Abstract
Recent development of various sensors and communicating devices has significantly enhanced information systems (IS). However, the security of these objects as well as the confidence in the information they produce cannot be guaranteed. They can be deceived or under the control of a malicious third party. This raises new issues concerning trust one can have in data, sensors, and the IS itself. This research studies security of information systems considering trust assessment. This paper first introduces the concept of trust one can have in the sources of information and then defines a mathematical trust-measure. A thought on global trust measurement and propagation of trust is presented in the Discussion section, but it is not dealt with in this paper. Simulations conducted in the framework of ship navigation system illustrate the relevance of this approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Search And Rescue.
- 2.
Closest Point of Approach, collision alert warning of an obstacle on the route pursued by the vessel.
- 3.
Automatic Identification System, a system standardized by the International Maritime Organization for the real-time broadcasting of VHF navigation information.
References
Abdul-Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (pp. 9–19). IEEE.
ANSSI. (2015). Cybersecurity for industrial control systems. Technical report, Agence Nationale pour la Sécurité des Systmes d’information.
Balduzzi, M., Pasta, A., & Wilhoit, K. (2014). A security evaluation of automated identification system. In Proceedings of the 30th Annual Computer Security Applications Conference (pp. 436–445). ACM.
Bhatti, J., & Humphreys, T. (2017). Hostile control of ships via false GPS signals: Demonstration and detection. Navigation, 64(1), 51–66.
Blomqvist, K. (1997). The many faces of trust. Scandinavian Journal of Management, 13(3), 271–286.
Capra, L., & Musolesi, M. (2006). Autonomic trust prediction for pervasive systems. In 20th International Conference on Advanced Information Networking and Applications (Vol. 2, pp. 48–59). IEEE.
Costé, B., Ray, C., & Coatrieux, G. (2016). Évaluation de la confiance dans un environnement multisources. In Informatique des Organisations et Systémes d’Information et de Décision (INFORSID), Atelier Sécurité des systémes d’information: technologies et personnes.
Da Costa Pereira, C., TeTettamanzi, A. B., & Villata, S. (2011). Changing one’s mind: Erase or rewind? Possibilistic belief revision with fuzzy argumentation based on trust. In Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence (Vol. 1, pp. 164–171).
Das, A., & Islam, M. M. (2012). Securedtrust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.
De Cock, M., & Da Silva, P. P. (2006). A many valued representation and propagation of trust and distrust. In Fuzzy Logic and Applications (pp. 114–120). Springer.
De Courcy, R. (1992). Les systèmes d’information en réadaptation. Québec, Réseau International CIDIH et facteurs environnementaux, 1(5), 7–10.
Demolombe, R. (2001). To trust information sources: a proposal for a modal logical framework. In Trust and Deception in Virtual Societies (pp. 111–124). Springer.
Demolombe, R. (2004). Reasoning about trust: A formal logical framework. In Trust Management, pages 291–303. Springer.
Deutsch, M. (1958). Trust and suspicion. Journal of Conflict Resolution, 265–279.
Dung, P. M. (1993). On the acceptability of arguments and its fundamental role in nonmonotonic reasoning and logic programming. International Joint Conferences on Artificial Intelligence (pp. 852–857).
Esfandiari, B., & Chandrasekharan, S. (2001). On how agents make friends: Mechanisms for trust acquisition. In 4th Workshop on Deception, Fraud and Trust in Societies (Vol. 222).
Forrester, J. W. (1994). System dynamics, systems thinking, and soft or. System Dynamics Review, 10(2–3), 245–256.
Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys & Tutorials, 3(4), 2–16.
Josang, A., Hayward, R., & Pope, S. (2006). Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference (Vol. 48, pp. 85–94). Australian Computer Society, Inc.
Josang, A., Ivanovska, M., & Muller, T. (2015). Trust revision for conflicting sources. In Proceedings of the 18th International Conference on Information Fusion (FUSION 2015) (pp. 550–557).
Jousselme, A.-L., Boury-Brisset, A.-C., Debaque, B., & Prévost, D. (2014). Characterization of hard and soft sources of information: A practical illustration. In 17th International Conference on Information Fusion (pp. 1–8). IEEE.
Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social Forces, 63(4), 967–985.
Liu, W., & Williams, M.-A. (2002). Trustworthiness of information sources and information pedigree. In Intelligent Agents VIII (pp. 290–306). Springer.
Lorini, E., & Demolombe, R. (2008). From binary trust to graded trust in information sources: A logical perspective. LNAI, 5396, 205–225.
Luhmann, N. (1979). Trust and Power. U.M.I.
Marsh, S. P. (1994). Formalising trust as a computational concept. Ph.D. thesis, Department of Computer Science and Mathematics, University of Stirling.
Matt, P.-A., Morge, M., & Toni, F. (2010). Combining statistics and arguments to compute trust. In Proceedings of 9th International Conference on Autonomous Agents and Multiagent Systems (pp. 209–216).
McKnight, D. H., & Chervany, N. L. (2000). What is trust? A conceptual analysis and an interdisciplinary model. In Americas Conference on Information Systems (pp. 827–833).
Paglieri, F., Castelfranchi, C., da Costa Pereira, C., Falcone, R., Tettamanzi, A., & Villata, S. (2014). Trusting the messenger because of the message: Feedback dynamics from information quality to source evaluation. Computational and Mathematical Organization Theory, 20(2), 176–194.
Papoulis, A., & Pillai, S. U. (1986). Probability, Random Variables, and Stochastic Processes. New York: McGraw Hill.
Parsons, S., Tang, Y., Sklar, E., McBurney, P., & Cai, K. (2011). Argumentation-based reasoning in agents with varying degrees of trust.
Ray, C., Gallen, R., Iphar, C., Napoli, A., & Bouju, A. (2015). DeAIS project: Detection of AIS spoofing and resulting risks. In OCEANS 2015-Genova (pp. 1–6).
Stranders, R., de Weerdt, M., & Witteveen, C. (2008). Fuzzy argumentation for trust. In Computational Logic in Multi-Agent Systems (pp. 214–230). Springer.
Sun, Y. L., Han, Z., Yu, W., & Liu, K. R. (2006). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In INFOCOM (pp. 1–13).
Teacy, W. T. L., Patel, J., Jennings, N. R., & Luck, M. (2006). TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12(2), 183–198.
Villata, S., Boella, G., Gabbay, D. M., & van der Torre, L. (2013). A socio-cognitive model of trust using argumentation theory. International Journal of Approximate Reasoning, 54(4), 541–559.
Wang, Y., & Singh, M. P. (2006). Trust representation and aggregation in a distributed agent system. AAAI, 6, 1425–1430.
Wang, Y., & Singh, M. P. (2007). Formal trust model for multiagent systems. In International Joint Conference on Artificial Intelligence (pp. 1551–1556).
Yan, Z., Zhang, P., & Virtanen, T. (2003). Trust evaluation based security solution in ad hoc networks. In Proceedings of the Seventh Nordic Workshop on Secure IT Systems (Vol. 14).
Yu, B., & Singh, M. P. (2002). An evidential model of distributed reputation management. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1 (pp. 294–301). ACM.
Acknowledgements
This research is co-financed by the Chair of Naval Cyber Defense and the Brittany region. The authors thank them for their support.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Costé, B., Ray, C., Coatrieux, G. (2019). Trust Assessment for the Security of Information Systems. In: Pinaud, B., Guillet, F., Gandon, F., Largeron, C. (eds) Advances in Knowledge Discovery and Management. Studies in Computational Intelligence, vol 834. Springer, Cham. https://doi.org/10.1007/978-3-030-18129-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-030-18129-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-18128-4
Online ISBN: 978-3-030-18129-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)