Abstract
The possibility of a massive, networked infrastructure of diverse entities partaking in collaborative applications with each other increases more and more with the proliferation of mobile devices and the development of ad hoc networking technologies. In this context, traditional security measures do not scale well. We aim to develop trust-based security mechanisms using small world concepts to optimise formation and propagation of trust amongst entities in these vast networks. In this regard, we surmise that in a very large mobile ad hoc network, trust, risk, and recommendations can be propagated through relatively short paths connecting entities. Our work describes the design of trust-formation and risk-assessment systems, as well as that of an entity recognition scheme, within the context of the small world network topology.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Marsh, S.: Formalising Trust as a Computational Concept. PhD thesis, University of Stirling, Department of Computer Science and Mathematics (1994)
McKnight, D., Chervany, N.: The Meanings of Trust. MISRC 96-04, University of Minnesota, Management Informations Systems Research Center, University of Minnesota (1996)
Gray, E., O’Connell, P., Jensen, C., Weber, S., Seigneur, J.M., Yong, C.: Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications. Technical Report 66, Department of Computer Science, Trinity College Dublin (2002)
Matthews, R.: Six Degrees of Separation. World Link (2000)
Milgram, S.: The Small World Problem. Psychology Today 61 (1967)
Travers, J., Milgram, S.: An Experimental Study of the Small World Problem. Sociometry 32 (1969) 425–443
Watts, D., Strogatz, S.: Collective Dynamics of’ small-World’ Networks. Nature 393 (1998) 440–442
Watts, D.: Small Worlds, The Dynamics of Networks Between Order and Randomness. Princeton University Press (1999)
Watts, D., Strogatz, S.: Kevin Bacon, the Small-World, and Why It All Matters. http://www.santafe.edu/sfi/publications/Bulletins/bulletinFall99/workInProgress/smallWorld.html (1999)
Reynolds, P.: Oracle of Bacon. (http://www.cs.virginia.edu/oracle/)
Adamic, L.: The Small World Web. In Abiteboul, S., Vercoustre, A.M., eds.: Proc. 3rd European Conf. Research and Advanced Technology for Digital Libraries, ECDL. Number 1696, Springer-Verlag (1999) 443–452
Kleinberg, J.: The Small-World Phenomenon: An Algorithmic Perspective. In: Proc. of the 32nd ACM Symposium on Theory of Computing. (2000)
Watts, D., Dodds, P., Newman, M.: Identity and Search in Social Networks. Science 296 (2002) 1302–1305
Hubaux, J.P., Buttyan, L., Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks. In: Proc. of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC). (2001)
Capkun, S., Buttyan, L., Hubaux, J.P.: Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph. In: New Security Paradigms Workshop, Norfolk, VA (2002)
Stajano, F.: Security for Ubiquitous Computing. Wiley (2002)
Seigneur, J.M., Farrell, S., Jensen, C.D.: Secure Ubiquitous Computing Based on Entity Recognition. In: Ubicomp’02 Security Workshop, Gothenburg (2002)
Seigneur, J.M., Farrell, S., Jensen, C.D., Gray, E., Yong, C.: End-to-end trust in pervasive computing starts with recognition. In: Proceedings of the First International Conference on Security in Pervasive Computing, Boppard, Germany (2003 [to appear])
ITU: Information Technology — Opens Systems Interconnection — The Directory: Authentication Framework. Number X.509 in ITU-T Recomandation. International Telecomunication Union (1993)
Kohl, J., Neuman, B.: The Kerberos Network Authentication Service (Version 5). RFC 1510, IETF (1993)
IMDB: Internet Movie Database. (http://www.imdb.com)
Venkatraman, M., Yu, B., Singh, M.: Trust and Reputation Management in a Small-World Network. Technical report (2002)
Matsuo, Y.: Clustering Using Small World Structure. In: Knowledge-Based Intelligent Information and Engineering Systems, Crema, Italy (2002)
Newman, M.: Clustering and Preferential Attachment in Growing Networks. Phys. Rev. E 64 (2001)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gray, E., Seigneur, JM., Chen, Y., Jensen, C. (2003). Trust Propagation in Small Worlds. In: Nixon, P., Terzis, S. (eds) Trust Management. iTrust 2003. Lecture Notes in Computer Science, vol 2692. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44875-6_17
Download citation
DOI: https://doi.org/10.1007/3-540-44875-6_17
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40224-4
Online ISBN: 978-3-540-44875-4
eBook Packages: Springer Book Archive