Skip to main content
Log in

Trust management framework for intelligent agent negotiations in ubiquitous computing environments

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In dynamic ubiquitous computing environments, system entities may be classified into two main categories that are, in principle, in conflict. These are the Service Resource Requestors (SRRs) wishing to use services and/or exploit resources offered by the other system entities and the Service Resource Providers (SRPs) that offer the services/resources requested. Seeking for the maximisation of their welfare, while achieving their own goals and aims, entities may misbehave (intentionally or unintentionally), thus, leading to a significant deterioration of system’s performance. In this study, a reputation mechanism is proposed which helps estimating SRPs trustworthiness and predicting their future behaviour, taking into account their past performance in consistently satisfying SRRs’ expectations. Thereafter, under the assumption that a number of SRPs may handle the SRRs requests, the SRRs may decide on the most appropriate SRP for the service/resource requested on the basis of a weighted combination of the evaluation of the quality of their offer (performance related factor) and of their reputation rating (reliability related factor). The proposed trust management framework is distributed, considers both first-hand information (acquired from the SRR’s direct past experiences with the SRPs) and second-hand information (disseminated from other SRRs’ past experiences with the SRPs), while it exhibits a robust behaviour against inaccurate reputation ratings. The designed mechanisms have been empirically evaluated simulating interactions among self-interested agents, exhibiting improved performance with respect to random SRP selection.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  1. Louta, M., Roussaki, I., & Pechlivanos, L. (2006). Reputation based intelligent agent negotiation frameworks in the e-marketplace. In 2006 proc. international conference on e-business (pp. 5–12). Setubal, Portugal.

  2. Jennings, N., Faratin, P., Lomuscio, A., Parsons, S., Sierra, C., & Wooldridge, M. (2001). Automated negotiation: prospects, methods, and challenges. International Journal of Group Decision and Negotiation, 10(2), 199–215.

    Article  Google Scholar 

  3. Callas, J., Donnerhacke, L., Finney, H., Shaw, D., & Thayer, R. (2007). OpenPGP message format (RFC 4880, IETF). Available: http://www.ietf.org/rfc/rfc4880.txt.

  4. Cooper, D., Santesson, S., Farell, S., Boeyen, S., Housley, R., & Polo, W. (2007). Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile (Internet Draft, IETF). Available: http://www.ietf.org/internet-drafts/draft-ietf-pkix-rfc3280bis-09.txt.

  5. Atif, Y. (2002). Building trust in e-commerce. IEEE Internet Computing Magazine, 6(1), 18–24.

    Article  Google Scholar 

  6. Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanism. Applied Artificial Intelligence Journal, 14(9), 881–908.

    Article  Google Scholar 

  7. Sutton, R. S., & Barto, A. G. (1998). Reinforcement learning: an introduction (adaptive computation and machine learning). Cambridge: MIT Press.

    Google Scholar 

  8. Cherkassky, V., & Mulier, F. (1998). Learning from data: concepts, theory, and methods. Adaptive and learning systems for signal processing, communications and control series. New York: Wiley.

    Google Scholar 

  9. eBay, http://www.ebay.com.

  10. OnSale, http://www.onsale.com/exchange.htm.

  11. He, M., Jennings, N., & Leung, H. (2003). On agent-mediated electronic commerce. IEEE Transactions on Knowledge and Data Engineering, 15(4), 985–1003.

    Article  Google Scholar 

  12. Sabater, J., & Sierra, C. (2005). Review on computation trust and reputation models. Artificial Intelligence Review, 24(1), 33–60.

    Article  Google Scholar 

  13. Bakos, Y., & Dellarocas, C. (2002). Cooperation without enforcement? A comparative analysis of litigation and on-line reputation as quality assurance mechanisms. In Proc. of the 23rd international conference on information systems. Barcelona, Spain.

  14. Li, H., & Singhal, M. (2007). Trust management in distributed systems. IEEE Computer, 40(2), 45–53.

    Google Scholar 

  15. Zhao, W., Varadharajan, W., & Bryan, G. (2006). A unified framework for trust management. In Proc. of the 2nd international conference on security and privacy in communication networks (SecureComm and workshops (2006)) (pp. 1–8).

  16. Zacharia, G., Moukas, A., & Maes, P. (1999). Collaborative reputation mechanisms in electronic marketplaces. In Proc. of the 32nd Hawaii international conference on system sciences (pp. 1–7). Los Alamitos, CA, USA.

  17. Xiong, L., & Liu, L. (2005). Reputation and trust. In Advances in security and payment methods for mobile commerce (pp. 19–35). Idea Group Inc.

  18. Sabater, J., & Sierra, C. (2001). REGRET: Reputation in gregarious societies. In Proc. of the 5th international conference on autonomous agents (pp. 194–195). Montreal, Quebec, Canada.

  19. Averer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. In Proc of the 10th international conference on information and knowledge management (pp. 310–317). Atlanta, Georgia, USA.

  20. Pujol, J., Sanguessa, R., & Delgado, J. (2002). Extracting reputation in multi agent systems by means of social network topology. In Proc. of the 1st international joint conference on autonomous agents and multi-agent systems (pp. 467–474). Bologna, Italy.

  21. Damiani, E., Vimercati, S., Paraboschi, S., Samarati, P., & Violante, F. (2002). A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proc of the 9th ACM conference on computer and communications security (pp. 207–216). Washington, DC, USA.

  22. Huynh, T., Jennings, N., & Shadbolt, N. (2006). Certified reputation: how an agent can trust a stranger. In Proc. of the 5th international joint conference on autonomous agents and multi-agent systems (pp. 1217–1224). Hakodate, Hokkaido, Japan.

  23. Raiffa, H. (1982). The art and science of negotiation. Cambridge: Harvard University Press.

    Google Scholar 

  24. Pruitt, D. (1981). Negotiation behavior. San Diego: Academic Press.

    Google Scholar 

  25. Kaelbling, L., Littman, M., & Moore, A. (1999). Reinforcement learning: a survey. Journal of Artificial Intelligence Research, 4, 237–285.

    Google Scholar 

  26. Roussaki, I., Louta, M., & Pechlivanos, L. (2004). An efficient negotiation model for the next generation electronic marketplace. In Proc. of the 12th IEEE Mediterranean electrotechnical conference (MELECON 2004) (pp. 615–618). Dubrovnic, Croatia.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Malamati Louta.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Louta, M., Michalas, A., Anagnostoupoulos, I. et al. Trust management framework for intelligent agent negotiations in ubiquitous computing environments. Telecommun Syst 41, 141–157 (2009). https://doi.org/10.1007/s11235-009-9155-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-009-9155-z

Keywords

Navigation