Skip to main content

Trust and Reputation for Information Exchange in Critical Infrastructures

  • Conference paper
Critical Information Infrastructures Security (CRITIS 2010)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6712))

Abstract

Today’s Critical Infrastructures (CI) are highly interdependent in order to deliver their services with the required level of quality and availability. Information exchange among interdependent CI plays a major role in CI protection and risk prevention for interconnected CI were cascading effects might occur because of their interdependencies. This paper addresses the problem of the quality of information exchanged among interconnected CI and also the quality of the relationship in terms of trust and security. The use of trust and reputation indicators associated with the information exchange is the proposed solution.

The proposed solution is being applied to information exchange among interconnected CI in scope of the European FP7 MICIE project, in order to improve information accuracy and to protect each CI from using inconsistent and non trustable information about critical events.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clinton, W.J.: Presidential decision directive 63 (May 1998)

    Google Scholar 

  2. Micie: Micie - tool for systemic risk analysis and secure mediation of data ex-changed across linked ci information infrastructures. FP7-ICT-SEC-2007.1.7 – 225353 – Annex I – “Descrition of Work” (2008)

    Google Scholar 

  3. Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semantics: Science (January 2007)

    Google Scholar 

  4. Mui, L., Mohtashemi, M.: A computational model of trust and reputation. In: 35th Hawaii International Conference on System Science, HICSS (2002)

    Google Scholar 

  5. Chen, J., Lu, H., Bruda, S.: Analysis of feedbacks and ratings on trust merit for peer-to-peer systems. In: International Conference on E-Business and Information System Security, EBISS 2009, pp. 1–5 (2009)

    Google Scholar 

  6. Chen, S., Zhang, Y., Yang, G.: Trust and reputation algorithms for unstructured p2p networks. In: International Symposium on Computer Network and Multimedia Technology, CNMT 2009, pp. 1–4 (2009)

    Google Scholar 

  7. Spitz, S., Tuchelmann, Y.: A trust model considering the aspects of time. In: Computer and Electrical Engineering, ICCEE 2009, vol. 1, pp. 550–554 (2009)

    Google Scholar 

  8. Ganeriwal, S., Balzano, L., Srivastava, M.: Reputation-based framework for high integrity sensor networks. Transactions on Sensor Networks, TOSN (2008)

    Google Scholar 

  9. Momani, M., Challa, S., Alhmouz, R.: Bnwsn: Bayesian network trust model for wireless sensor networks. In: Mosharaka International Conference on Communications, Computers and Applications, MIC-CCA 2008, pp. 110–115 (2008)

    Google Scholar 

  10. Zahariadis, T., Ladis, E., Leligou, H., Trakadas, P., Tselikis, C., Papadopoulos, K.: Trust models for sensor networks. In: 50th International Symposium on ELMAR 2008, vol. 2, pp. 511–514 (September 2008)

    Google Scholar 

  11. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  12. Malik, Z., Bouguettaya, A.: Reputation bootstrapping for trust establishment among web services. IEEE Internet Computing 13(1), 40–47 (2009)

    Article  Google Scholar 

  13. Ray, I., Ray, I., Chakraborty, S.: An interoperable context sensitive model of trust. Journal of Intelligent Information Systems (January 2009)

    Google Scholar 

  14. Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review (January 2005)

    Google Scholar 

  15. Hussain, F., Chang, E., Hussain, O.: State of the art review of the existing bayesian-network based approaches to trust and reputation computation. In: Internet Monitoring and Protection, ICIMP 2007, p. 26 (2007)

    Google Scholar 

  16. Huynh, T., Jennings, N., Shadbolt, N.: An integrated trust and reputation model for open multi-agent systems. Journal of Autonomous Agents and Multi-Agent Systems 13(2), 119–154 (2006)

    Article  Google Scholar 

  17. Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference (January 2002)

    Google Scholar 

  18. Teacy, W., Patel, J., Jennings, N., Luck, M.: Travos: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems 12(2), 183–198 (2006)

    Article  Google Scholar 

  19. Aime, M., Lioy, A.: Incremental trust: building trust from past experience. In: World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 603–608 (2005)

    Google Scholar 

  20. Ludwig, S., Pulimi, V., Hnativ, A.: Fuzzy approach for the evaluation of trust and reputation of services. In: IEEE International Conference on Fuzzy Systems, FUZZ-IEEE 2009, pp. 115–120 (August 2009)

    Google Scholar 

  21. Crutial: Crutial project web site (2008), http://crutial.cesiricerca.it

  22. IRRIS: Irriis project web site (2008), http://www.irriis.org/

  23. Capodieci, P., et al.: Improving resilience of interdependent critical infrastructures via an on-line alerting system. In: COMPENG 2010 (2010)

    Google Scholar 

  24. Caldeira, F., et al.: Secure mediation gateway architecture enabling the communication among critical infrastructures. In: Future Network and MobileSummit 2010 Conference (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Christos Xenakis Stephen Wolthusen

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Caldeira, F., Monteiro, E., Simões, P. (2011). Trust and Reputation for Information Exchange in Critical Infrastructures. In: Xenakis, C., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2010. Lecture Notes in Computer Science, vol 6712. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-21694-7_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-21694-7_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-21693-0

  • Online ISBN: 978-3-642-21694-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics