Spy Agents: Evaluating Trust in Remote Environments
نویسندگان
چکیده
We introduce the notion of spy agents and describe how they can be deployed within diverse network protocol architectures in order to perform high fidelity trust assessments in remote environments. The spy agent framework developed here consists of: a spy agent structural architecture that instruments and instantiates spy agents with appropriate content; a spy agent routing framework that fabricates and deploys the overall spying scenario with specialised spying routing protocols; and an evaluation entity that implements all the necessary security analysis mechanisms. Keywords—Spy agents, trust evaluation, surveillance
منابع مشابه
Preemptive mobile code protection using spy agents
This thesis introduces ‘spy agents’ as a new security paradigm for evaluating trust in remote hosts in mobile code scenarios. In this security paradigm, a spy agent, i.e. a mobile agent which circulates amongst a number of remote hosts, can employ a variety of techniques in order to both appear ‘normal’ and suggest to a malicious host that it can ‘misuse’ the agent’s data or code without being ...
متن کاملGTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملu DEVISING A TRUST MODEL FOR MULTI-AGENT INTERACTIONS USING CONFIDENCE AND REPUTATION
In open environments in which autonomous agents can break contracts, computational models of trust have an important role to play in determining who to interact with and how interactions unfold. To this end, we develop such a trust model, based on confidence and reputation, and show how it can be concretely applied, using fuzzy sets, to guide agents in evaluating past interactions and in establ...
متن کاملIMNTV-Identifying Malicious Nodes using Trust Value in Wireless Sensor Networks
Security is the major area of concern in communication channel. Security is very crucial in wireless sensor networks which are deployed in remote environments. Adversary can disrupt the communication within multi hop sensor networks by launching the attack. The common attacks which disrupt the communication of nodes are packet dropping, packet modification, packet fake routing, badmouthing atta...
متن کاملBootstrapping trust evaluations through stereotypes
In open, dynamic multi-agent systems, agents may form short-term ad-hoc groups, such as coalitions, in order to meet their goals. Trust and reputation are crucial concepts in these environments, as agents must rely on their peers to perform as expected, and learn to avoid untrustworthy partners. However, ad-hoc groups introduce issues which impede the formation of trust relationships. For examp...
متن کامل