The Role of Trust in Collaborative and Adversarial...

51
The Role of Trust in Collaborative The Role of Trust in Collaborative and Adversarial Behavior and Adversarial Behavior in Networks of Autonomous Agents in Networks of Autonomous Agents John S. Baras Institute for Systems Research, Department of Electrical and Computer Engineering Department of Computer Science, Fischell Department of Bioengineering University of Maryland College Park March 23, 2009 AFOSR Workshop Adversarial and Stochastic Elements in Autonomous Systems Copyright © John S. Baras 2008

Transcript of The Role of Trust in Collaborative and Adversarial...

Page 1: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

The Role of Trust in CollaborativeThe Role of Trust in Collaborativeand Adversarial Behaviorand Adversarial Behavior

in Networks of Autonomous Agentsin Networks of Autonomous Agents

John S. BarasInstitute for Systems Research,

Department of Electrical and Computer EngineeringDepartment of Computer Science,

Fischell Department of BioengineeringUniversity of Maryland College Park

March 23, 2009AFOSR Workshop

Adversarial and Stochastic Elements in Autonomous SystemsCopyright © John S. Baras 2008

Page 2: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

OutlineOutline

• Networks and Collaboration Constrained Coalitional Games• Trust and Networks• Security Aware Protocols via NUM• Trust and Distributed Estimation• Topology Matters• Conclusions and Future Directions

Copyright © John S. Baras 2008 2

Page 3: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

A A NetworkNetwork is is ……

• A collection of nodes, agents, …that collaborate to accomplish actions,gains, …that cannot be accomplished with out suchcollaboration

• Most significant concept for dynamicautonomic networks

Copyright © John S. Baras 2008 3

Page 4: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

The Fundamental Trade-offThe Fundamental Trade-off

• The nodes gain from collaborating• But collaboration has costs (e.g. communications)• Trade-off: gain from collaboration vs cost of collaboration Vector metrics involved typically Constrained Coalitional Games

Copyright © John S. Baras 2008 4

• Example 1: Network Formation -- Effects on Topology• Example 2: Collaborative robotics, communications• Example 3: Web-based social networks and services

● ● ● • Example 4: Groups of cancer tumor or virus cells

Page 5: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

GainGain

• Each node potentially offers benefits V per time unit toother nodes: e.g. V is the number of bits per time unit.

• Potential benefit V is reduced during transmissionsdue to transmission failures and delay

• Jackson-Wolingsky connections model, gain of node i

• rij is # of hops in the shortest path between i and j

• is the communication depreciation rate

!"

#

=$1

() ijr

ijg

wGV

!" "01

= ! if there is no path between and ijrij

Copyright © John S. Baras 2008 5

Page 6: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

CostCost

• Activating links is costly– Example – cost is the energy consumption for

sending data– Like wireless propagation model, cost cij of link ij as a

function of link length dij :

• P is a parameter depending on the transmission/receiverantenna gain and the system loss not related to propagation

• is path loss exponent -- depends on specificpropagation environment.

!=ijijcPd

!

Copyright © John S. Baras 2008 6

Page 7: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Pairwise Game andPairwise Game andConvergenceConvergence

• Payoff of node i from the network is defined as

• Iterated process– Node pair ij is selected with probability pij– If link ij is already in the network, the decision is whether to

sever it, and otherwise the decision is whether to activate the link– The nodes act myopically, activating the link if it makes each at

least as well off and one strictly better off, and deleting the link ifit makes either player better off

– End: if after some time, no additional links are formed or severed– With random mutations , the game converges to a unique

Pareto equilibrium (underlying Markov chain states )

= ! = !()gaincost()()iiivGwGcG

Copyright © John S. Baras 2008 7

G

Page 8: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Coalition Formation at theCoalition Formation at theStable StateStable State

• The cost depends on the physical locations of nodes– Random network where nodes are placed according to a uniform

Poisson point process on the [0,1] x [0,1] square.• Theorem: The coalition formation at the stable state for n∞

— Given is a

sharp threshold for establishing thegrand coalition ( number ofcoalitions = 1).

— For , the threshold is

less than

2

0

!

"# $

= = % &' (

ln,

nVP

n

0 1!< "

2

!

" #$ %& '

ln.

nP

n

n = 20

Copyright © John S. Baras 2008 8

Page 9: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Topologies FormedTopologies Formed

Copyright © John S. Baras 2008 9

Page 10: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

OutlineOutline

• Networks and Collaboration Constrained Coalitional Games• Trust and Networks• Security Aware Protocols via NUM• Trust and Distributed Estimation• Topology Matters• Conclusions and Future Directions

Copyright © John S. Baras 2008 10

Page 11: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Networks and TrustNetworks and Trust

• Trust and reputation critical for collaboration• Characteristics of trust relations:

– Integrative (Parsons1937) – main source of social order– Reduction of complexity – without it bureaucracy and

transaction complexity increases (Luhmann 1988)– Trust as a lubricant for cooperation (Arrow 1974) –

rational choice theory• Social Webs, Economic Webs

– MySpace, Facebook, Windows Live Spaces, Flickr,Classmates Online, Orkut, Yahoo! Groups, MSN Groups

– e-commerce, e-XYZ, services and service composition– Reputation and recommender systems

Copyright © John S. Baras 2008 11

Page 12: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Heterogeneous DynamicHeterogeneous DynamicNetwork Analysis and TrustNetwork Analysis and Trust

• Multiple Interacting Graphs– Nodes: agents, individuals, groups,

organizations– Directed graphs– Links: ties, relationships– Weights on links : value (strength,

significance) of tie– Weights on nodes : importance of node (agent)

• Value directed graphs with weighted nodes• Real-life problems: Dynamic, time varying graphs, relations, weights

Copyright © John S. Baras 2008 12

Social/Cognitive

Information

Comms

S

ijw :S

ii w

:S

jj w

I

klw:

I

kk w

:I

ll w

C

mnw

:C

mm w

:C

nn w

Organizational needsNetwork architectureand operation

Page 13: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Next Generation TrustAnalytics

• Trust evaluation, trust and mistrust dynamics– Spin glasses (from statistical physics), phase transitions

• Indirect trust; reputations, profiles; Trust computation via‘linear’ iterations in ordered semirings

• Direct trust: Iterated pairwise games on graphs withplayers of many types

( )ˆ( 1) , ( ) |i ji j is k f J s k j N+ = !

2 31 a b

ba

2007 IEEE Leonard Abraham prizeNew Book Draft

Page 14: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

14Copyright © John S. Baras 2007

Semirings-ExamplesSemirings-Examples

• Shortest Path Problem– Semiring:– ⊗ is + and computes total path delay– ⊕ is and picks shortest path

• Bottleneck Problem– Semiring:– ⊗ is and computes path bandwidth– ⊕ is and picks highest bandwidth

Page 15: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

15Copyright © John S. Baras 2007

Trust Semiring Properties:Trust Semiring Properties:Partial OrderPartial Order

• Combined along-a-path weight should notincrease :

• Combined across-paths weight should notdecrease :

2 31

b

a

a b

Page 16: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

16Copyright © John S. Baras 2007

Computing Indirect TrustComputing Indirect Trust

• Path interpretation

• Linear system interpretation

• Treat as a linear system– We are looking for its steady state.

Indicator vector of pre-trusted nodes

1

i j i k k jUser k

n n

t t w

t W t b

! ! !

"

= # #

= $ #rr r

Page 17: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

17Copyright © John S. Baras 2007

Direct TrustDirect Trust

7

5

3

8

CC

CD

CC

D

D

=R(a4,a5,a6,a7,a8)

Only C-C links become active

1

64

2

• Direct trust is based on past interactions between A, B.• It is A’s belief about B’s future behavior.

User i– of type ti∈{Good, Bad}– action ai∈{C,D},

i=1,…N– receives payoff

Ri=R(ai,aΓ(i),ti)– maximize his own

payoff (local behavior)

Page 18: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

18Copyright © John S. Baras 2007

Direct Trust: GamesDirect Trust: Games

• Payoff is decomposed as sum of pairwisepayoffs along each link:

6

4CC

8 C5D

7 D

Page 19: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

19Copyright © John S. Baras 2007

Direct TrustDirect Trust

• Problems we are studying:– Repeated interactions

– Take history into account (reputation,profiling)

Probability (reputation) update for User i:

Strategy of User i for step n:

Page 20: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

20Copyright © John S. Baras 2007

Direct TrustDirect Trust

• Two sequences evolving with time:– Vector of actions (strategies), time 1:n

– Set of vectors of neighbor probabilities(reputations), time 1:n

Page 21: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

21Copyright © John S. Baras 2007

Constrained Coalitional Games:Constrained Coalitional Games:Trust and CollaborationTrust and Collaboration

Two linked dynamics• Trust / Reputation propagation and Game evolution

• Beyond linear algebra and weights, semirings of constraints, constraintprogramming, soft constraints semirings, policies, agents

• Learning on graphs and network dynamic games: behavior, adversaries• Adversarial models, attacks, constrained shortest paths, …

• Integrating network utility maximization (NUM) with constraint based reasoning and coalitional games

Page 22: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

22Copyright © John S. Baras 2007

Game EvolutionGame Evolution

• Strategy of node i:– sij = 1 (= -1) i cooperates (does not cooperate) with neighbor j

• Payoff for node i when interacting with j : xij = Jij sij sji

– xij > 0 (< 0) positive link (negative link)– Node selfishness → cooperate with neighbors on positive links

• Strategy updates: node i chooses sij= 1 only if all of the followingare satisfied:– Neighbor j is trusted– xij > 0, or the cumulative payoff of i is less than the case when it

unconditionally conducts sij= 1.• Trust evaluation:

– The deterministic voting rule– Reestablishing period τ : once a node is not trusted, in order to

reestablish trust it has to cooperate for τ consecutive time steps

{ 1,1},ij is j N! " # !

Page 23: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

23Copyright © John S. Baras 2007

Results of GameResults of GameEvolutionEvolution

● Theorem: , there exists τ0, such thatfor a reestablishing period τ > τ0– terated game converges to Nash equilibrium;– In the Nash equilibrium, all nodes cooperate with all their neighbors.

● Compare games with (without) trust mechanism, strategy update:

!" ! =# and

ii i ijj N

i N x J

Percentage of cooperating pairs vs negative links Average payoffs vs negative links

Page 24: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

OutlineOutline

• Networks and Collaboration Constrained Coalitional Games• Trust and Networks• Security Aware Protocols via NUM• Trust and Distributed Estimation• Topology Matters• Conclusions and Future Directions

Copyright © John S. Baras 2008 24

Page 25: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

25Copyright © John S. Baras 2008

Integrate Security into NetworkIntegrate Security into NetworkUtility Maximization FrameworkUtility Maximization Framework

• NUM : Optimization, utilities and duality for understanding protocol designand linkages

• Goal: extendNUM to MANET – time varying networks, uncertainties, non-convexities

• We use ‘trust weights’ in these optimizations – whether they are jointMAC-routing or joint physical-MAC-routing optimizations

• These trust weights are developed by our neighborhood-basedcollaborative monitoring and trust computation methods and aredisseminated via efficient methods for timely availability

• Effect of these trust weights on resulting protocols is that in the schedulingproblems (MAC or routing) trustworthy nodes will be automaticallyused. Packets will not be routed as frequently to suspicious nodes. Orsuspicious nodes will not be scheduled by the MAC protocol.

• Could be used to design XYZ-metric aware communication networkprotocols

Page 26: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

NUM without trustNUM without trust

• Data flow– F flows that share the network sources– Each flow f associated with a source node sf and a destination

node df– xf is the rate with which data is sent from sf to df over possibly

multiple paths and multiple hops

• Utility function– Each flow is associated with a utility function Uf(xf)

• it reflects the “utility” to the flow f when its data rate is xf• Uf is a strictly concave, non-decreasing , continuous differentiable

– NUM is to maximize the utility function

!max()xfff

Ux

Copyright © John S. Baras 2008 26

Page 27: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Aggregate Trust ValueAggregate Trust Value

• Aggregate trust value of aflow (vf)– Along paths

• multiplication of node trustvalues along paths

– Across paths• Weighted summation

across all the paths the flowpasses

• Weight : the proportion ofthe flow passing the path

5

321

s

d4

1/3 data

2/3 data

12345

12()33f

gvvvvv= +

Copyright © John S. Baras 2008 27

Page 28: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Trust - Aware NUMTrust - Aware NUM

• Trust aware NUM– ( )

• Dual decomposition (log change all variables)

– Dual objective function

max()xff ff

gUx!!max()xfff

Ux f̂f fxg x=

Flow rates Routes

Schedule(MAC)

Copyright © John S. Baras 2008 28

Page 29: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

OutlineOutline

• Networks and Collaboration Constrained Coalitional Games• Trust and Networks• Security Aware Protocols via NUM• Trust and Distributed Estimation• Topology Matters• Conclusions and Future Directions

Copyright © John S. Baras 2008 29

Page 30: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Distributed KalmanDistributed KalmanFiltering and TrackingFiltering and Tracking

• Realistic sensor networks: Normal nodes, faulty orcorrupted nodes, malicious nodes

• Hierarchical scheme – provide global trust on aparticular context without requiring direct trust on thesame context between all agents

• Combine techniques from fusion centric, collaborativefiltering, estimation propagation

• Trusted Core– Trust Particles, higher security, additional sensing capabilities,

broader observation of the system, confidentiality and integrity,multipath comms

– Every sensor can communicate with one or more trust particlesat a cost

Copyright © John S. Baras 2008 30

Page 31: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Trust and HierarchyTrust and Hierarchy

Copyright © John S. Baras 2008 31

• Distributed Kalman Filter Particles: Sensor nodes exchangeestimates in their local neighborhood and trusted measurementsfrom the trusted core

• Hierarchical scheme – provide global trust on a particular contextwithout requiring direct trust on the same context between all agents

Sensor NetworkCommunication Graphfrom disc model Gc(V,Ec)

Page 32: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Trust and Induced GraphsTrust and Induced Graphs

Copyright © John S. Baras 2008 32

Induced Graph G (V, A)

Weighted Directed DynamicTrust Graph Gt (V, At )

tcVV!

(,)((,),(,)[])wijcijtijn=

Trust relation

Page 33: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Goals of Trusted SystemGoals of Trusted System

1. All the sensors which abide by the protocols of sensing andmessage passing, should be able to track the trajectories.

2. This implies that those nodes which have poor sensing capabilities,nodes with corrupted sensors, should be aided by their neighbors intracking.

3. Those nodes which are malicious and pass false estimates, shouldbe quickly detected by the trust mechanism and their estimatesshould be discarded.

Copyright © John S. Baras 2008 33

[1][][]

[][][][]

[][][]iii

tctctc

xnAxnBwn

znHnxnvn

zHnxnvn

+ = +

= +

= +

Page 34: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Trusted DKF and ParticlesTrusted DKF and Particles

Copyright © John S. Baras 2008 34

• Can use any valid trust system as trustupdate component

• Can replace DKF with any DistributedSequential MMSE or other filter

• Trust update mechanism: Linear creditand exponential penalty

Page 35: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Trusted DKF PerformanceTrusted DKF Performance

Copyright © John S. Baras 2008 35

Open Loop Performance Closed Loop PerformanceTrust System Performance

Page 36: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

OutlineOutline

• Networks and Collaboration Constrained Coalitional Games• Trust and Networks• Security Aware Protocols via NUM• Trust and Distributed Estimation• Topology Matters• Conclusions and Future Directions

Copyright © John S. Baras 2008 36

Page 37: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

• Distributed algorithms are essential– Group of agents with certain abilities– Agents communicate with neighbors, share/process information– Agents perform local actions– Emergence of global behaviors

• Effectiveness of distributed algorithms– The speed of convergence– Robustness to agent/connection failures– Energy/ communication efficiency

• Group topology affects group performance• Design problem: Find graph topologies with favorable tradeoff between performance

improvement (benefit) vs cost of collaboration• Example: Small Word graphs in consensus problems

37

Distributed Algorithms in Distributed Algorithms in Networked Systems and TopologiesNetworked Systems and Topologies

Copyright © John S. Baras 2008

Page 38: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

38

Consensus Problems:Consensus Problems:Design of Information FlowDesign of Information Flow

• Fixed graphs: Geometric convergence with rate equal toSecond Largest Eigenvalue Modulus (SLEM)

• How does graph topology affect location of eigenvalues?• How can we design graph topologies which result in

good convergence speed?

Symmetric communication

Page 39: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

39

Simple LatticeC(n,k)

Small world: Slightvariation adding

Small World GraphsSmall World Graphs

Φnk

Adding a small portion of well-chosen links →significant increase in convergence rate

Page 40: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

40

Mean Field Explanation andMean Field Explanation andPerturbation ApproachPerturbation Approach

Initial graph

Adjacency/ F matrix Perturbed

Finalgraph

Page 41: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

41

Watts-StrogatzWatts-StrogatzSmall World networksSmall World networks

• Random graph approach (e.g. Durrett 2007, Tahbaz and Jadbabaie 2007)

• Perturbation approach (Higham 2003 )– Start from lattice structure G0=C(n,k) F0– Perturb zero elements in the positive direction by

for fixed and– Perturb the formerly nonzero elements equally, such

that the stochastic structure of the F matrix ispreserved Fε

– Analyze the SLEM as a function of the perturbation asα varies

!"

n

K=

0>K .1>!

Page 42: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

42

Distributed explorationDistributed explorationof the graph structureof the graph structure

• Self-organization for better performance andresiliency

• Hierarchical scheme to design a network structurecapable of running distributed algorithms with highconvergence speed

• A two stage algorithm:1- Find the most effective choice of local leaders2- Provide nodes with information about their location

with respect to other nodes and leaders and thechoice of groups to form

• Divide N agents into K groups with M members each

, select ‘leaders’,NKMKMN= ! " �

Page 43: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

43

Distributed self - organizationDistributed self - organization

Goal: design a scheme that gives each node a vector of compact global information

Page 44: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

44

Two stage semi-decentralized Two stage semi-decentralized algorithmalgorithm

• Stage 1: Determining K leaders– Each node determines its social degree via local query– Dominant nodes in each neighborhood send their degrees to the

central authority– Central authority computes their social scores

Choice of α determines whether leaders in star-likeneighborhoods are preferred

– The central authority selects the K nodes with highest scores associal leaders and gives them an arbitrary order

(2) (3)( ) ( ) (1 ) ( )! != + "SC k SD k SD k

Page 45: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Expander GraphsExpander Graphs• Fast synchronization of a network of oscillators• Network where any node is “nearby” any other• Fast ‘diffusion’ of information in a network• Fast convergence of consensus• Decide connectivity with smallest memory• Random walks converge rapidly …• Graph G, Cheeger constant h(G)

– All partitions of G to S and Sc ,h(G)=min (#edges connecting S and Sc ) /

(#nodes in smallest of S and Sc )• (k , N, ε) expander : h(G) > ε ; sparse but well

connected 45

Page 46: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Expander Graphs –Ramanujan Graphs

Page 47: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

OutlineOutline

• Networks and Collaboration Constrained Coalitional Games• Trust and Networks• Security Aware Protocols via NUM• Component-based Networking• Topology Matters• Conclusions and Future Directions

Copyright © John S. Baras 2008 47

Page 48: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Copyright © John S. Baras 2008

How Biology Does IT?How Biology Does IT?

4848

Page 49: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Control vsControl vsCommunicationCommunication

• Many graphs as abstractions• Collaboration graph – or a model of what the

system does (behavior)• Communication graph – or a model of what the

system consist of (structure)• Nodes with attributes – several graphs• Key question 1: Given behavior, what structure

(subject to constraints) gives best performance?• Key question 2: Given structure (and

constraints) how well behavior can be executed?

Copyright © John S. Baras 2008 49

Page 50: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

Lessons Learned --Lessons Learned --Future DirectionsFuture Directions

• Constrained coalitional games – unifying concept• Generalized networks, flows - potentials, duality

and network optimization (monotropic optimization)• Time varying graphs – mixing – statistical physics• Understand autonomy – better to have self-

organized topology capable of supporting (scalable,fast) a rich set of distributed algorithms (small worldgraphs, expander graphs) than optimized topology

• Given a set of distributed computations is there asmall set of simple rules that when given to thenodes they can self-generate such topologies?

Copyright © John S. Baras 2008 50

Page 51: The Role of Trust in Collaborative and Adversarial ...maeresearch.ucsd.edu/mceneaney/ASEAS/Baras.pdfNext Generation Trust Analytics •Trust evaluation, trust and mistrust dynamics

51Copyright © John S. Baras 2008

Thank you!

[email protected]

http://www.isr.umd.edu/~baras

Questions?