By Topic

A Probabilistic-Based Trust Evaluation Model Using Hidden Markov Models and Bonus Malus Systems

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Ouyang, K.X. ; Broadband Wireless & Internetworking Res. Lab., Univ. of Ottawa, Ottawa, ON, Canada ; Vaidya, B. ; Makrakis, D.

In the paper, the uncertainty of trust is transformed into a probability vector denoting the probability distribution over possible trust states that are hidden from observation but determined by an entity's expected performance. We suggest the use of Hidden Markov Models (HMMs) for estimating the unknown probability distributions in peer-to-peer interactions. HMMs allow us to explicitly consider an entity's unobserved trustworthiness that influences it's occurrences of behavioral patterns. The proposed hidden Markov processes are associated with a specified Bonus-Malus System (BMS) that is interpreted as a Markov chain with constant transition matrix and is used to simplify the structure of model and to reduce the computational complexity of parameter estimations in HMMs. The maximum likelihood estimators of the unknown HMM parameters are obtained using EM algorithm. An application of the model in the scenario of detection of probabilistic packet-drop attack has been investigated. The simulations demonstrate that the approach is capable of accurately estimating the (hidden) trust states probability distribution as well as the expected performance for the entities that have different observed behavioral patterns.

Published in:

Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on

Date of Conference:

9-11 Oct. 2011