Abstract
The improvement of wireless technologies and the increasing spread of mobile phones open new possibilities to perform mobile Customer-to-Customer commercial activities. In this new scenario, where users cannot rely on stable connections, it assumes a great relevance how to trust the counterpart in a transaction and how to avoid that a disconnection, possible in wireless connections, can encourage users to cheat. To tackle these issues we propose a feedback-based reputation mechanism able to detect malicious users better than other state-of-the-art techniques, as shown by the large number of experiments run to measure the accuracy of the compared methods in the most common situations.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Abdul-Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In HICSS ’00: Proceedings of the 33rd Hawaii international conference on system sciences (Vol. 6). Washington: IEEE Computer Society.
Aberer, K. (2001). P-grid: A self-organizing access structure for P2P information retrieval. In Lecture notes in computer science : Vol. 2172. COOPIS 2001: Proceedings of the ninth international conference on cooperative information systems (pp. 179–194). London: Springer.
Arboit, G., Crépeau, C., Davis, C. R., & Maheswaran, M. (2008). A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks, 6(1), 17–31.
Avancha, S., D’Souza, P., Perich, F., Joshi, A., & Yesha, Y. (2003). P2P M-commerce in pervasive environments. SIGecom Exchange, 3(4), 1–9.
Banks, M. (2005). The eBay survival guide: How to make money and avoid losing your shirt. San Francisco: No Starch Press.
Birk, A. (2000). Boosting cooperation by evolving trust. Applied Artificial Intelligence, 14(8), 769–784.
Buchegger, S., & Le Boudec, J. Y. (2004). A robust reputation system for P2P and mobile ad-hoc networks. In P2PEcon 2004: Proceedings of the 2nd workshop on the economics of peer-to-peer systems. Harvard, MA, USA.
Carbó, J., Molina, J. M., & Dávila, J. Trust management through fuzzy reputation. Journal of Cooperative Information Systems.
Carbó, J., Molina, J. M., & Dávila, J. (2005). Fuzzy referral based cooperation in social networks of agents. AI Commun., 18(1), 1–13.
Chinni, S., Thomas, J., Ghinea, G., & Shen, Z. (2008). Trust model for certificate revocation in ad hoc networks. Ad Hoc Networks, 6(3), 441–457.
Conte, R., & Paolucci, M. (2002). Reputation in artificial societies: Social beliefs for social order. Hingham: Kluwer Academic.
Dellarocas, C. (2003). The digitization of word of mouth: promise and challenges of online feedback mechanisms. Management Science, 49(10), 1407–1424.
Despotovic, Z., & Aberer, K. (2006). P2P reputation management: probabilistic estimation vs. social networks. Computer Networks, 50(4), 485–500.
Falcone, R., & Castelfranchi, C. (2001). Social trust: a cognitive approach. Norwell: Kluwer Academic.
Falcone, R., & Castelfranchi, C. (2001). The socio-cognitive dynamics of trust: Does trust create trust? In Proceedings of the workshop on deception, fraud, and trust in agent societies held during the autonomous agents conference (pp. 55–72). London: Springer.
Grandison, T., & Sloman, M. (2000). A survey of trust in Internet application. IEEE Communication Surveys. Fourth quarter.
Housley, R., Polk, W., Ford, W., & Solo, D. (2002). RFC 3280—Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. http://www.faqs.org/rfcs/rfc3280.html.
http://auctions.amazon.com (2008).
http://www.bluetooth.com (2008).
http://www.ebay.com (2008).
Huynh, T. D., Jennings, N. R., & Shadbolt, N. R. (2006). An integrated trust and reputation model for open multi-agent system. Autonomous Agent and Multi Agent Systems, 13, 119–154.
Josang, A., Gray, E., & Kinateder, M. (2006). Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems, 4(2), 139–161.
Josang, A., Ismail, R., & Boyd, C. (2005). A survey of trust and reputation systems for online service provision. Decision Support System, 43(2), 618–644.
Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in P2P networks. In WWW ’03: Proceedings of the 12th international conference on World Wide Web (pp. 640–651). New York: ACM.
Karp, D. A. (2003). eBay Hacks: 100 industrial-strength tips & tools. San Francisco: O’Reilly Media.
Kleist, V. F. (2004). A transaction cost model of electronic trust: transactional return, incentives for network security and optimal risk in the digital economy. Electronic Commerce Research, 4(1–2), 41–57.
Kong, J., Luo, H., Xu, K., Gu, D. L., Gerla, M., & Lu, S. (2002). Adaptive security for multi-layer ad-hoc networks. Wireless Communication and Mobile Computing, 2, 533–547.
Lax, G., & Sarné, G. M. L. (2006). Blue: a reputation-based multi-agent system to support C2C in P2P bluetooth networks. In ICE-B 2006: Proceedings of the international conference on E-business (pp. 97–104).
Marsh, S. P. (1994). Formalizing trust as a computational concept. Ph.D. thesis, Department of Computing Science and Mathematics, University of Stirling.
Marti, S., & Garcia-Molina, H. (2006). Taxonomy of trust: categorizing P2P reputation systems. Computer Networks, 50(4), 472–484.
Massa, P. (2006). A survey of trust use and modeling in current real systems. In: Song, R., Korba, L., Yee, G. (Eds.), Trust in E-services: Technologies, practices and challenges. Idea Group Publishing.
Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: a trust model. Electronic Commerce Research, 4(4), 359–372.
Misztal, B. M. (1996). Trust in modern societies. Cambridge: Polity.
Mui, L., Mohtashemi, M., & Halberstadt, A. (2002). Notions of reputation in multi-agents systems: a review. In Proceedings of the first international joint conference on autonomous agents and multiagent systems (AAMAS ’02) (pp. 280–287). New York: ACM.
Mundinger, J., & Le Boudec, J. Y. (2005). The impact of liars on reputation in social networks. In Proceedings of social network analysis: advances and empirical application forum.
Myers, M., Ankney, R., Malpani, A., Galperin, S., & Adams, C. (1999). RFC 2560—X. 509 Internet public key infrastructure online certificate status protocol—OCSP. http://www.faqs.org/rfcs/rfc2560.html.
O’Mahony, D., Pierce, M., & Tewari, H. (2001). Electronic payment systems for E-commerce. Norwood: Artech House.
Ondrus, J., & Pigneur, Y. (2006). Towards a holistic analysis of mobile payments: a multiple perspectives approach. Electronic Commerce Research and Applications, 5(3), 246–257.
Patton, M. A., & Josang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1–2), 9–21.
Perich, F., Joshi, A., Yesha, Y., & Finin, T. (2003). Neighborhood-consistent transaction management for pervasive computing environments. In Lecture notes in computer science : Vol. 2736. Proceedings of the 14th international conference on database and expert systems applications (DEXA 2003) (pp. 276–286). Berlin: Springer.
Perich, F., Undercoffer, J., Kagal, L., Joshi, A., Finin, T., & Yesha, Y. (2004). In reputation we believe: query processing in mobile ad-hoc networks. In Proceedings of the first annual international conference on mobile and ubiquitous systems: Networking and services (MOBIQUITOUS 2004) (pp. 326–334). Baltimore: Maryland University Press.
Ramchurn, S. D., Huynh, D., & Jennings, N. R. (2004). Trust in multi-agent systems. Knowledge Engineering Review, 19(1), 1–25.
Ravi, S., Raghunathan, A., Kocher, P., & Hattangady, S. (2004). Security in embedded systems: design challenges. Transactions on Embedded Computing Systems, 3(3), 461–491.
Reichling, F. (2004). Effects of reputation mechanisms on fraud. Prevention in eBay auctions. Thesis. Stanford University.
Resnick, P., & Zeckhauser, R. (2002). Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. In M. R. Baye (Ed.), Advances in Applied Microeconomics : Vol. 11. The economics of the Internet and E-commerce. Amsterdam: Elsevier Science.
Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems. Communicatons of ACM, 43(12), 45–48.
Rietjens, B. (2006). Trust and reputation on eBay: Towards a legal framework for feedback intermediaries. Information & Communications Technology Law, 15(1), 55–78.
Sabater, J., & Sierra, C. (2001). REGRET: Reputation in Gregarious societies. In AGENTS ’01: Proceedings of the fifth international conference on autonomous agents (pp. 194–195). New York: ACM.
Sabater, J., & Sierra, C. (2005). Review on computational trust and reputation models (pp. 33–60). Norwell: Kluwer Academic.
Serrano-Alvarado, P., Roncancio, C., & Adiba, M. (2004). A survey of mobile transactions. Distributed Parallel Databases, 16(2), 193–230.
Shaked, Y., & Wool, A. (2005). Cracking the bluetooth PIN. In Proceedings of the 3rd international conference on mobile systems, applications, and services (MobiSys ’05) (pp. 39–50). New York: ACM.
Sherwood, R., Lee, S., & Bhattacharjee, B. (2006). Cooperative peer groups in NICE. Computer Networks, 50(4), 523–544.
Song, S., Hwang, K., Zhou, R., & Kwok, Y. K. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), 24–34.
Tan, Y. H., & Thoen, W. (2000). An outline of a trust model for electronic commerce. Applied Artificial Intelligence, 14(8), 849–862.
Veijalainen, J., Terziyan, V. Y., & Tirri, H. (2006). Transaction management for M-commerce at a mobile terminal. Electronic Commerce Research and Applications, 5(3), 229–245.
Wang, Y. F., Hori, Y., & Sakurai, K. (2008). Characterizing economic and social properties of trust and reputation systems in P2P environment. Journal of Computer Science and Technology, 23(1), 129–140.
Xiong, L., & Liu, L. (2004). PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 843–857.
Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14(9), 881–907.
Author information
Authors and Affiliations
Corresponding author
Additional information
An abridged version of this paper appeared in Proceedings of the ICE-B International Conference on E-Business 2006 (ICE-B 2006) 29.
Rights and permissions
About this article
Cite this article
Lax, G., Sarné, G.M.L. CellTrust: a reputation model for C2C commerce. Electron Commer Res 8, 193–216 (2008). https://doi.org/10.1007/s10660-008-9019-8
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10660-008-9019-8