Trust and Reputation for Information Exchange in Critical Infrastructures

  • Filipe Caldeira
  • Edmundo Monteiro
  • Paulo Simões
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6712)


Today’s Critical Infrastructures (CI) are highly interdependent in order to deliver their services with the required level of quality and availability. Information exchange among interdependent CI plays a major role in CI protection and risk prevention for interconnected CI were cascading effects might occur because of their interdependencies. This paper addresses the problem of the quality of information exchanged among interconnected CI and also the quality of the relationship in terms of trust and security. The use of trust and reputation indicators associated with the information exchange is the proposed solution.

The proposed solution is being applied to information exchange among interconnected CI in scope of the European FP7 MICIE project, in order to improve information accuracy and to protect each CI from using inconsistent and non trustable information about critical events.


Critical Infrastructures ICT security Trust and Reputation Management 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Clinton, W.J.: Presidential decision directive 63 (May 1998)Google Scholar
  2. 2.
    Micie: Micie - tool for systemic risk analysis and secure mediation of data ex-changed across linked ci information infrastructures. FP7-ICT-SEC-2007.1.7 – 225353 – Annex I – “Descrition of Work” (2008)Google Scholar
  3. 3.
    Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semantics: Science (January 2007)Google Scholar
  4. 4.
    Mui, L., Mohtashemi, M.: A computational model of trust and reputation. In: 35th Hawaii International Conference on System Science, HICSS (2002)Google Scholar
  5. 5.
    Chen, J., Lu, H., Bruda, S.: Analysis of feedbacks and ratings on trust merit for peer-to-peer systems. In: International Conference on E-Business and Information System Security, EBISS 2009, pp. 1–5 (2009)Google Scholar
  6. 6.
    Chen, S., Zhang, Y., Yang, G.: Trust and reputation algorithms for unstructured p2p networks. In: International Symposium on Computer Network and Multimedia Technology, CNMT 2009, pp. 1–4 (2009)Google Scholar
  7. 7.
    Spitz, S., Tuchelmann, Y.: A trust model considering the aspects of time. In: Computer and Electrical Engineering, ICCEE 2009, vol. 1, pp. 550–554 (2009)Google Scholar
  8. 8.
    Ganeriwal, S., Balzano, L., Srivastava, M.: Reputation-based framework for high integrity sensor networks. Transactions on Sensor Networks, TOSN (2008)Google Scholar
  9. 9.
    Momani, M., Challa, S., Alhmouz, R.: Bnwsn: Bayesian network trust model for wireless sensor networks. In: Mosharaka International Conference on Communications, Computers and Applications, MIC-CCA 2008, pp. 110–115 (2008)Google Scholar
  10. 10.
    Zahariadis, T., Ladis, E., Leligou, H., Trakadas, P., Tselikis, C., Papadopoulos, K.: Trust models for sensor networks. In: 50th International Symposium on ELMAR 2008, vol. 2, pp. 511–514 (September 2008)Google Scholar
  11. 11.
    Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)CrossRefGoogle Scholar
  12. 12.
    Malik, Z., Bouguettaya, A.: Reputation bootstrapping for trust establishment among web services. IEEE Internet Computing 13(1), 40–47 (2009)CrossRefGoogle Scholar
  13. 13.
    Ray, I., Ray, I., Chakraborty, S.: An interoperable context sensitive model of trust. Journal of Intelligent Information Systems (January 2009)Google Scholar
  14. 14.
    Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review (January 2005)Google Scholar
  15. 15.
    Hussain, F., Chang, E., Hussain, O.: State of the art review of the existing bayesian-network based approaches to trust and reputation computation. In: Internet Monitoring and Protection, ICIMP 2007, p. 26 (2007)Google Scholar
  16. 16.
    Huynh, T., Jennings, N., Shadbolt, N.: An integrated trust and reputation model for open multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems 13(2), 119–154 (2006)CrossRefGoogle Scholar
  17. 17.
    Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference (January 2002)Google Scholar
  18. 18.
    Teacy, W., Patel, J., Jennings, N., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems 12(2), 183–198 (2006)CrossRefGoogle Scholar
  19. 19.
    Aime, M., Lioy, A.: Incremental trust: building trust from past experience. In: World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 603–608 (2005)Google Scholar
  20. 20.
    Ludwig, S., Pulimi, V., Hnativ, A.: Fuzzy approach for the evaluation of trust and reputation of services. In: IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2009, pp. 115–120 (August 2009)Google Scholar
  21. 21.
    Crutial: Crutial project web site (2008),
  22. 22.
    IRRIS: Irriis project web site (2008),
  23. 23.
    Capodieci, P., et al.: Improving resilience of interdependent critical infrastructures via an on-line alerting system. In: COMPENG 2010 (2010)Google Scholar
  24. 24.
    Caldeira, F., et al.: Secure mediation gateway architecture enabling the communication among critical infrastructures. In: Future Network and MobileSummit 2010 Conference (2010)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Filipe Caldeira
    • 1
    • 2
  • Edmundo Monteiro
    • 1
  • Paulo Simões
    • 1
  1. 1.CISUC - DEIUniversity of CoimbraCoimbraPortugal
  2. 2.Polytechnic Institute of ViseuViseuPortugal

Personalised recommendations