Gianluca Lax, Giuseppe M. L. Sarnè



In this paper we propose a multi-agent system, called Blue, providing a reputation mechanism to promote mobile C2C commerce in large and highly dynamic environments based on the Bluetooth wireless technology. In such a scenarios, detecting malicious users assumes a great importance but traditional approaches to obtaining reputation of a user are unfeasible or meaningless. For this purpose, we propose a centralized reputation mechanism, used in a asynchronous way, to manage users’ reputation based on trade feedbacks (given by users) suitably weighted. Agents employ such a reputation mechanism to choose their trade counterparts trying to avoid malicious users. A number of experiments show the effectiveness of our proposal.


  1. Abdul-Rahman, A. and Hailes, S. (2000). Supporting trust in virtual communities. In HICSS 7800: Proc. of the 33rd Hawaii Int. Conf. on System Sciences - Vol.
  2. Birk, A. (2000). Boosting cooperation by evolving trust. Applied Artificial Intelligence, 14(8):769-784.
  3. Damiani, E., di Vimercati, D. C., Paraboschi, S., Samarati, P., and Violante, F. (2002). A reputation-based approach for choosing reliable resources in peer-to-peer networks. In CCS 7802: Proc. of the 9th ACM Conf. on Computer and communications security, pages 207- 216, New York, NY, USA. ACM Press.
  4. Dellarocas, C. (2003). The digitization of word of mouth: Promise and challenges of online feedback mechanisms. Management Science, 49(10):1407-1424.
  5. Dholakia, R. R. (2004). Editorial: electronic markets in the post-euphoric phase: Relationships, values and behaviors. Telematic Information, 21(2):115-121.
  6. Dursch, A. and Yen, D. C. (2004). Bluetooth technology: An exploratory study of the analysis and implementation frameworks. Computer Standards and Interfaces, 26(4):263-277.
  7. Falcone, R. and Castelfranchi, C. (2001a). Social trust: a cognitive approach. Kluwer Academic Publishers, Norwell, MA, USA.
  8. Falcone, R. and Castelfranchi, C. (2001b). The sociocognitive dynamics of trust: Does trust create trust? In Proc. of the Workshop on Deception, Fraud, and Trust in Agent Societies held during the Autonomous Agents Conf., pages 55-72, London, UK. Springer-Verlag.
  9. Han, P., Xie, B., Yang, F., and Shen, R. (2004). A scalable p2p recommender system based on distributed collaborative filtering. Expert Systems with Application, 27(2):203-210.
  10. (2006).
  11. (2006).
  12. (2006).
  13. (2006).
  14. Huynh, T. D., Jennings, N. R., and Shadbolt, N. R. (2004). Fire: An integrated trust and reputation model for open multi-agent systems. In ECAI 2004: Proc. of the 16th Europ. Conf. on Artificial intelligence, pages 18-22. IOS Press.
  15. Kamvar, S. D., Schlosser, M. T., and Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in p2p networks. In WWW 7803: Proc. of the 12th Int. Conf. on World Wide Web, pages 640-651, New York, NY, USA. ACM Press.
  16. Lam, K. M. and Leung, H. F. (2005). A trust/honesty model in multiagent semi-competitive environments. In PRIMA 2004: Proc. of the 17th Pacific rim Int. Workshop, volume Lecture Notes in Computer Science Vol. 3371, pages 128-147. Springer.
  17. McLaughlin, M. R. and Herlocker, J. L. (2004). A collaborative filtering algorithm and evaluation metric that accurately model the user experience. In SIGIR 7804: Proc. of the 27th Int. Conf. on Research and development in information retrieval, pages 329-336. ACM Press.
  18. Mui, L., Mohtashemi, M., and Halberstadt, A. (2002). Notions of reputation in multi-agents systems: a review. In AAMAS 7802: Proc. of the first Int. Joint Conf. on Autonomous agents and multiagent systems, pages 280- 287, New York, NY, USA. ACM Press.
  19. NIST/NSA (2002). Fips 180-2. secure hash standard (shs). NIST/NSA.
  20. Pfitzmann, A., Pfitzmann, B., Schunter, M., and Waidner, M. (1997). Trusting mobile user devices and security modules. Computer, 30(2):61-68.
  21. Ramchurn, S. D., Huynh, D., and Jennings, N. R. (2004). Trust in multi-agent systems. Knowl. Eng. Rev., 19(1):1-25.
  22. Resnick, P., Kuwabara, K., Zeckhauser, R., and Friedman, E. (2000). Reputation systems. Commun. ACM, 43(12):45-48.
  23. Rijsbergen, C. J. V. (1979). Information Retrieval. Butterworth.
  24. Rivest, R. L. (1992). The md5 message-digest algorithm. Network Working Group and RSA Data Security, Inc.
  25. Rivest, R. L., Shamir, A., and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126.
  26. Sabater, J. and Sierra, C. (2001). Regret: reputation in gregarious societies. In AGENTS 7801: Proc. of the 5th Int. Conf. on Autonomous agents, pages 194-195, New York, NY, USA. ACM Press.
  27. Sen, S. and Sajja, N. (2002). Robustness of reputationbased trust: boolean case. In AAMAS 7802: Proc. of the 1st Int. Joint Conf. on Autonomous agents and multiagent systems, pages 288-293, New York, NY, USA. ACM Press.
  28. Shaked, Y. and Wool, A. (2005). Cracking the bluetooth pin. In MobiSys 7805: Proc. of the 3rd Int. Conf. on Mobile systems, applications, and services, pages 39- 50, New York, NY, USA. ACM Press.
  29. Srivihok, A. and Sukonmanee, P. (2005). E-commerce intelligent agent: personalization travel support agent using q learning. In ICEC 7805: Proc. of the 7th Int. Conf. on Electronic commerce, pages 287-292. ACM Press.
  30. Tan, Y.-H. and Thoen, W. (2000). An outline of a trust model for electronic commerce. Applied Artificial Intelligence, 14(8):849-862.
  31. Xiong, L. and Liu, L. (2004). Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7):843-857.
  32. Yamamoto, H., Ishida, K., and Ohta, T. (2004). Modeling reputation management system on online c2c market. Comput. Math. Organ. Theory, 10(2):165-178.
  33. Zacharia, G. and Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14(9):881-907.

Paper Citation

in Harvard Style

Lax G. and M. L. Sarnè G. (2006). BLUE: A REPUTATION-BASED MULTI-AGENT SYSTEM TO SUPPORT C2C IN P2P BLUETOOTH NETWORKS . In Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2006) ISBN 978-972-8865-62-7, pages 97-104. DOI: 10.5220/0001426300970104

in Bibtex Style

author={Gianluca Lax and Giuseppe M. L. Sarnè},
booktitle={Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2006)},

in EndNote Style

JO - Proceedings of the International Conference on e-Business - Volume 1: ICE-B, (ICETE 2006)
SN - 978-972-8865-62-7
AU - Lax G.
AU - M. L. Sarnè G.
PY - 2006
SP - 97
EP - 104
DO - 10.5220/0001426300970104