Title :
A Probabilistic-Based Trust Evaluation Model Using Hidden Markov Models and Bonus Malus Systems
Author :
Ouyang, Kevin Xuhua ; Vaidya, Binod ; Makrakis, Dimitrios
Author_Institution :
Broadband Wireless & Internetworking Res. Lab., Univ. of Ottawa, Ottawa, ON, Canada
Abstract :
In the paper, the uncertainty of trust is transformed into a probability vector denoting the probability distribution over possible trust states that are hidden from observation but determined by an entity´s expected performance. We suggest the use of Hidden Markov Models (HMMs) for estimating the unknown probability distributions in peer-to-peer interactions. HMMs allow us to explicitly consider an entity´s unobserved trustworthiness that influences it´s occurrences of behavioral patterns. The proposed hidden Markov processes are associated with a specified Bonus-Malus System (BMS) that is interpreted as a Markov chain with constant transition matrix and is used to simplify the structure of model and to reduce the computational complexity of parameter estimations in HMMs. The maximum likelihood estimators of the unknown HMM parameters are obtained using EM algorithm. An application of the model in the scenario of detection of probabilistic packet-drop attack has been investigated. The simulations demonstrate that the approach is capable of accurately estimating the (hidden) trust states probability distribution as well as the expected performance for the entities that have different observed behavioral patterns.
Keywords :
computational complexity; computer crime; hidden Markov models; matrix algebra; maximum likelihood estimation; peer-to-peer computing; statistical distributions; trusted computing; Bonus-Malus system; EM algorithm; Markov chain; behavioral pattern; computational complexity; constant transition matrix; hidden Markov model; maximum likelihood estimator; parameter estimation; peer-to-peer interaction; probabilistic packet-drop attack detection; probabilistic-based trust evaluation model; probability distribution; probability vector; Computational modeling; Hidden Markov models; Markov processes; Mathematical model; Parameter estimation; Probability distribution; Vectors;
Conference_Titel :
Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on
Conference_Location :
Boston, MA
Print_ISBN :
978-1-4577-1931-8
DOI :
10.1109/PASSAT/SocialCom.2011.35