Logo PTI Logo FedCSIS

Proceedings of the 19th Conference on Computer Science and Intelligence Systems (FedCSIS)

Annals of Computer Science and Information Systems, Volume 39

Trust Management Framework for Multi-Robot Systems

, ,

DOI: http://dx.doi.org/10.15439/2024F3165

Citation: Proceedings of the 19th Conference on Computer Science and Intelligence Systems (FedCSIS), M. Bolanowski, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 39, pages 195205 ()

Full text

Abstract. As autonomous technologies blend into a variety of industries, the employment of Multi-Robot Systems (MRS) in complex tasks is becoming increasingly prevalent. These systems, characterized by their distributed intelligence and collaborative capabilities, are now largely deployed in executing critical missions ranging from environmental exploration to disaster response. To support the trustworthy execution of such collaborative multi-robot missions, the existence of an underlying trust management framework is becoming imperative, given the rising risks of malicious intruders attempting to join the MRS.

References

  1. R. Capilla, E. Cioroaica, B. Buhnova, and J. Bosch, “On autonomous dynamic software ecosystems,” IEEE Transactions on Engineering Management, vol. 69, no. 6, pp. 3633–3647, 2022. http://dx.doi.org/10.1109/TEM.2021.3116873
  2. H. Bangui, B. Buhnova, D. Kusnirakova, and D. Halasz, “Trust management in social internet of things across domains,” Internet of Things, vol. 23, p. 100833, 2023.
  3. D. Halasz and B. Buhnova, “Rethinking safety in autonomous ecosystems.” in FedCSIS (Position Papers), 2022, pp. 81–87.
  4. A. Bierska, B. Buhnova, and H. Bangui, “An integrated checklist for architecture design of critical software systems.” in FedCSIS (Position Papers), 2022, pp. 133–140.
  5. M. Macak, S. Bojnak, and B. Buhnova, “Identification of unintentional perpetrator attack vectors using simulation games: A case study,” in 2021 16th conference on computer science and intelligence systems (FedCSIS). IEEE, 2021, pp. 349–356.
  6. Y. Rizk, M. Awad, and E. W. Tunstel, “Cooperative heterogeneous multi-robot systems: A survey,” ACM Computing Surveys (CSUR), vol. 52, no. 2, pp. 1–31, 2019. http://dx.doi.org/10.1145/3303848
  7. B. Buhnova, “Trust management in the Internet of Everything,” in European Conference on Software Architecture. ECSA 2022 Tracks and Workshops. Springer, 2023. http://dx.doi.org/10.1007/978-3-031-36889-9_10 pp. 123–137, preprint at http://arxiv.org/abs/2212.14688.
  8. D. Vojnar, A. Bierska, and B. Buhnova, “Scenarios for trust management in swarm robotics,” 2024.
  9. Q. Yang and R. Parasuraman, “How can robots trust each other for better cooperation? a relative needs entropy based robot-robot trust assessment model,” in 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE, 2021. http://dx.doi.org/10.1109/SMC52423.2021.9659187 pp. 2656–2663.
  10. P. Gangwani, A. Perez-Pons, and H. Upadhyay, “Evaluating trust management frameworks for wireless sensor networks,” Sensors, vol. 24, no. 9, p. 2852, 2024. http://dx.doi.org/10.3390/s24092852
  11. F. Amin and G. S. Choi, “Social pal: A combined platform for internet of things and social networks,” in 2020 5th International Conference on Computer and Communication Systems (ICCCS). IEEE, 2020. http://dx.doi.org/10.1109/ICCCS49078.2020.9118579 pp. 786–790.
  12. S. H. Alsamhi, O. Ma, M. S. Ansari, and S. K. Gupta, “Collaboration of drone and internet of public safety things in smart cities: An overview of qos and network performance optimization,” Drones, vol. 3, no. 1, p. 13, 2019. http://dx.doi.org/10.3390/drones3010013
  13. S. M. S. M. Daud, M. Y. P. M. Yusof, C. C. Heo, L. S. Khoo, M. K. C. Singh, M. S. Mahmood, and H. Nawawi, “Applications of drone in disaster management: A scoping review,” Science & Justice, vol. 62, no. 1, pp. 30–42, 2022. http://dx.doi.org/10.1016/j.scijus.2021.11.002
  14. G. Rathee, A. Kumar, C. A. Kerrache, and R. Iqbal, “A trust-based mechanism for drones in smart cities,” IET Smart Cities, vol. 4, no. 4, pp. 255–264, 2022. http://dx.doi.org/10.1049/smc2.12039
  15. M. M. Arifeen, D. Bhakta, S. R. H. Remu, M. M. Islam, M. Mahmud, and M. S. Kaiser, “Hidden markov model based trust management model for underwater wireless sensor networks,” in Proceedings Of The International Conference On Computing Advancements, 2020. http://dx.doi.org/10.1145/3377049.3377054 pp. 1–5.
  16. A. Deshpande, “Review of effective trust management systems in vanet environments,” International Journal of Grid and Distributed Computing, vol. 14, no. 1, pp. 1771–1780, 2021.
  17. M. Aslan and S. Sen, “A dynamic trust management model for vehicular ad hoc networks,” Vehicular Communications, vol. 41, p. 100608, 2023. http://dx.doi.org/10.1016/j.vehcom.2023.100608
  18. A. Gautam and S. Mohan, “A review of research in multi-robot systems,” in 2012 IEEE 7th international conference on industrial and information systems (ICIIS). IEEE, 2012. http://dx.doi.org/10.1109/ICIInfS.2012.6304778 pp. 1–5.
  19. F. Steele Jr and G. Thomas, “Directed stigmergy-based control for multi-robot systems,” in Proceedings of the ACM/IEEE international conference on Human-robot interaction, 2007. http://dx.doi.org/10.1145/1228716.1228747 pp. 223–230.
  20. K. Bolla, T. Kovacs, and G. Fazekas, “Compact image processing based kin recognition, distance measurement and identification method in a robot swarm,” in 2010 International Joint Conference on Computational Cybernetics and Technical Informatics. IEEE, 2010. http://dx.doi.org/10.1109/ICCCYB.2010.5491237 pp. 419–424.
  21. O. Vermesan, R. Bahr, M. Ottella, M. Serrano, T. Karlsen, T. Wahlstrøm, H. E. Sand, M. Ashwathnarayan, and M. T. Gamba, “Internet of robotic things intelligent connectivity and platforms,” Frontiers in Robotics and AI, vol. 7, p. 104, 2020. http://dx.doi.org/10.3389/frobt.2020.00104
  22. A. Cowley, H.-C. Hsu, and C. J. Taylor, “Distributed sensor databases for multi-robot teams,” in IEEE International Conference on Robotics and Automation, 2004. Proceedings. ICRA’04. 2004, vol. 1. IEEE, 2004. http://dx.doi.org/10.1109/ROBOT.2004.1307229 pp. 691–696.
  23. S. Sagar, A. Mahmood, Q. Z. Sheng, J. K. Pabani, and W. E. Zhang, “Understanding the trustworthiness management in the social internet of things: A survey,” arXiv preprint https://arxiv.org/abs/2202.03624, 2022. doi: 10.1016/j.comnet.2024.110611
  24. N. B. Truong, T.-W. Um, B. Zhou, and G. M. Lee, “From personal experience to global reputation for trust evaluation in the social internet of things,” in GLOBECOM 2017-2017 IEEE Global Communications Conference. IEEE, 2017. http://dx.doi.org/10.1109/GLOCOM.2017.8254523 pp. 1–7.
  25. J. Lee and J. C. Oh, “A node-centric reputation computation algorithm on online social networks,” Applications of Social Media and Social Network Analysis, pp. 1–22, 2015. http://dx.doi.org/10.1007/978-3-319-19003-7_1
  26. C. Marche and M. Nitti, “Can we trust trust management systems?” IoT, vol. 3, no. 2, pp. 262–272, 2022. http://dx.doi.org/10.3390/iot3020015
  27. R. Hussain, J. Lee, and S. Zeadally, “Trust in vanet: A survey of current solutions and future research opportunities,” IEEE transactions on intelligent transportation systems, vol. 22, no. 5, pp. 2553–2571, 2020. http://dx.doi.org/10.1109/TITS.2020.2973715
  28. B. Zhang, Z. Huang, and Y. Xiang, “A novel multiple-level trust management framework for wireless sensor networks,” Computer Networks, vol. 72, pp. 45–61, 2014. http://dx.doi.org/10.1016/j.comnet.2014.06.015
  29. H. El-Sayed, H. A. Ignatious, P. Kulkarni, and S. Bouktif, “Machine learning based trust management framework for vehicular networks,” Vehicular Communications, vol. 25, p. 100256, 2020. http://dx.doi.org/10.1016/j.vehcom.2020.100256
  30. S. A. Ghasempouri and B. T. Ladani, “Modeling trust and reputation systems in hostile environments,” Future Generation Computer Systems, vol. 99, pp. 571–592, 2019. http://dx.doi.org/10.1016/j.future.2019.05.017
  31. I. Ahmed, T. Nahar, S. S. Urmi, and K. A. Taher, “Protection of sensitive data in zero trust model,” in Proceedings of the international conference on computing advancements, 2020. http://dx.doi.org/10.1145/3377049.3377114 pp. 1–5.
  32. R. Govindaraj, P. Govindaraj, S. Chowdhury, D. Kim, D.-T. Tran, and A. N. Le, “A review on various applications of reputation based trust management.” International Journal of Interactive Mobile Technologies, vol. 15, no. 10, 2021. http://dx.doi.org/10.3991/ijim.v15i10.21645
  33. I. U. Din, K. A. Awan, A. Almogren, and B.-S. Kim, “Sharetrust: Centralized trust management mechanism for trustworthy resource sharing in industrial internet of things,” Computers and Electrical Engineering, vol. 100, p. 108013, 2022. http://dx.doi.org/10.1016/j.compeleceng.2022.108013
  34. F. Ishmanov, A. S. Malik, S. W. Kim, and B. Begalov, “Trust management system in wireless sensor networks: design considerations and research challenges,” Transactions on Emerging Telecommunications Technologies, vol. 26, no. 2, pp. 107–130, 2015. http://dx.doi.org/10.1002/ett.2674
  35. H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato, “A survey of trust and reputation management systems in wireless communications,” Proceedings of the IEEE, vol. 98, no. 10, pp. 1755–1772, 2010. http://dx.doi.org/10.1109/JPROC.2010.2059690
  36. A. Abdul-Rahman and S. Hailes, “Supporting trust in virtual communities,” in Proceedings of the 33rd annual Hawaii international conference on system sciences. IEEE, 2000. http://dx.doi.org/10.1109/HICSS.2000.926814 pp. 9–pp.
  37. S. Ruohomaa and L. Kutvonen, “Trust management survey,” in International Conference on Trust Management. Springer, 2005. http://dx.doi.org/10.1007/11429760_6 pp. 77–92.
  38. C. Blum and D. Merkle, Swarm intelligence: introduction and applications. Springer Science & Business Media, 2008. ISBN 9783540740896, 3540740899
  39. M. H. Nasir, S. A. Khan, M. M. Khan, and M. Fatima, “Swarm intelligence inspired intrusion detection systems—a systematic literature review,” Computer Networks, vol. 205, p. 108708, 2022. http://dx.doi.org/10.1016/j.comnet.2021.108708
  40. M. Srivatsa, S. Balfe, K. G. Paterson, and P. Rohatgi, “Trust management for secure information flows,” in Proceedings of the 15th ACM conference on Computer and communications security, 2008. http://dx.doi.org/10.1145/1455770.1455794 pp. 175–188.
  41. F. Canciani, M. S. Talamali, J. A. Marshall, T. Bose, and A. Reina, “Keep calm and vote on: Swarm resiliency in collective decision making,” in Proceedings of workshop resilient robot teams of the 2019 ieee international conference on robotics and automation (ICRA 2019), vol. 4, 2019.
  42. L. Walletzky, B. Buhnova, and L. Carrubbo, “Value-driven conceptualization of services in the smart city: a layered approach,” Social dynamics in a systems perspective, pp. 85–98, 2018.
  43. S. Chren, B. Rossi, B. Bühnova, and T. Pitner, “Reliability data for smart grids: Where the real data can be found,” in 2018 smart city symposium prague (scsp). IEEE, 2018, pp. 1–6.