Abstract
This paper presents a framework for trust evaluation through monitoring, in particular, to address the question of how to derive trust from observations of certain properties. We propose a trust model based on subjective logic to represent trust through the notion of an opinion and to include aspects of uncertainty in a systematic fashion. Moreover, we analyze requirements for opinion generators and introduce novel parameterized generators that capture the requirements for opinion generators much better than current generators do. In addition, we show how a decision can be made based on trust monitoring within a certain context. The proposed trust evaluation framework is demonstrated with a case study of a Body Area Sensor Network. The results and examples show that the opinion generators can effectively work with various types of properties, including dependability, security and functionality related properties.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Aivaloglou, E., Gritzalis, S.: Hybrid trust and reputation management for sensor networks. Wireless Networks 16(5), 1493–1510 (2010)
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164–173 (May 1996)
Bui, V., Verhoeven, R., Lukkien, J., Kocielnik, R.: A trust evaluation framework for sensor readings in body area sensor networks. In: ICST International Conference on Body Area Networks, Boston, Massachusetts, USA (September 2013)
Bui, V.T., Lukkien, J.J., Verhoeven, R.: Toward a trust management model for a configurable body sensor platform. In: Proceedings of the 6th International Conference on Body Area Networks (BodyNets 2011), pp. 23–26 (2011)
Dey, A.K.: Understanding and using context. Personal Ubiquitous Computing 5(1), 4–7 (2001)
Ding, S., Ma, X.J., Yang, S.L.: A software trustworthiness evaluation model using objective weight based evidential reasoning approach. Knowledge and Information Systems, 1–19 (2011)
Hasan, Z., Krischkowsky, A., Tscheligi, M.: Modelling user-centered-trust (UCT) in software systems: Interplay of trust, affect and acceptance model. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 92–109. Springer, Heidelberg (2012)
He, D., Chen, C., Chan, S., Bu, J., Vasilakos, A.V.: Retrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. on Information Technology in Biomedicine 16(4), 623–632 (2012)
Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: assigning roles to strangers. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 2–14 (2000)
Jøsang, A.: A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)
Jøsang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Proceedings of the 29th Australasian Computer Science Conference, ACSC 2006, Australia, pp. 85–94 (2006)
Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International Conference on World Wide Web, pp. 640–651. ACM, NY (2003)
Manchala, D.: Trust metrics, models and protocols for electronic commerce transactions. In: Proceedings of the 18th International Conference on Distributed Computing Systems, pp. 312–321 (May 1998)
Sun, Y., Han, Z., Yu, W., Liu, K.: A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM), pp. 1–13 (2006)
Trust4All: Trust4All project (2007), http://www.win.tue.nl/trust4all/summary.html
Xiong, L., Liu, L.: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16(7), 843–857 (2004)
Yan, Z., Prehofer, C.: Autonomic trust management for a component-based software system. IEEE Trans. Dependable Secur. Comput. 8(6), 810–823 (2011)
Zhang, J., Shankaran, R., Orgun, M., Varadharajan, V., Sattar, A.: A dynamic trust establishment and management framework for wireless sensor networks. In: Proceedings of the 8th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC), pp. 484–491 (December 2010)
Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: A quantitative trust establishment framework for reliable data packet delivery in manets. In: Proceedings of the 3rd ACM Workshop on Security of Ad hoc and Sensor Networks, SASN 2005, pp. 1–10. ACM, NY (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Bui, V., Verhoeven, R., Lukkien, J. (2014). Evaluating Trustworthiness through Monitoring: The Foot, the Horse and the Elephant. In: Holz, T., Ioannidis, S. (eds) Trust and Trustworthy Computing. Trust 2014. Lecture Notes in Computer Science, vol 8564. Springer, Cham. https://doi.org/10.1007/978-3-319-08593-7_13
Download citation
DOI: https://doi.org/10.1007/978-3-319-08593-7_13
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-08592-0
Online ISBN: 978-3-319-08593-7
eBook Packages: Computer ScienceComputer Science (R0)