skip to main content
10.1145/1052220.1052253acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicecConference Proceedingsconference-collections
Article

Simulating the establishment of trust infrastructures in multi-agent systems

Published: 25 March 2004 Publication History

Abstract

In this paper we present and simulate a new approach for creating trusted infrastructures within multi agent systems. This bootstrapping protocol initializes a disordered space by turning it into an organized, redundant hierarchical structure, headed by elected security distribution centers with a pool of successors in case of a failure. A simulation was creates of the establishment of this hierarchy to judge both the resulting structure and the process of creation in a varying environment. Networks are tested of different scale, type and topology, with different numbers of malicious agents, intent on disrupting the bootstrapping process.

References

[1]
M. Blaze, J. Feigenbaum, J. Ioannidis and A. D. Keromytis, The Role of Trust Management in Distributed Systems Security, Secure Internet Programming, J. Vitek, C. Jensen, ed., Springer-Verlag, 1999, 185--210.]]
[2]
K. Birman, The Process Group Approach to Reliable Distributed Computing, In Comm of ACM, 36(12), 1993, 37--53]]
[3]
S. Capkun, L. Buttyán, and J.-P. Hubaux, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, IEEE Transactions on Mobile Computing, Vol. 2(1), 2003.]]
[4]
R. Cramer, R. Gennaro, B. Schoenmakers, A Secure and Optimally Efficient Multi-Authority Election Scheme, Advances in Cryptology-EUROCRYPT, Springer-Verlag, LNC1233, 1997, 103--118.]]
[5]
R. Cramer, M. Franklin, B. Schoenmakers, Multi Authority Secret Ballot Elections with Linear Work, Advances in Cryptology-EUROCRYPT, Springer-Verlag, 1996, 72--83]]
[6]
S. Daskapan, Dependable security by twisted secret sharing, 19th IFIP Information Security Conference, Toulouse, 2004.]]
[7]
S. Daskapan, A. Verbraeck, and W. G. Vree, The merge of computing paradigms, 5th International Conf. on computer and information technology, Dhaka, 2002, 553--558.]]
[8]
S. Daskapan, W. G. Vree, Self-Organizing Trust Principle for Survivable Systems, In Proc. of the IASTED Int. Conf. on Artificial and Computational Intelligence, Japan, 2002, 7--12.]]
[9]
S. Daskapan, W. G. Vree, and H. G. Sol. Building a Distributed Security Defence System. In Proc of the IEEE Int Conf. on Systems, Man & Cybernetics, Delft, 2004]]
[10]
R. Ellison, D. Fisher, R. Linger, H. Lipson, T. Longstaff and N. Mead, Survivable network systems: An emerging discipline, Technical Report CMU/SEI-97-153, Software Engineering Institute, CMU, Pittsburgh, PA, 1997.]]
[11]
E. Gamma, R. Helm, R. Johnson, J. Vlissides, Design Patterns, Addison-Wesley, 1994, 305--315.]]
[12]
L. Gong, Enclaves: Enabling Secure Collaboration Over the Internet, In Proceedings of the Sixth USENIX Security Symposium, Usenix Association, 1996, 149--159]]
[13]
M. Reiter, Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart, In Proceedings of 2nd ACM Conf. on Comp. and Comm. Security, ACM, 1994, 68--80.]]
[14]
R. Van Renesse, K. Birman, S. Maffeis, Horus: A Flexible Group Communication system, In Communications of the ACM, 39(4), 1996, 76--83.]]
[15]
S. Schneider, Modeling Security Properties with CSP, Royal Hallway Technical Report/CSD-TR-96-02, Egham, 1996.]]
[16]
J. G. Steiner, B. C. Neuman and J. I. Schiller, Kerberos: An Authentication Service for Open Network Systems, In Usenix Conf. Proceedings, (Dallas, U.S.A, Feb, 1988), 191--202.]]
[17]
L. Zhou and Z. J. Haas, Securing Ad Hoc Networks, IEEE Network Magazine, Vol. 13(6), 1999, 24--30.]]
[18]
R. Zimmermann, The Official PGP User's Guide, MIT Press, Cambridge, 1995.]]
[19]
http://www.isi.edu/nsnam/ns/]]

Cited By

View all
  • (2009)Evaluation of trust in an eCommerce multi-agent system using fuzzy reasoningProceedings of the 18th international conference on Fuzzy Systems10.5555/1717561.1717693(757-763)Online publication date: 20-Aug-2009
  • (2009)Evaluation of trust in an ecommerce multi-agent system using fuzzy reasoning2009 IEEE International Conference on Fuzzy Systems10.1109/FUZZY.2009.5277344(757-763)Online publication date: Aug-2009

Index Terms

  1. Simulating the establishment of trust infrastructures in multi-agent systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICEC '04: Proceedings of the 6th international conference on Electronic commerce
    March 2004
    684 pages
    ISBN:1581139306
    DOI:10.1145/1052220
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    • ICEC: International Center for Electronic Commerce

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 25 March 2004

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. secure autonomous voting
    2. security
    3. self-organization
    4. trust management

    Qualifiers

    • Article

    Acceptance Rates

    Overall Acceptance Rate 150 of 244 submissions, 61%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2009)Evaluation of trust in an eCommerce multi-agent system using fuzzy reasoningProceedings of the 18th international conference on Fuzzy Systems10.5555/1717561.1717693(757-763)Online publication date: 20-Aug-2009
    • (2009)Evaluation of trust in an ecommerce multi-agent system using fuzzy reasoning2009 IEEE International Conference on Fuzzy Systems10.1109/FUZZY.2009.5277344(757-763)Online publication date: Aug-2009

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media