دوره 20، شماره 4 - ( 12-1402 )                   جلد 20 شماره 4 صفحات 22-3 | برگشت به فهرست نسخه ها


XML English Abstract Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Khoshkbarchi A, Shahriari H R. Entropy-Based Trust Management System for Mitigating Malicious Behaviors in Trust Management Systems, Considering Information Ethics Theory. JSDP 2024; 20 (4) : 1
URL: http://jsdp.rcisp.ac.ir/article-1-1370-fa.html
خشکبارچی امیر، شهریاری حمید رضا. سامانۀ مدیریت اعتماد مبتنی‌بر آنتروپی جهت کاهش رفتارهای بدخواهانه در سامانه‌های مدیریت اعتماد بر اساس نظریه اخلاق اطلاعاتی. پردازش علائم و داده‌ها. 1402; 20 (4) :3-22

URL: http://jsdp.rcisp.ac.ir/article-1-1370-fa.html


دانشگاه صنعتی امیر کبیر
چکیده:   (679 مشاهده)
سامانه­‌های مدیریت اعتماد در محیط‌­های تعاملی، جایی که یک عامل باید در مورد استفاده از یک خدمات تصمیم بگیرد، استفاده می‌شوند. به‌دلیل فراگیرشدن این سامانه‌­ها، موجودیت­‌های بدخواه انگیزۀ­ مضاعفی برای تأثیرگذاری بر سامانه­‌های مدیریت اعتماد و ایجاد خدشه در فرایند تصمیم­‌گیری دارند. با وجود روش‌­های ارائه‌شده برای کاهش فعالیت­‌های مخرب در الگو­های اعتماد قبلی، بسیاری از آنها نتوانستند به‌طور مؤثر این مشکل را حل کنند. به‌عنوان مثال، مقابله با تغییر رفتار عامل­ها یک مشکل رایج برای بسیاری از الگو­های اعتماد است. علاوه‌بر این، هیچ رویکرد قوی، منعطف و تطبیقی ارائه نشده‌است و این مشکل همچنان وجود دارد. در این مقاله، رویکرد جدیدی برای جلوگیری از اعمال مخرب و شناسایی ناهنجاری‌ها با استفاده از یک سامانۀ مدیریت اعتماد مبتنی‌بر آنتروپی با قابلیت تشخیص ویژگی‌های ذاتی اقدامات عامل­‌ها، اعم از اینکه اقدام مخرب باشد یا خیر، ارائه شده‌است. محاسبۀ اعتماد بر اساس ساختار آنتروپی، از نظریۀ اخلاق اطلاعات الهام گرفته‌شده‌است. با استفاده از این روش، اقدامات مخربی که سامانۀ مدیریت اعتماد را مختل می­کنند، پالایش می­شوند و در نتیجه، دقت محاسبۀ اعتماد افزایش می‌­یابد. نتایج تجربی حاصل از شبیه­‌سازی نشان می‌­دهد که عملکرد سامانۀ پیشنهادی از نظر دقت محاسبه، قابلیت اعتماد خدمات و همچنین، تشخیص رفتار مخرب عامل­ها قابل‌قبول است. به‌طور ویژه، الگوی پیشنهادی از نظر سرعت انطباق با تغییرات محیطی و رفتارهای متغیر عامل­‌ها، حدود ده درصد نسبت به الگوهای اعتماد شناخته‌شده بهبود یافته‌است.
 
شماره‌ی مقاله: 1
متن کامل [PDF 1578 kb]   (246 دریافت)    
نوع مطالعه: پژوهشي | موضوع مقاله: مقالات گروه امنیت اطلاعات
دریافت: 1402/1/12 | پذیرش: 1402/4/27 | انتشار: 1403/2/6 | انتشار الکترونیک: 1403/2/6

فهرست منابع
1. [1] Z. Su et al., "Reliable and resilient trust management in distributed service provision networks," dl.acm.org, vol. 9, no. 3, Jun. 2015, doi: 10.1145/2754934. [DOI:10.1145/2754934]
2. [2] D. Chen, F. Lai, and Z. Lin, "A trust model for online peer-to-peer lending: a lender's perspective," Information Technology and Management, vol. 15, no. 4, pp. 239-254, Dec. 2014, doi: 10.1007/S10799-014-0187-Z. [DOI:10.1007/s10799-014-0187-z]
3. [3] M. Tang, X. Dai, J. Liu, and J. Chen, "Towards a trust evaluation middleware for cloud service selection," Future Generation Computer Systems, vol. 74, pp. 302-312, Sep. 2017, doi: 10.1016/J.FUTURE.2016.01.009. [DOI:10.1016/j.future.2016.01.009]
4. [4] B. Lahno, "Trust. The Tacit Demand," Ethical Theory and Moral Practice, vol. 2, no. 4. Springer, pp. 433-435, 1999. [DOI:10.1023/A:1009935315332]
5. [5] M. Ryan, "In AI We Trust: Ethics, Artificial Intelligence, and Reliability," Sci Eng Ethics, vol. 26, no. 5, pp. 2749-2767, Oct. 2020, doi: 10.1007/S11948-020-00228-Y/TABLES/1. [DOI:10.1007/s11948-020-00228-y] [PMID] []
6. [6] J.-H. Cho, K. Chan, and S. Adali, "A survey on trust modeling," ACM Computing Surveys (CSUR), vol. 48, 2015. [DOI:10.1145/2815595]
7. [7] D. M. Messick and R. M. Kramer, "Trust as a form of shallow morality.," 2001.
8. [8] Y. Yamamoto, "A morality based on trust: Some reflections on Japanese morality," Philos East West, vol. 40, no. 4, pp. 451-469, 1990. [DOI:10.2307/1399351]
9. [9] L. Floridi, "Information ethics, its nature and scope," ACM SIGCAS Computers and Society, vol. 36, no. 3, 2006. [DOI:10.1145/1195716.1195719]
10. [10] L. Floridi, The ethics of information. 2013. Accessed: Jun. 21, 2022. [Online]. Available: https://books.google.com/books?hl=en&lr=&id=_XHcAAAAQBAJ&oi=fnd&pg=PP1&dq=The+ethics+of+information&ots=fZkH8VOxSZ&sig=QhCILoi1OTYVGbnRvifDNM5lwHY
11. [11] L. Floridi and J. W. Sanders, "Entropy as evil in information ethics," Etica & Politica, Special Issue on Computer Ethics, vol. 1, no. 2, 1999.
12. [12] D. De Siqueira Braga, M. Niemann, B. Hellingrath, and F. B. De Lima Neto, "Survey on computational trust and reputation models," ACM Comput Surv, vol. 51, no. 5, Aug. 2018, doi: 10.1145/3236008. [DOI:10.1145/3236008]
13. [13] J. Wang et al., "A survey on trust evaluation based on machine learning," dl.acm.org, vol. 53, no. 5, Sep. 2020, doi: 10.1145/3408292. [DOI:10.1145/3408292]
14. [14] A. J. Bidgoly and B. T. Ladani, "Modeling and quantitative verification of trust systems against malicious attackers," Comput J, vol. 59, no. 7, pp. 1005-1027, 2016. [DOI:10.1093/comjnl/bxv108]
15. [15] F. Dini and G. Spagnolo, "Buying reputation on eBay: Do recent changes help?," International Journal of Electronic Business, vol. 7, no. 6, pp. 581-598, 2009. [DOI:10.1504/IJEB.2009.029048]
16. [16] A. Jøsang and J. Golbeck, "Challenges for robust trust and reputation systems," in Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo, France, 2009, vol. 5, no. 9.
17. [17] R. Kerr and R. Cohen, "Smart cheaters do prosper: defeating trust and reputation systems," in Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, 2009, pp. 993-1000.
18. [18] K. Arshad and K. Moessner, "Robust collaborative spectrum sensing based on beta reputation system," in 2011 Future Network & Mobile Summit, 2011, pp. 1-8.
19. [19] M. Momani, K. Aboura, and S. Challa, "RBATMWSN: recursive Bayesian approach to trust management in wireless sensor networks," in 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, 2007, pp. 347-352. [DOI:10.1109/ISSNIP.2007.4496868]
20. [20] P. Shi and H. Chen, "RASN: Resist on-off attack for wireless sensor networks," in Proceedings of the 2012 international conference on computer application and system modeling, 2012, pp. 690-693. [DOI:10.2991/iccasm.2012.175]
21. [21] D. Wang, T. Muller, Y. Liu, and J. Zhang, "Towards robust and effective trust management for security: A survey," in 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014. [DOI:10.1109/TrustCom.2014.65]
22. [22] O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad, "A survey on trust and reputation models for Web services: Single, composite, and communities," Decis Support Syst, vol. 74, pp. 121-134, 2015. [DOI:10.1016/j.dss.2015.04.009]
23. [23] N. Kandhoul, S. K. Dhurandher, and I. Woungang, "T_CAFE: a trust based security approach for opportunistic IoT," IET Communications, vol. 13, no. 20, 2019. [DOI:10.1049/iet-com.2019.0657]
24. [24] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, pp. 146-164, 2015. [DOI:10.1016/j.comnet.2014.11.008]
25. [25] X. Wang, L. Liu, and J. Su, "RLM: A general model for trust representation and aggregation," IEEE Trans Serv Comput, vol. 5, no. 1, pp. 131-143, 2010. [DOI:10.1109/TSC.2010.56]
26. [26] F. Ahmad, F. Kurugollu, A. Adnane, R. Hussain, and F. Hussain, "MARINE: Man-in-the-middle attack resistant trust model in connected vehicles," IEEE Internet Things J, vol. 7, no. 4, pp. 3310-3322, 2020. [DOI:10.1109/JIOT.2020.2967568]
27. [27] A. Vasudeva and M. Sood, "Survey on sybil attack defense mechanisms in wireless ad hoc networks," Journal of Network and Computer Applications, vol. 120, pp. 78-118, 2018. [DOI:10.1016/j.jnca.2018.07.006]
28. [28] Y. Ruan and A. Durresi, "A survey of trust management systems for online social communities-trust modeling, trust inference and attacks," Knowl Based Syst, vol. 106, 2016. [DOI:10.1016/j.knosys.2016.05.042]
29. [29] B. Khosravifar, J. Bentahar, M. Gomrokchi, and R. Alam, "CRM: An efficient trust and reputation model for agent computing," Knowl Based Syst, vol. 30, pp. 1-16, 2012. [DOI:10.1016/j.knosys.2011.01.004]
30. [30] B. Sun and D. Li, "A comprehensive trust-aware routing protocol with multi-attributes for WSNs," IEEE Access, vol. 6, pp. 4725-4741, 2017. [DOI:10.1109/ACCESS.2017.2786944]
31. [31] K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," ACM Computing Surveys (CSUR), vol. 42, no. 1, pp. 1-31, 2009. [DOI:10.1145/1592451.1592452]
32. [32] S. Vavilis, M. Petković, and N. Zannone, "A reference model for reputation systems," Decis Support Syst, vol. 61, pp. 147-154, 2014. [DOI:10.1016/j.dss.2014.02.002]
33. [33] F. G. Mármol and G. M. Pérez, "Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems," Comput Stand Interfaces, vol. 32, no. 4, pp. 185-196, 2010. [DOI:10.1016/j.csi.2010.01.003]
34. [34] Z. Noorian and M. Ulieru, "The state of the art in trust and reputation systems: a framework for comparison," Journal of theoretical and applied electronic commerce research, vol. 5, no. 2, pp. 97-117, 2010. [DOI:10.4067/S0718-18762010000200007]
35. [35] D. D. S. Braga, M. Niemann, B. Hellingrath, and F. B. D. L. Neto, "Survey on computational trust and reputation models," ACM Computing Surveys (CSUR), vol. 51, no. 2018. [DOI:10.1145/3236008]
36. [36] S. Chen, Y. Zhang, P. Liu, and J. Feng, "Coping with traitor attacks in reputation models for wireless sensor networks," in 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010, pp. 1-6. [DOI:10.1109/GLOCOM.2010.5684005]
37. [37] L. F. Perrone and S. C. Nelson, "A study of on-off attack models for wireless ad hoc networks," in 2006 1st Workshop on Operator-Assisted (Wireless Mesh) Community Networks, 2006, pp. 1-10. [DOI:10.1109/WOACN.2006.337180]
38. [38] D. Wang, T. Muller, J. Zhang, and Y. Liu, "Quantifying robustness of trust systems against collusive unfair rating attacks using information theory," in 24th International Joint Conference on Artificial Intelligence, 2015.
39. [39] D. Wang, T. Muller, A. A. Irissappane, J. Zhang, and Y. Liu, "Using Information Theory to Improve the Robustness of Trust Systems.," in AAMAS, 2015, pp. 791-799.
40. [40] J.-H. Cho, A. Swami, and R. Chen, "Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks," Journal of Network and Computer Applications, vol. 35, no. 3, pp. 1001-1012, 2012. [DOI:10.1016/j.jnca.2011.03.016]
41. [41] A. Aldini, "Formal approach to design and automatic verification of cooperation-based networks," IARIA Int J Adv Internet Technol, vol. 6, no. 1, p. 2, 2013.
42. [42] T. Muller, "Semantics of trust," in International Workshop on Formal Aspects in Security and Trust, 2010. [DOI:10.1007/978-3-642-19751-2_10]
43. [43] A. Herbon, and D. Tsadikovich. "An efficient entropy-based stopping rule for mitigating risk factors in supply nets." International Journal of Production Economics ,2023. [DOI:10.1016/j.ijpe.2023.108837]
44. [44] A. Khoshkbarchi and H. R. Shahriari, "Improving Agents Trust in Service-Oriented Environment Based on Entropy Structure and Information Ethics Principles," Int J Hum Comput Interact, 2022. [DOI:10.1080/10447318.2022.2115639]
45. [45] L. Floridi, The ethics of information. 2013. Accessed: Jun. 15, 2022. [DOI:10.1093/acprof:oso/9780199641321.001.0001]
46. [46] Floridi, L., & Sanders, J. W. (1999). "Entropy as evil" - Google Scholar.
47. https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Floridi%2C+L.%2C+%26+Sanders%2C+J.+W.+%281999%29.+Entropy+as+evil+in+information+ethics.+Etica+%26+Politica%2C+Special+Issue+on+Computer+Ethics%2C+1%282%29.&btnG= (accessed Jun. 15, 2022).
48. [47] P. Resnick and R. Zeckhauser, "Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system," in The Economics of the Internet and E-commerce, Emerald Group Publishing Limited, 2002.
49. [48] K. RahimiZadeh, and P. Kabiri. "Trust‐based routing method using a mobility‐based clustering approach in mobile ad hoc networks." Security and Communication Networks 7, no. 11, 2014. [DOI:10.1002/sec.872]
50. [49] A. Khoshkbarchi, and H.R. Shahriari. "Coping with unfair ratings in reputation systems based on learning approach." Enterprise Information Systems 11, no. 10 (2017): 1481-1499. [DOI:10.1080/17517575.2016.1221999]

ارسال نظر درباره این مقاله : نام کاربری یا پست الکترونیک شما:
CAPTCHA

ارسال پیام به نویسنده مسئول


بازنشر اطلاعات
Creative Commons License این مقاله تحت شرایط Creative Commons Attribution-NonCommercial 4.0 International License قابل بازنشر است.

کلیه حقوق این تارنما متعلق به فصل‌نامة علمی - پژوهشی پردازش علائم و داده‌ها است.