Skip to main content

Modeling Trust and Reputation in Multiagent Systems

  • Living reference work entry
  • First Online:
Handbook of Model-Based Systems Engineering
  • 155 Accesses

Abstract

Understanding agent trustworthiness in a multiagent system is a prerequisite for evaluating network state and determining when corrective actions are needed. Untrustworthy agents may disrupt network operation by sending erroneous data or initiating malicious or inadvertently dangerous transactions. This chapter defines key parameters of trust and reputation and surveys the state-of-practice in trust ontology, modeling, and evaluation. Agent health is a key aspect of trust but is not often included in conventional trust analyses. This chapter describes a means for accommodating health information as a component of trust and discusses architectures for collecting and using health information. The concluding section demonstrates one model of trust based on an experimental approach developed for a large system of systems.

Currently employed at Jet Propulsion Laboratory, California Institute of Technology. This work was done as a private venture and not in the author’s capacity as an employee of the Jet Propulsion Laboratory, California Institute of Technology.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

References

  1. Wang Y and Vassileva J (2003) “Trust and Reputation Model in Peer-to-Peer Networks,” in Proc. Third International Conference on Peer-to-Peer Computing (P2P2003), Linkoping, Sweden, pp. 150–157

    Google Scholar 

  2. Avizienis A, Laprie J.-C, Randell, B, and Landwehr C (2004) “Basic concepts and taxonomy of dependable and secure computing,” IEEE Transactions on Dependable Computing, vol. 1, no. 1, pp. 11–33, https://doi.org/10.1109/tdsc.2004.2.

  3. Komiak SX and Benbasat I (2004) “A Process Tracing Study on Trust Formation in Recommendation Agents,” Proceedings of the Third Annual Workshop on HCI Research in MIS, Washington, D.C.

    Google Scholar 

  4. Guzmán R, Harrison R, Abarca N, and Villena MG (2020) “A game-theoretic model of reciprocity and trust that incorporates personality traits,” Journal of Behavioral and Experimental Economics, Volume 84

    Google Scholar 

  5. Chin SH (2009) “On application of game theory for understanding trust in networks,” 2009 International Symposium on Collaborative Technologies and Systems, Baltimore, MD, pp. 106–110, https://doi.org/10.1109/CTS.2009.5067469.

  6. Abusitta A, Bellaiche M, and Dagenais M (2018) “A trust-based game theoretical model for cooperative intrusion detection in multi-cloud environments,” 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, pp. 1–8, https://doi.org/10.1109/ICIN.2018.8401625.

  7. Sabater J and Sierra C (2005) “Review on Computational Trust and Reputation Models,” Artificial Intelligence Review 24, pp. 33–60, 2005, https://doi.org/10.1007/s10462-004-0041-5

  8. Huang J, and Fox MS (2006) “An Ontology of Trust – Formal Semantics and Transitivity,” Proceedings of the International Conference on Electronic Commerce, Association of Computing Machinery, pp. 259–270

    Google Scholar 

  9. Sievers M, Madni AM, and Pouya P (2019) “Trust and Reputation in Multi-Agent Resilient Systems,” 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)

    Google Scholar 

  10. Viljanen L (2005) Towards an ontology of trust. In: Katsikas, S, López, J, Pernul, G (eds.), TrustBus 2005. LNCS, 3592, pp. 175–184. Springer, Heidelberg

    Google Scholar 

  11. Ceolin D, Nottamkandath A, Fokkink W, and Maccatrozzo M (2014) “Toward the Definition of an Ontology for Trust in (Web) Data,” CEUR Workshop Proceedings. 1259

    Google Scholar 

  12. Alnemr R, Paschke A, and Meinel C (2010) “Enabling reputation interoperability through semantic technologies,” I-SEMANTICS, pp. 1–9. ACM

    Google Scholar 

  13. O’Hara K (2012) “A General Definition of Trust,” Technical Report, University of Southampton

    Google Scholar 

  14. Veloudis S, Paraskakis I, Petsos C, Verginadis Y, Patiniotakis I, Gouvas P, and Mentzas G (2019) “Achieving security-by-design through ontology-driven attribute-based access control in cloud environments,” Future Generation Computer Systems, 93, 373–391, ISSN 0167-739X, https://doi.org/10.1016/j.future.2018.08.042

  15. Amaral G, Prince Sales T, Guizzardi G, and Porello D (2019) “Towards a Reference Ontology of Trust,” https://doi.org/10.1007/978-3-030-33246-4_1

  16. Mui L, Mohtashem M, and Halberstadt A (2002) “A Computational Model of Trust and Reputation,” Proceedings of the 35th Hawaii International Conference on System Sciences

    Google Scholar 

  17. Janiszewski M (2017) “Towards an Evaluation Model of Trust and Reputation Management Systems,” Intl Journal of Electronics and Telecommunications, vol. 63, no. 4, pp. 411–416

    Google Scholar 

  18. Kamvar SD, Schlosser MT, and Garcia-Molina H (2003) “The Eigen Trust Algorithm for Reputation Management in P2P Networks,” in Proc. of the Twelfth International World Wide Web Conference

    Google Scholar 

  19. Sievers M, Madni AM, and Pouya P (2018) “Assuring Spacecraft Swarm Resilience,” in Proc. AIAA Scitech, San Diego

    Google Scholar 

  20. Michael Sievers, Arun Viswanathan (2021) An Experimental Reputation Algorithm for Detecting Anomalous Peers in Large Communication Networks AIAA ASCEND, pp. 11

    Google Scholar 

  21. Schlosser A, Voss M, and Brückner L (2004) “Comparing and Evaluating Metrics for Reputation Systems by Simulation,” Proceedings of the IEEE Workshop on Reputation in Agent Societies

    Google Scholar 

  22. International Conference on Web Intelligence (WI 2003), Halifax, NS, Canada, 2003, pp. 372–378, https://doi.org/10.1109/WI.2003.1241218.

  23. D’Angelo G, Rampone S, & Palmieri F (2007) “Developing a trust model for pervasive computing based on A priori association rules learning and Bayesian classification,” Soft Comput 21, 6297–6315, https://doi.org/10.1007/s00500-016-2183-1

  24. Sardana N, Cohen R, Zhang J, and Chen S (2018) “A Bayesian Multiagent Trust Model for Social Networks,” in IEEE Transactions on Computational Social Systems, vol. 5, no. 4, pp. 995–1008, https://doi.org/10.1109/TCSS.2018.2879510.

  25. Bellman R (1956) “Dynamic Programming and Lagrange Multipliers,” Proc Natl Acad Sci USA, vol 42, no. 10, 767–769

    Google Scholar 

  26. Kaelbling LP, Littman ML, and Cassandra AR (1998) “Planning and Acting in Partially Observable Stochastic Domains,” Artificial Intelligence 101, pp. 99–134

    Google Scholar 

  27. Wang N, Pynadath D, Hill S, and Merchant C (2017) “The Dymanics of Human-Agent Trust with POMDP-Generated Explanations,” In: Beskow J., Peters C., Castellano G., O’Sullivan C., Leite I., Kopp S. (eds) Intelligent Virtual Agents, Lecture Notes in Computer Science, vol 10498. Springer, Cham. https://doi.org/10.1007/978-3-319-67401-8_58: Beskow J., Peters C., Castellano G., O’Sullivan C., Leite I., Kopp S. (eds) Intelligent Virtual Agents. IVA 2017. Lecture Notes in Computer Science, vol 10498. Springer, Cham. https://doi.org/10.1007/978-3-319-67401-8_58

  28. Chen M, Nikolaidis S, Soh H, Hsu D, and Siddhartha S (2018) “Trust-Aware Decision Making for Human-Robot Collaboration: Model Learning and Planning,” In: Proceedings of the 2018 ACM/IEEE international conference on human–robot interaction, pp 307–315

    Google Scholar 

  29. Okamura K and Yamada S (2020) “Empirical Evaluations of Framework for Adaptive Trust Calibration in Human-AI Cooperation,” IEEE Access, vol. 8, pp. 220335–220351, https://doi.org/10.1109/ACCESS.2020.3042556

  30. Sun YL, Han Z, Yu W, and Liu K.J, “Attacks on Trust Evaluation in Distributed Networks,” 2006 40th Annual Conference on Information Sciences and Systems, Princeton, NJ, 2006, pp. 1461–1466, https://doi.org/10.1109/CISS.2006.286695

  31. Koppel A, Warnell G, Stump E, Stone P, and Ribeiro A, “Policy Evaluation in Continuous MDPs with Efficient Kernelized Gradient Temporal Difference,” IEEE Transactions on Automatic Control, https://doi.org/10.1109/TAC.2020.3029315, 2020

  32. Sardana N, Cohen R, Zhang J, and Chen S (2018) “A Bayesian Multiagent Trust Model for Social Networks,” IEEE Transactions on Computational Social Systems, vol. 5, no. 4, pp. 995–1008, https://doi.org/10.1109/TCSS.2018.2879510

  33. Mitra S and McCluskey E (2000) “Which Concurrent Error Detection Scheme to Choose,” Proceedings International Test Conference 2000 (IEEE Cat. No.00CH37159), Atlantic City, NJ, USA, pp. 985–994, https://doi.org/10.1109/TEST.2000.894311.

  34. Mahmood A and McCluskey E (1998) “Concurrent error detection using watchdog processors-a survey,” in IEEE Transactions on Computers, vol. 37, no. 2, pp. 160–174, https://doi.org/10.1109/12.2145.

  35. Gizopoulos D, et al. (2011) “Architectures for online error detection and recovery in multicore processors,” 2011 Design, Automation & Test in Europe, Grenoble, pp. 1–6, https://doi.org/10.1109/DATE.2011.5763096.

  36. Yu Y, Li X, Leng X, Song L, Bu K, Chen Y, Yang J, Zhang L, Cheng K, and Xiao X (2019) “Fault Management in Software Defined Networking: A Survey, IEEE Communications Surveys and Tutorials, vol 21, no. 1, pp. 349–392

    Google Scholar 

  37. Caballero J, Yin H, Liang Z, and Song D, (2007) “Polyglot: Automatic Extraction of Protocol Message Format Using Binary Analysis,” CCS’07, Alexandria, Virginia, USA

    Google Scholar 

  38. Alharbi S, Rodriguez P, Maharaja R, Iyer P, Subaschandrabose N, and Ye Z (2017) “Secure the Internet of Things with Challenge Response Authentication in Fog Computing,” 2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC), San Diego, CA, pp. 1–2, 2017, https://doi.org/10.1109/PCCC.2017.8280489.

  39. Kushwaha P, Sonkar H, Altaf F, Maity S (2021) “A Brief Survey of Challenge–Response Authentication Mechanisms.” In: Fong S., Dey N., Joshi A. (eds) ICT Analysis and Applications. Lecture Notes in Networks and Systems, vol 154. Springer, Singapore, https://doi.org/10.1007/978-981-15-8354-4_57

  40. Isermann R (2005) “Model-Based Fault Detection and Diagnosis – Status and Applications,” Annual Reviews in Control, no. 29, pp. 71–85

    Google Scholar 

  41. Kocio K, Fesq L, and Mackey R (2017) “Model-Based Approach to Rover Health Assessment for Increased Productivity,” 2017 IEEE Aerospace Conference, Big Sky, MT, pp. 1–13, https://doi.org/10.1109/AERO.2017.7943835

  42. Uesato J, Kumar A, Szepesvari C, Erex T, Ruderman A, Anderson K, Dvijotham K, Heess, N, and Kohli P (2018) “Rigorous Agent Evaluation: An Adversarial Approach to Uncover Catastrophic Failures,” arXiv:1812.01647

    Google Scholar 

  43. Alford A, Wilkes M, and Kawamura K (2000) “System Status Evaluation: Monitoring the State of Agents in a Humanoid System,” SMC 2000 conference proceedings. 2000 IEEE International Conference on Systems, Man and Cybernetics, vol. 2, pp. 943–948, Nashville, TN, https://doi.org/10.1109/ICSMC.2000.885971

  44. Sievers M and Madni AM (2015) “Defining Credible Faults, A Risk-Based Approach,” AIAA Space

    Google Scholar 

  45. Xie T, Ma Y, and Wang Y-X (2019) “Towards Optimal Off-Policy Evaluation for Reinforcement Learning with Marginalized Importance Sampling, “33rd Conference on Neural Information Processing Systems (NeurIPS 2019), Vancouver, Canada

    Google Scholar 

  46. Abdelgayed T, Morsi W, and Sidhu T (2018) “Fault Detection and Classification Based on Co-training of Semisupervised Machine Learning,” in IEEE Transactions on Industrial Electronics, vol. 65, no. 2, pp. 1595–1605, https://doi.org/10.1109/TIE.2017.2726961

  47. Zidi S, Moulahi T, and Alaya B (2018) “Fault Detection in Wireless Sensor Networks Through SVM Classifier,” in IEEE Sensors Journal, vol. 18, no. 1, pp. 340–347, https://doi.org/10.1109/JSEN.2017.2771226

  48. Umer M, Sher M, and Bi Y (2017) “Flow-Based Intrusion Detection: Techniques and Challenges,” Computer and Security, vol 70, pp. 238–254

    Google Scholar 

  49. U.S. Department of Homeland Security, “Cyber Security Division Technology Guide,” vol. 1 https://www.dhs.gov/sites/default/files/publications/CSD%20Tech%20Guide-.pdf

  50. U.S. Department of Homeland Security, “Cyber Security Division Technology Guide,” vol. 2 https://www.dhs.gov/sites/default/files/publications/csd-ttp-technology-guide-volume-2.pdf

  51. Peón, PG, Steiner, W, and Uhlemann, E, “Network Fault Tolerance by Means of Diverse Physical Layers,” 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Vienna, Austria, 2020, pp. 1697–1704, https://doi.org/10.1109/ETFA46521.2020.9212131.

  52. Lamport L, Shostak R, and Pease M (1982) “The Byzantine Generals Problem,” ACM Transactions on Programming Languages and Systems, vol. 4, no. 3, pp. 382–401

    Google Scholar 

  53. Gao, S, Yu, T, Zhu, J, and Cai, W, “T-PBFT: An EigenTrust-based practical Byzantine fault tolerance consensus algorithm,” in China Communications, vol. 16, no. 12, pp. 111–123, Dec. 2019, https://doi.org/10.23919/JCC.2019.12.008

  54. ElDefrawy, K, and Kaczmarek, T, “Byzantine Fault Tolerant Software-Defined Networking (SDN) Controllers,” 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), Atlanta, GA, USA, 2016, pp. 208–213, https://doi.org/10.1109/COMPSAC.2016.76

  55. Sievers, M, Madni, AM, Pouya, P, “Assuring Spacecraft Swarm Byzantine Resilience,” AIAA Scitech, 2019

    Google Scholar 

  56. NASA, Office of Inspector General, “Cybersecurity Management and Oversight at the Jet Propulsion Laboratory, Report No. IG-19-022, June, 18, 2019

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Sievers .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Sievers, M. (2022). Modeling Trust and Reputation in Multiagent Systems. In: Madni, A.M., Augustine, N., Sievers, M. (eds) Handbook of Model-Based Systems Engineering. Springer, Cham. https://doi.org/10.1007/978-3-030-27486-3_52-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-27486-3_52-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-27486-3

  • Online ISBN: 978-3-030-27486-3

  • eBook Packages: Springer Reference Intelligent Technologies and RoboticsReference Module Computer Science and Engineering

Publish with us

Policies and ethics