center, University of Minnesota (1996)

    Google Scholar 

  3. Gray, E., O’Connell, P., Jensen, C., Weber, S., Seigneur, J.M., Yong, C.: Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications. Technical Report 66, Department of Computer Science, Trinity College Dublin (2002)

    Google Scholar 

  4. Matthews, R.: Six Degrees of Separation. World Link (2000)

    Google Scholar 

  5. Milgram, S.: The Small World Problem. Psychology Today 61 (1967)

    Google Scholar 

  6. Travers, J., Milgram, S.: An Experimental Study of the Small World Problem. Sociometry 32 (1969) 425–443

    Article  Google Scholar 

  7. Watts, D., Strogatz, S.: Collective Dynamics of’ small-World’ Networks. Nature 393 (1998) 440–442

    Article  Google Scholar 

  8. Watts, D.: Small Worlds, The Dynamics of Networks Between Order and Randomness. Princeton University Press (1999)

    Google Scholar 

  9. Watts, D., Strogatz, S.: Kevin Bacon, the Small-World, and Why It All Matters. http://www.santafe.edu/sfi/publications/Bulletins/bulletinFall99/workInProgress/smallWorld.html (1999)

  10. Reynolds, P.: Oracle of Bacon. (http://www.cs.virginia.edu/oracle/)

  11. Adamic, L.: The Small World Web. In Abiteboul, S., Vercoustre, A.M., eds.: Proc. 3rd European Conf. Research and Advanced Technology for Digital Libraries, ECDL. Number 1696, Springer-Verlag (1999) 443–452

    Google Scholar 

  12. Kleinberg, J.: The Small-World Phenomenon: An Algorithmic Perspective. In: Proc. of the 32nd ACM Symposium on Theory of Computing. (2000)

    Google Scholar 

  13. Watts, D., Dodds, P., Newman, M.: Identity and Search in Social Networks. Science 296 (2002) 1302–1305

    Article  Google Scholar 

  14. Hubaux, J.P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proc. of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). (2001)

    Google Scholar 

  15. Capkun, S., Buttyan, L., Hubaux, J.P.: Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph. In: New Security Paradigms Workshop, Norfolk, VA (2002)

    Google Scholar 

  16. Stajano, F.: Security for Ubiquitous Computing. Wiley (2002)

    Google Scholar 

  17. Seigneur, J.M., Farrell, S., Jensen, C.D.: Secure Ubiquitous Computing Based on Entity Recognition. In: Ubicomp’02 Security Workshop, Gothenburg (2002)

    Google Scholar 

  18. Seigneur, J.M., Farrell, S., Jensen, C.D., Gray, E., Yong, C.: End-to-end trust in pervasive computing starts with recognition. In: Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany (2003 [to appear])

    Google Scholar 

  19. ITU: Information Technology — Opens Systems Interconnection — The Directory: Authentication Framework. Number X.509 in ITU-T Recomandation. International Telecomunication Union (1993)

    Google Scholar 

  20. Kohl, J., Neuman, B.: The Kerberos Network Authentication Service (Version 5). RFC 1510, IETF (1993)

    Google Scholar 

  21. IMDB: Internet Movie Database. (http://www.imdb.com)

  22. Venkatraman, M., Yu, B., Singh, M.: Trust and Reputation Management in a Small-World Network. Technical report (2002)

    Google Scholar 

  23. Matsuo, Y.: Clustering Using Small World Structure. In: Knowledge-Based Intelligent Information and Engineering Systems, Crema, Italy (2002)

    Google Scholar 

  24. Newman, M.: Clustering and Preferential Attachment in Growing Networks. Phys. Rev. E 64 (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gray, E., Seigneur, JM., Chen, Y., Jensen, C. (2003). Trust Propagation in Small Worlds. In: Nixon, P., Terzis, S. (eds) Trust Management. iTrust 2003. Lecture Notes in Computer Science, vol 2692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44875-6_17

Download citation

  • DOI: https://doi.org/10.1007/3-540-44875-6_17

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-40224-4

  • Online ISBN: 978-3-540-44875-4

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics