基于博弈论的普适计算信任模型的安全问题研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
普适计算应用中移动实体的交互关系具有开放性、对等性和动态性等特点,需要基于信誉的信任模型生成和管理实体间的各种关系。来自不同组织的交互实体因资源受限等原因,从自身利益出发不执行信任模型的规定操作,从而引发信任模型的安全问题。针对这种“被动式攻击”,本文研究基于博弈论和机制设计的信任模型安全问题解决方法。在总结国内外已有研究成果的基础上,进行了多方面的深入研究和实验,取得了一些有意义的成果,扩充了信息安全经济学的研究范围和内容。具体研究内容包括以下几个方面:
     (1)针对推荐获取过程中由于中间实体丢包和推荐给予实体沉默造成的推荐获取率低的问题,提出了一种基于信用积分的激励机制对两种实体同时进行激励,全面保证推荐获取的成功。首先,研究了自私实体模型,并应用非合作推荐获取博弈对自私实体的合作条件进行了研究。其次,考虑存在“贪婪”实体要价情况下,通过合作的竞争选择博弈研究推荐请求实体如何利用多条路由间的竞争降低总体支付的信用积分。最后,模拟实验结果显示激励机制较为有效,可提高约15%-30%的成功率并降低合作者的要价。
     (2)针对推荐中存在欺骗的情况,从非合作博弈论角度提出了一种基于VCG机制的防护策略信任决策机制。该机制可应用于连续或者二元信任值信任模型,激励实体进行真实汇报。通过将信任决策看作社会选择过程,证明提出的信任机制是一个VCG机制,从而保证实体只有在真实汇报时才能实现利益的最大化。进一步,提出了基于WMC算法的加权VCG信任机制用于实现更精确的信任预测,并对支付特性进行了研究。
     (3)为了探寻更多的防护策略信任机制,首先在提出一般信任决策机制的基础上,研究了激励相容机制的特性,使满足社会选择函数特性要求的信任模型可被构造成为真实信任机制。并以基于VCG的信任机制为例,具体说明如何从信任模型构造出具有激励相容机制的信任机制。其次,研究了信任等级和推荐权值对推荐获取成本的影响。最后,模拟实验结果表明提出的信任机制可以有效应对各种积极偏差、消极偏差和策略性欺骗。
     (4)针对推荐中存在团体欺骗的情况,从合作博弈论的角度提出了一种团体防护策略机制,将与信任值相关的风险损失值汇报看作赔偿的声明,超模支付赔偿博弈的解看作实际赔偿。首先,提出了与汇报损失值相关无关两种形式的团体赔偿总额函数,证明其超模性并证明了超模赔偿支付博弈的性质。在选择博弈的基础上,构造了对应的间接显示机制和直接显示的赔偿声明机制,证明了该机制满足团体防护策略要求。其次,选取Shapley值作为实际的赔偿支付方案,证明其满足单调交叉性,并给出了赔偿声明机制的结果团体算法。模拟实验结果表明当采用与损失值相关的团体赔偿总额函数,尽管其具有超模性,但机制并不具有防护策略特性。采用与损失值无关的团体赔偿总额函数时,赔偿声明机制满足团体防护策略特性,最后,总结和举例团体防护策略机制中谎报者所有的可能结果。
Interactions between mobile entities in pervasive computing have properties suchas open, peer to peer and dynamic etc and therefore it is needed to adopt trust models togenerate and manage various relations between entities. However, because entities arefrom different organizations and are resource limited, they will not take the predefinedactions of trust models according to their own benefits. Hence the security problemsof trust models occur. For such”passive attack”, we study the solution based on gametheory and mechanism design to solve the security problems of trust models in thisthesis. Based on summarizing exist research results in home and abroad, we studyfrom several perspectives and do simulations in details. The obtained results in thisthesis enlarge the scope and contend of the disciple called Economics of InformationSecurity. The concrete research content includes:
     (1) For the problem of low recommendation acquisition rate in the recommenda-tion acquisition process due to the dropping of middle entities and duck of recommen-dation rendering entity, we propose a utility based incentive mechanism to encouragethese two kinds of entities to guarantee the full success of recommendation acquisition.First, we study the selfish model and the cooperation condition of selfish entities utiliz-ing a non cooperative game called Recommendation Acquisition Game. Then considerthe situation where asking prices are proposed by greedy entities, based on a coopera-tive game called Competition and Section Game, we study how the requestor lowers thetotal paid cost utilizing the competition between several routings. Finally, the simula-tion results show that the proposed incentive mechanism is effective and increase about15% to 30% success rate and lowers the asking prices of cooperators.
     (2) For the cheating in the recommendation, we proposed a strategy-proof trustmechanism based on VCG mechanism from the perspective of non cooperative game. This mechanism can be adopted by continuous and binary trust value models to stim-ulate truthful reportings. By considering the trust decision as a social section process,we prove that the proposed trust mechanism is a VCG mechanism so that the entitycan only maximize its utility when truthfully reports. Furthermore, utilizing WMC al-gorithm, we propose a weighted VCG mechanism to predict trust more accurately andmoreover, we study the characteristic of payment.
     (3) For discovering more strategy-proof trust mechanisms, based on the proposedgeneral trust mechanism, we study the characteristic properties of incentive compatibleso that all the trust models satisfying character requirement of social choice functioncan be constructed to truthful trust mechanisms. Taking the VCG trust mechanism asexample, we explain in details how to construct the incentive compatible trust mecha-nisms. Moreover, we study how the trust level and recommendation weight in?uencethe recommendation acquisition cost. Finally, simulation results show that the proposedtrust mechanism can deal with all kinds of positive and negative deviations.
     (4) For the problem of group cheating in recommendation reporting, we proposed agroup strategy-proof mechanism from the perspective of cooperative game. The mech-anism considers the risk cost value relating to the trust value as a declared compensationand treats the solution of supermodular compensation payment game as paid compen-sation. First, we proposed two kinds of collective compensation functions in which oneis relates to the reported cost and one is not and prove the supermodularity of these twofunctions and the property of supermodular compensation payment game. Based on theselection game, we construct the corresponding indirect and direct mechanism whichis called Claiming Compensation Mechanism and prove that this mechanism is groupstrategy-proof. Furthermore, we take the Shapley value as the actual compensationpayment scheme and prove that it satisfies the property called cross-monotonicity. Analgorithm in generating the outcome coalition is given. Simulation results show that forthe collective cost function which is related to the cost value, although it is supermodu-lar, the corresponding mechanism is not strategy-proof. By adopting the collective costfunction which is not related to the cost value, the Claiming Compensation Mechanismis group strategy-proof. Finally, we summarize and demonstrate all possible results of the lying reporter.
引文
[1] M. Weiser. The computer for the twenty-first century. Scientific American, 265(3):94–104,1991.
    [2]徐光佑,史元春和谢伟凯.普适计算.计算机学报, 26(9):1042–1050, 2003.
    [3]郑增威和吴朝晖.普适计算综述.计算机科学, 30(004):18–22, 2003.
    [4] L. Rudolph. Project Oxygen: pervasive, human-centric computing–an initial experience. InAdvanced Information Systems Engineering, pages 1–12. Springer, 2001.
    [5] http://aire.csail.mit.edu/.
    [6] D. Garlan, D. Siewiorek, A. Smailagic, and P. Steenkiste. Project Aura: Toward distraction-free pervasive computing. IEEE Pervasive computing, pages 22–31, 2002.
    [7] B. Johanson, A. Fox, and T. Winograd. The Interactive Workspaces Project: Experienceswith ubiquitous computing rooms. IEEE pervasive computing, pages 67–74, 2002.
    [8] http://endeavour.cs.berkeley.edu/.
    [9] M. Esler, J. Hightower, T. Anderson, and G. Borriello. Next century challenges: data-centricnetworking for invisible computing: the Portolano project at the University of Washington.In Proceedings of the 5th annual ACM/IEEE international conference on Mobile computingand networking, pages 256–262. ACM, 1999.
    [10] M. Roman, C. Hess, R. Cerqueira, R.H. Campbell, and K. Nahrstedt. Gaia: A middlewareinfrastructure to enable active spaces. In IEEE Pervasive Computing. Citeseer, 2002.
    [11] V. Stanford, J. Garofolo, O. Galibert, M. Michel, and C. Laprun. The NIST smart space andmeeting room projects: Signals, acquisition annotation, and metrics. In Acoustics, Speech,and Signal Processing, 2003. Proceedings.(ICASSP’03). 2003 IEEE International Confer-ence on, volume 4. IEEE, 2003.
    [12] http://www.research.ibm.com/natural/dreamspace/.
    [13] B. Brumitt, B. Meyers, J. Krumm, A. Kern, and S. Shafer. Easyliving: Technologies forintelligent environments. In Handheld and Ubiquitous Computing, pages 97–119. Springer,2000.
    [14] M. Haque and S.I. Ahamed. Security in pervasive computing: Current status and open issues.International Journal of Network Security, 3(3):203–214, 2006.
    [15] S. Marti and H. Garcia-Molina. Taxonomy of trust: Categorizing P2P reputation systems.Computer Networks, 50(4):472–484, 2006.103
    [16] A. Jusang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online serviceprovision. Decision Support Systems, 43(2):618–644, 2007.
    [17] S.D. Ramchurn, D. Huynh, and N.R. Jennings. Trust in multi-agent systems. The KnowledgeEngineering Review, 19(01):1–25, 2004.
    [18] M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The role of trust management indistributed systems security. Secure Internet Programming, pages 185–210, 1999.
    [19] D.H. McKnight and N.L. Chervany. The meanings of trust. 1996.
    [20] A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. In hicss, page6007. Published by the IEEE Computer Society, 2000.
    [21] N. Shankar and W. Arbaugh. On trust for ubiquitous computing. In Workshop on Security inUbiquitous Computing, UBICOMP. Citeseer, 2002.
    [22]李小勇和桂小林.大规模分布式环境下动态信任模型研究.软件学报, 18(6):1510–1521,2007.
    [23]谭振华,王兴伟,程维,常桂然和朱志良.基于多维历史向量的P2P分布式信任评价模型.计算机学报, (009):1725–1735, 2010.
    [24]田立勤和林闯.基于双滑动窗口的用户行为信任评估机制.清华大学学报:自然科学版, (005):763–767, 2010.
    [25]罗俊海和范明钰.基于置信度的MANETs主观信任管理模型.计算机研究与发展,47(3), 2010.
    [26]陈超,王汝传和张琳.一种基于开放式网络环境的模糊主观信任模型研究.计算机研究与发展, 47(3), 2010.
    [27]郭亚军,何炎祥,徐芬和王琴.普适计算的信任管理.计算机工程, 2007.
    [28] M.M. Haque and S.I. Ahamed. An omnipresent formal trust model (FTM) for pervasivecomputing environment. 2007.
    [29] M. Sharmin, S. Ahmed, and S.I. Ahamed. An adaptive lightweight trust reliant secure re-source discovery for pervasive computing environments. In Pervasive Computing and Com-munications, 2006. PerCom 2006. Fourth Annual IEEE International Conference on, pages6–263. IEEE, 2006.
    [30] S.I. Ahamed, M. Monjur, and M.S. Islam. CCTB: Context correlation for trust bootstrappingin pervasive environment. In Intelligent Environments, 2008 IET 4th International Confer-ence on, pages 1–8. IET, 2008.
    [31]郭亚军,何炎祥和严慧芳.一种结构化的普适计算动态信任模型.武汉理工大学学报(交通科学与工程版), 31(5), 2007.
    [32] R. He, J. Niu, and G. Zhang. CBTM: A trust model with uncertainty quantification andreasoning for pervasive computing. Parallel and Distributed Processing and Applications,pages 541–552, 2005.
    [33] D. Quercia, S. Hailes, and L. Capra. Lightweight distributed trust propagation. In Data Min-ing, 2007. ICDM 2007. Seventh IEEE International Conference on, pages 282–291. IEEE,2008.
    [34] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. InProceedings of the 13th international conference on World Wide Web, pages 403–412. ACM,2004.
    [35] C.N. Ziegler and G. Lausen. Spreading activation models for trust propagation. In e-Technology, e-Commerce and e-Service, 2004. EEE’04. 2004 IEEE International Conferenceon, pages 83–97. IEEE, 2004.
    [36] D. Quercia, S. Hailes, and L. Capra. B-trust: Bayesian trust framework for pervasive com-puting. Trust Management, pages 298–312, 2006.
    [37] D. Quercia, S. Hailes, and L. Capra. TRULLO-local trust bootstrapping for ubiquitous de-vices. In Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007.Fourth Annual International Conference on, pages 1–9. IEEE, 2008.
    [38]王勇,李明,崔灵果,胡晶晶和张龙飞.开放式网络环境下的上下文敏感的信任管理.北京理工大学学报, 28(3), 2008.
    [39] J. Douceur. The sybil attack. Peer-to-peer Systems, pages 251–260, 2002.
    [40] J.M. Seigneur and C. Jensen. The role of identity in pervasive computational trust. Privacy,Security and Trust within the Context of Pervasive Computing, pages 65–75, 2005.
    [41]郭亚军,王亮,洪帆和韩兰胜.基于信任的普适计算的动态授权模型.华中科技大学学报(自然科学版), 35(8), 2007.
    [42]郭亚军和洪帆.基于信任的普适计算安全机制.计算机工程, 32(8), 2006.
    [43]王小英,赵海,林涛,张文波和尹震宇.基于信任的普适计算服务选择模型.通信学报,26(005):1–8, 2005.
    [44]赵曦滨,游之洋和赵志峰.基于MANET可用性的信任度量模型.通信学报, 31(3), 2010.
    [45]陈贞翔,葛连升,王海洋,黄先芝和林金娇.普适环境中基于信任的服务评价和选择模型.软件学报, 17:200–210, 2006.
    [46]贾宗璞和冯倩倩.普适计算的隐私保护协议.计算机系统应用, (010):211–213, 2010.
    [47] M. Srivatsa, L. Xiong, and L. Liu. TrustGuard: countering vulnerabilities in reputation man-agement for decentralized overlay networks. In Proceedings of the 14th international confer-ence on World Wide Web, pages 422–431. ACM, 2005.
    [32] R. He, J. Niu, and G. Zhang. CBTM: A trust model with uncertainty quantification andreasoning for pervasive computing. Parallel and Distributed Processing and Applications,pages 541–552, 2005.
    [33] D. Quercia, S. Hailes, and L. Capra. Lightweight distributed trust propagation. In Data Min-ing, 2007. ICDM 2007. Seventh IEEE International Conference on, pages 282–291. IEEE,2008.
    [34] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. InProceedings of the 13th international conference on World Wide Web, pages 403–412. ACM,2004.
    [35] C.N. Ziegler and G. Lausen. Spreading activation models for trust propagation. In e-Technology, e-Commerce and e-Service, 2004. EEE’04. 2004 IEEE International Conferenceon, pages 83–97. IEEE, 2004.
    [36] D. Quercia, S. Hailes, and L. Capra. B-trust: Bayesian trust framework for pervasive com-puting. Trust Management, pages 298–312, 2006.
    [37] D. Quercia, S. Hailes, and L. Capra. TRULLO-local trust bootstrapping for ubiquitous de-vices. In Mobile and Ubiquitous Systems: Networking & Services, 2007. MobiQuitous 2007.Fourth Annual International Conference on, pages 1–9. IEEE, 2008.
    [38]王勇,李明,崔灵果,胡晶晶和张龙飞.开放式网络环境下的上下文敏感的信任管理.北京理工大学学报, 28(3), 2008.
    [39] J. Douceur. The sybil attack. Peer-to-peer Systems, pages 251–260, 2002.
    [40] J.M. Seigneur and C. Jensen. The role of identity in pervasive computational trust. Privacy,Security and Trust within the Context of Pervasive Computing, pages 65–75, 2005.
    [41]郭亚军,王亮,洪帆和韩兰胜.基于信任的普适计算的动态授权模型.华中科技大学学报(自然科学版), 35(8), 2007.
    [42]郭亚军和洪帆.基于信任的普适计算安全机制.计算机工程, 32(8), 2006.
    [43]王小英,赵海,林涛,张文波和尹震宇.基于信任的普适计算服务选择模型.通信学报,26(005):1–8, 2005.
    [44]赵曦滨,游之洋和赵志峰.基于MANET可用性的信任度量模型.通信学报, 31(3), 2010.
    [45]陈贞翔,葛连升,王海洋,黄先芝和林金娇.普适环境中基于信任的服务评价和选择模型.软件学报, 17:200–210, 2006.
    [46]贾宗璞和冯倩倩.普适计算的隐私保护协议.计算机系统应用, (010):211–213, 2010.
    [47] M. Srivatsa, L. Xiong, and L. Liu. TrustGuard: countering vulnerabilities in reputation man-agement for decentralized overlay networks. In Proceedings of the 14th international confer-ence on World Wide Web, pages 422–431. ACM, 2005.
    [62]桂春梅,蹇强,王怀民和吴泉源.虚拟计算环境中基于重复博弈的惩罚激励机制.软件学报, 21(12):3042–3055, 2010.
    [63]罗俊海和范明钰.基于博弈的MANETs信任模型研究.计算机研究与发展, 45(10),2008.
    [64] P. Resnick and R. Zeckhauser. Trust among strangers in Internet transactions: Empiricalanalysis of eBay’s reputation system. Advances in Applied Microeconomics: A ResearchAnnual, 11:127–157, 2002.
    [65] E.J. Friedman and P. Resnick. The social cost of cheap pseudonyms. Ann Arbor, 1001:48109–1092, 1999.
    [66] R. Anderson and T. Moore. The economics of information security. Science, 314(5799):610,2006.
    [67] E. Allman. The economics of spam. Queue, 1(9):80, 2003.
    [68] A. Akella, S. Seshan, R. Karp, S. Shenker, and C. Papadimitriou. Selfish behavior and stabilityof the internet:: a game-theoretic analysis of TCP. In Proceedings of the 2002 conference onApplications, technologies, architectures, and protocols for computer communications, pages117–130. ACM, 2002.
    [69] T. Roughgarden and E′. Tardos. How bad is selfish routing? Journal of the ACM (JACM),49(2):259, 2002.
    [70] E. Anshelevich, A. Dasgupta, J. Kleinberg, E. Tardos, T. Wexler, and T. Roughgarden. Theprice of stability for network design with fair cost allocation. In Foundations of ComputerScience, 2004. Proceedings. 45th Annual IEEE Symposium on, pages 295–304. IEEE, 2004.
    [71] M.E.J. Newman. The structure and function of complex networks. SIAM review, 45(2):167–256, 2003.
    [72] R. Albert, H. Jeong, and A.L. Baraba′si. Error and attack tolerance of complex networks.Nature, 406(6794):378–382, 2000.
    [73] N. Nisan. Algorithmic game theory. Cambridge University Press, 2007.
    [74] T. Roughgarden. Algorithmic game theory. Communications of the ACM, 53(7):78–86, 2010.
    [75] R.B. Myerson. Game Theory: Analysis of Con?ict. Boston, USA, 1991.
    [76] G. Owen. Game Theory. Academic Press, 1982.
    [77] D. Fudenberg and J. Tirole. Game theory. 1991, 1991.
    [78]罗云峰.博弈论教程.清华大学出版社, 2007.
    [79] E. Maskin and T. Sjostrom. Implementation theory. Handbook of social Choice and Welfare,1:237–288, 2002.
    [80] S.I. Ahamed, M.M. Haque, and N. Talukder. Service sharing with trust in pervasive environ-ment: now it’s time to break the jinx. In Proceedings of the 2008 ACM symposium on Appliedcomputing, pages 1622–1628. ACM New York, NY, USA, 2008.
    [81] Y.F. Wang, Y. Hori, and K. Sakurai. Characterizing Economic and Social Properties of Trustand Reputation Systems in P2P Environment. Journal of Computer Science and Technology,23(1):129–140, 2008.
    [82] MA Razzaque, S. Dobson, and P. Nixon. Cross-Layer Self Routing: A Self-Managed Rout-ing Approach for MANETs. In Networking and Communications, 2008. WIMOB’08. IEEEInternational Conference on Wireless and Mobile Computing,, pages 284–290, 2008.
    [83] L. Buttyan and J.P. Hubaux. Enforcing service availability in mobile ad-hoc WANs. In Mobileand Ad Hoc Networking and Computing, 2000. MobiHOC. 2000 First Annual Workshop on,pages 87–96, 2000.
    [84] L. Buttyan and J.P. Hubaux. Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. 2001.
    [85] S. Zhong, J. Chen, and Y.R. Yang. Sprite: A simple, cheat-proof, credit-based system formobile ad-hoc networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of theIEEE Computer and Communications. IEEE Societies, volume 3, pages 1987–1997. IEEE,2003.
    [86] Y. Yoo, S. Ahn, and D.P. Agrawal. A credit-payment scheme for packet forwarding fairnessin mobile ad hoc networks. In Communications, 2005. ICC 2005. 2005 IEEE InternationalConference on, volume 5, pages 3005–3009. IEEE, 2005.
    [87] H. Yang, J. Shu, X. Meng, and S. Lu. SCAN: self-organized network-layer security in mobilead hoc networks. Selected Areas in Communications, IEEE Journal on, 24(2):261–273, 2006.
    [88] A. Mawji and H. Hassanein. A utility-based incentive scheme for p2p file sharing in mobilead hoc networks. In Communications, 2008. ICC’08. IEEE International Conference on,pages 2248–2252. IEEE, 2008.
    [89] S. Buchegger and J.Y. Le Boudec. Performance analysis of the CONFIDANT protocol. InProceedings of the 3rd ACM international symposium on Mobile ad hoc networking & com-puting, pages 226–236. ACM, 2002.
    [90] P. Michiardi and R. Molva. CORE: A Collaborative Reputation Mechanism to enforce nodecooperation in Mobile Ad hoc Networks. In Advanced Communications and Multimedia Se-curity: IFIP TC6/TC11 Sixth Joint Working Conference on Communications and MultimediaSecurity, September 26-27, 2002, Portorozˇ, Slovenia. Kluwer Academic Publishers, 2002.
    [91] Q. He, D. Wu, and P. Khosla. SORI: A Secure and Objective Reputation-based IncentiveScheme for Ad-hoc Networks. In IEEE Wireless Communications and Networking Confer-ence (WCNC 2004), Atlanta, GA, USA, 2004.
    [92] V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, and R.R. Rao. Cooperation in wireless adhoc networks. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEEComputer and Communications. IEEE Societies, volume 2, pages 808–817. IEEE, 2003.
    [93] A. Urpi, M. Bonuccelli, and S. Giordano. Modeling cooperation in mobile ad hoc networks:a formal description of selfishness. In Proceedings of WiOpt, volume 3. Citeseer, 2003.
    [94] M. Fe′legyha′zi, J.P. Hubaux, and L. Buttya′n. Nash Equilibria of Packet Forwarding Strategiesin Wireless Ad Hoc Networks. IEEE TRANSACTIONS ON MOBILE COMPUTING, pages463–476, 2006.
    [95] Z. Han and H.V. Poor. Coalition Games with Cooperative Transmission: A Cure for theCurse of Boundary Nodes in Selfish Packet-Forwarding Wireless Networks. In Modelingand Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops, 2007. WiOpt2007. 5th International Symposium on, pages 1–8, 2007.
    [96] L. Anderegg and S. Eidenbenz. Ad hoc-VCG: a truthful and cost-efficient routing protocol formobile ad hoc networks with selfish agents. In Proceedings of the 9th annual internationalconference on Mobile computing and networking, pages 245–259. ACM, 2003.
    [97] R. Barr. JiST-Java in Simulation Time Users Guide. 2004.
    [98] R. Barr. SWANS-Scalable Wireless Ad hoc Network Simulator User Guide. Retrieved March,2006.
    [99] R. Barr. Swans-scalable wireless ad hoc network simulator, 2004.
    [100] L.M. Feeney. An Energy Consumption Model for Performance Analysis of Routing Protocolsfor Mobile Ad Hoc Networks. Mobile Networks and Applications, 6(3):239–249, 2001.
    [101] M. Satyanarayanan. Pervasive computing: Vision and challenges. IEEE [see also IEEEWireless Communications] Personal Communications, 8(4):10–17, 2001.
    [102] M. Weiser. The Computer for the 21 st Century. ACM SIGMOBILE Mobile Computing andCommunications Review, 3(3):3–11, 1999.
    [103] P. A. Nixon and S. Terzis. Trust Management. In Lecture Notes in Computer Science, volume2692. Springer-Verlag, 2003.
    [104] S.I. Ahamed and M. Sharmin. A trust-based secure service discovery (TSSD) model forpervasive computing. Computer Communications, 31(18):4281–4293, 2008.
    [105] MM Haque and SI Ahamed. An omnipresent formal trust model (FTM) for pervasive com-puting environment. In Computer Software and Applications Conference, 2007. COMPSAC2007. 31st Annual International, volume 1, 2007.
    [106] Y. Yoo and D.P. Agrawal. Why does it pay to be selfish in a MANET? IEEE WirelessCommunications, 13(6):87–97, 2006.
    [107] B. Yu and M.P. Singh. Detecting deception in reputation management. In Proceedings of thesecond international joint conference on Autonomous agents and multiagent systems, pages73–80. ACM New York, NY, USA, 2003.
    [108] J. Liu and V. Issarny. An incentive compatible reputation mechanism for ubiquitous comput-ing environments. International Journal of Information Security, 6(5):297–311, 2007.
    [109] J. Chang, H. Wang, G. Yin, and Y. Tang. ICRep: An Incentive Compatible Reputation Mech-anism for P2P Systems. Lecture Notes in Computer Science, 4867:371, 2007.
    [110] E.H. Gerding, K. Larson, and N.R. Jennings. Mechanism Design for Eliciting ProbabilisticEstimates from Multiple Suppliers with Unknown Costs and Limited Precision. In EleventhInternational Workshop on Agent-Mediated Electronic Commerce, pages 111–124. Springer,2009.
    [111] Z. Abrams, R. McGrew, and S. Plotkin. Keeping peers honest in eigentrust. In 2nd Workshopon the Economics of Peer-to-Peer Systems, 2004.
    [112] R. Jurca and B. Faltings. An incentive compatible reputation mechanism. In IEEE Interna-tional Conference on E-Commerce, 2003. CEC 2003, pages 285–292, 2003.
    [113] H. Sun and J. Song. Strategy proof trust management in wireless ad hoc network. In Electricaland Computer Engineering, 2004. Canadian Conference on, volume 3, 2004.
    [114] N. Nisan and A. Ronen. Algorithmic mechanism design (extended abstract). In Proceedingsof the thirty-first annual ACM symposium on Theory of computing, pages 129–140. ACMNew York, NY, USA, 1999.
    [115] N. Littlestone and MK Warmuth. The weighted majority algorithm. Information and Com-putation, 108(2):212–261, 1994.
    [116] A. Mas-Colell, M.D. Whinston, and J.R. Green. Microeconomic theory. Oxford universitypress New York, 1995.
    [117] A. Mu’Alem and N. Nisan. Truthful approximation mechanisms for restricted combinatorialauctions. Games and Economic Behavior, 64(2):612–631, 2008.
    [118] K. Roberts. The characterization of implementable choice rules. Aggregation and Revelationof Preferences, pages 321–348, 1979.
    [119] R. Lavi, A. Mu alem, and N. Nisan. Towards a characterization of truthful combinatorialauctions. In Annual Symposium on Foundations of Computer Science, volume 44, pages574–583. IEEE Computer Society Press, 2003.
    [120] M. Saks and L. Yu. Weak monotonicity suffices for truthfulness on convex domains. InProceedings of the 6th ACM conference on Electronic commerce, pages 286–293. ACM NewYork, NY, USA, 2005.
    [121] N. Nisan and A. Sen. Weak monotonicity characterizes deterministic dominant-strategy im-plementation. Econometrica, pages 1109–1132, 2006.
    [122] Y. Yang, Y.L. Sun, S. Kay, and Q. Yang. Defending online reputation systems against col-laborative unfair raters through signal modeling and trust. In Proceedings of the 2009 ACMsymposium on Applied Computing, pages 1308–1315. ACM, 2009.
    [123] R. Jurca and B. Faltings. Mechanisms for making crowds truthful. Journal of ArtificialIntelligence Research, 34(1):209–253, 2009.
    [124] S. Goel, D.M. Reeves, and D.M. Pennock. Collective revelation: A mechanism for self-verified, weighted, and truthful predictions. In Proceedings of the tenth ACM conference onElectronic commerce, pages 265–274. ACM, 2009.
    [125] N. Lambert and Y. Shoham. Truthful surveys. Internet and Network Economics, pages 154–165, 2008.
    [126] H. Moulin and S. Shenker. Strategyproof sharing of submodular costs: budget balance versusefficiency. Economic Theory, 18(3):511–533, 2001.
    [127] Y. Sprumont. Population monotonic allocation schemes for cooperative games with transfer-able utility. Games and Economic Behavior, 2(4):378–394, 1990.
    [128] R.J. Aumann.”Acceptable points in general cooperative n-person games. Topics in mathe-matical economics and game theory: essays in honor of Robert J. Aumann, 23:1, 1999.
    [129] P. Dasgupta, P. Hammond, and E. Maskin. The implementation of social choice rules: Somegeneral results on incentive compatibility. The Review of Economic Studies, 46(2):185–216,1979.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700