SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013

An Improved Design of Contract Net Trust
Establishment Protocol
Aarti Singh1, Dimple Juneja2
1,2

MMICT & BM, MMU, Mullana, Haryana, India
Email: {singh22081, dimplejunejagupta2}@gmail.com

down the procedure for establishing trust among perspective
communication counterparts, which could lead to more reliable
outputs. However reliability of participating agents was not
paid much attention. Reliability of agents participating in
communication, who will later be performing parts of critical
tasks, is also equally crucial. Even if an agent is trustworthy
doesn’t guarantee that it is reliable too and will provide the
desired results within specified time. Aim of this work is to
extend CNTEP to incorporate reliability computation
mechanism in it so that an agent will be delegated a job iff it
is reliable, leading to better system performance.
This paper is structured as follows: section II explores
the literature in the field of interest, Section III elaborates the
proposed reliability calculation mechanism termed as
RCNTEP. Finally section IV concludes the work.

Abstract— Contract Net Protocol (CNP) is FIPA standardized
high level communication protocol which specifies the way
software agents should follow while communicating. However
it lacks methods for ensuring trust and reliability of the agents
participating in the communication. In an earlier paper
authors proposed a variation of CNP involving trust
establishment feature into it, termed as Contract Net Trust
Establishment Protocol (CNTEP). However, efficient
communication can not be ensured unless the communicating
counterpart is reliable. This fact provided the motivation for
the present work, which extends CNTEP and incorporates
reliability computation component in it.
Index Terms— CNP, FIPA, CNTEP, Trust, Reliability, Agent
Communication, Agent Communication Protocol.

I. INTRODUCTION

II. LITERATURE SURVEY

Agents are widely been employed in critical applications
like e-commerce, web personalization etc. A single agent is
unable to provide complex services desired by the user,
thereby giving rise to social communities of agents termed
as Multi-agent systems (MAS). Multi-agent systems are
serving as instruments in many web based applications, where
they need communication among agents to place together
the independent pieces of knowledge drawn from diverse
sources into meaningful form. For agent communication
FIPA1 standardized Contract Net Protocol [2] is most
commonly employed protocol where FIPA is a Foundation
for Intelligent Physical Agents, a nonprofit organization
working towards standardization of agent development
platforms and communication protocols. Although CNP[11]
addresses most of the issues related to agent communication,
it did not provide any means for establishing trust among
communicating counterparts which is very essential for
agents operating in dynamic, distributed and open
environments where any agent is free to enter or leave a
MAS at its own aspiration. It also doesn’t enforce any
prerequisite for ensuring reliability of the participating agents.
Since agents are by nature self-centered and work for
accomplishment of their own goal, all of them might not be
reliable all the time. Lack of procedures for ensuring trust and
reliability of agents are major barrier towards optimal utilization
of this promising technology.
This work is an extension of our earlier work in which
authors proposed a variation of CNP incorporating trust establishment feature into it, which was termed as Contract Net
Trust Establishment Protocol (CNTEP) [10]. This work laid
1

Bui, Venkatesh & Kieronska (1998) [3] demanded sharing
of private knowledge of agents to each other for trust
establishement. Poslad and Calisti (2000) [9] examined the
notions of trust and security inherent in the core FIPA
specifications. They highlighted that there is still no
coherent and complete picture for agent security within
FIPA at this point, the implicit assumption in FIPA security
management is that agents are co-operative and trustworthy
and that agent security is responsibility of the infrastructure
in which it is embedded.
Mass & Shehory (2001) [15] introduced architecture for
implementing trust establishment mechanism in common
agent architectures. Maximilien and Singh (2001) [4] proposed
Web Service Agent Proxy (WSAP) based reputation and
endorsement mechanism. However their approach doesn’t
address challenge of accountability of agents and also
implementation of the proposed framework is left as part of
future work. Alibhai (2003) [2] elaborated the role of CNP in
complex, truly distributed environments emphasizing CNP
as life force of distributed systems. Maamar, Sheng &
Benatallah(2003) [6] proposed deployment of agents for
composition and execution of web services , although they
have not considered the reliability or trustworthiness of the
agents employed. Paes, Almeida, Lucena & Alencar (2004)
[8] proposed FROG to enforce secure interaction protocols
in MASs. Tsai, Zheng, Chen, Huang, Paul and Liao (2004)
[12] proposed service oriented software reliability model for
atomic and composite web services. Agerri & Alonso (2005)
[1] proposed rights based framework that mainly focuses on
communication semantics and the pragmatics. However, it

http://www.fipa.org

© 2013 ACEEE
DOI: 01.IJCOM.4.1.1003

19
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013
fails to cover other patterns of conversations and mechanisms
to punish violations. Huynh, Jennings & Shadbolt (2006) [5]
presented a trust and reputation model called FIRE based on
the assumption that agent report their trust information
truthfully which is not possible in open, dynamic MAS. Wang
& Singh (2007) [13] presented a theoretical development of
trust that would work in variety of situations where evidence
based trust reports are desired. Their work contributes a
mathematical understanding of trust. However extension of
this work from binary to multi-valued events is left as part of
future work. Novak (2008) [7] highlighted FIPA complying
platforms are not suitable for development of open
heterogeneous MASs. Wu (2008) [14] proposed a norm based
CNP for improving the efficiency and effectiveness of the
coordinating processes in a MASs. Singh, Juneja & Sharma
(2010) [10] proposed a variation of CNP incorporating trust
establishment mechanism into it, thereby facilitating agents
to have initial trust with their communicating counterparts,
however ensuring reliability of those trusted agents is still
left.
The literature survey presented above highlights that
researchers had been recommending for trust establishment
mechanisms in agent communication and some variations in
CNP has also been proposed. However, reliability of
communicating agents is completely ignored. Reliability of
communicating agents has not been paid any attention so
far, although it’s an equally essential dimension to be focused
upon. Both CNP and CNTEP work on broadcast-based
communication strategy, thus even after ensuring the
trustworthiness of task agents, they may come out to be
unreliable leading to wasted efforts. On the other hand
delegating the task to trustworthy and reliable agents will
improve the probability of successful task completion,
resulting in enhanced customer satisfaction.
Next section elaborates the proposed new variation of
CNTEP involving agent reliability computation mechanism,
thereby termed as Reliable Contract Net Trust Establishment
Protocol (RCNTEP).

contract net trust establishment protocol (RCNTEP) has been
proposed in existing CNTEP to help monitor and select effective communication partners. Before proposing the main
RCNTEP, following basic terms must be understood:
TPC: TPC stands for Trust Percentile Certificate that is
official document of trust for an agent generated by CNTEP.
Without this document no agent is permissible to send their
bids to composite/initiator agent.
Bid_Packet: Bid_Packet is a combination as given below:
Bid_Packet= <Agentid, Condition,Cost,Time_
Required,Bid,TPC>
 Bid_Record_Table: It maintains the record of all
Bid_Packets received for a particular proposal. For every
proposal, initially it is empty and it is populated with the
information from Bid_Packets arriving subsequently.
Agent Reliability Table: This table contains the reliability
parameter values for Atomic_Agents. It comprises of TPC,
Reliability Value (RV), Conditions and Time.
RV: RV stands for Reliability Value of participating agents,
calculated by initiator agent. It ranges between possible set
of values that is {…..-2,-1, 0, +1, +2…..}. If RV of an
Atomic_Agent exceeds the negative threshold value, the
corresponding Atomic_Agent is permanently blocked from
bidding.
Condition: Condition refers to the constraints imposed
on the task performance by the composite agent (CA). These
conditions has to be taken care of by Atomic_Agent while
executing the task.
Result: Result specifies the information (material) and its
format to be provided by Atomic_Agent to the CA after the
task is successfully executed. Result of task execution may
be either complete, incomplete or failure_to_complete. A task
successfully completed is indicated by OK entry in ART,
incomplete or failure_to_complete is indicated by NOK entry.
Time: Time is the total duration required for the completion
of the task. This attribute can take three possible values:
Max for utmost time, Min for less time and Mod for moderate
timing. The composite agent will decide the range for Max,
Min and Mod depending upon the task to be delegated.
In RCNTEP participating agents are Atomic_Agents and
Composite_Agents (CA). Atomic_Agent performs a specific
task independently and do not further divide the same,
whereas Composite_Agent itself comprises of various
Atomic_Agents and provides a service to the user by dividing it among atomic agents. Thus it depends on these atomic
agents for accomplishment of its task. Figure 1 provides the
high level view of RCNTEP where CAi is a composite agent
that is further composed of atomic agents named
Atomic_Agent 1…… Atomic_Agent i……...Atomic_Agent n.
These Atomic_Agents are answerable to their corresponding Composite_Agents. Whenever there is a task to be performed, Composite_Agent generates a call for proposal and
sends it to Atomic_Agents associated with it. The interested
Atomic_Agents proceed for bid submission. Before submitting their bid Atomic_Agent initiates CNTEP to get its TPC
(the procedure for computing trust percentile has already
been discussed in [10]). Since the focus of this work is to

III. PROPOSED WORK
Reliability and trust are two important dimensions for
ensuring efficient and fruitful agent communications in dynamic, open and distributed environments such as Internet.
In such open environments agents are created by variety of
stakeholders for various purposes and they may join or leave
MAS dynamically depending on their own motives. Thus
there is large possibility that the agents involved in communications and in providing services are likely to be un-reliable, self-interested and possessed with incomplete knowledge. Agent reliability is further degraded by the fact that
they are intelligent and may change their plan of action depending on their motives and intentions, which also keep on
changing with time. In the light of above facts, credibility of
the agents becomes questionable and leads to necessity of a
mechanism for ensuring credibility of the agents before delegating task to them. To meet above stated needs, a reliable
© 2013 ACEEE
DOI: 01.IJCOM.4.1.1003

20
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013
no other Atomic_Agent is free/interested in bid submission
or no other Atomic_Agent is capable for a specific task, BEA
is forced to consider less reliable Atomic_Agent giving it a
chance to improve its reliability for future.
Conditions and Time entries are populated once the task
is delegated to Atomic_Agent and is completed by it. On
successful completion Composite_Agent analyzes whether
Atomic_Agent satisfied all the imposed constraints and the
time it consumed. Time is analyzed and entered in ART even
on unsuccessful completion.
B. Working of RCNTEP
The working of RCNTEP is explained in figure 2. As can
be seen, the working of RCNTEP is divided in eleven steps.
These steps are explained as follow:
1 Composite_Agent generates cfp and sends it to all possible
Atomic_Agents who might be interested in that cfp. CA
might consult the directory listing the functionality of
Atomic_Agents.
2 On receiving cfp, the Atomic_Agents are not permitted to
respond back immediately to Composite_Agent unless
and until they possess the TPC from CNTEP. Thus for
getting TPC Atomic_Agents call CNTEP. For detailed
working of CNTEP, refer to [9].
3 CNTEP returns TPC to all atomic agents
(Atomic_Agent 1…….Atomic_Agent i…….. Atomic_Agent n)
after calculating their trust percentile.
4 After getting TPC the Atomic_Agent makes a packet of
TPC and its bid and sends this Bid_Packet to the
concerned Composite_Agent.
5 Composite_Agent forwards all Bid_Packets to BEA
demanding for the most reliable agent.
6 BEA records every Bid in Bid_Record_Table and enters
TPC value in Agent_Reliability_Table.
7 When bid submission date expires, BEA first analyses
Bid_Record_Table to shortlist the Atomic_Agents having
least cost and time specification. Then it accesses
Agent_Reliability_Table to compute the most reliable
agent among all the candidate agents.
Evaluation process is based on various parameter values
like high TPC, high RV, fulfillment of specified conditions and
minimum time duration and above all successful completion
of earlier designated tasks. A reliability_score is computed
for every shortlisted agent using the formula:
Reliability_score

Figure 1. High Level View of RCNTEP

compute the reliability of a participating agent which is based
on the exisiting design of CNTEP, it is only after getting the
TPC, Atomic_Agent generates a Bid_Packet and submits
the same to Composite_Agent which in turn forwards it to
Bid Evaluation agent (BEA). BEA is supported with two data
structures
namely
Bid_Record_Table
a nd
Agent_Reliability_Table which help in bid evaluation and
reliability assessment. When an Atomic_Agent interacts with
this system for the first time, an entry for it is created in
Agent_Reliability_Table with its initial TPC value. In contrast, if an Atomic_Agent has earlier interacted with the system its entry exists in Agent_Reliability_Table illustrating
its past behavior and the TPC value is updated in the same
record.
Reliability Value of an agent refers to its credibility for
Composite_Agent. When an Atomic_Agent interacts with
Composite_Agent for the first time its RV is set to 0 i.e.
unknown since the Atomic_Agent is yet to prove its
credibility. Once a task is delegated to an Atomic_Agent and
it successfully completes it, Composite_Agent increases its
RV value by 1 i.e.
RV=RV+1
(2)
Whereas if due to any reason agent doesn’t complete its
task within specified time its RV is decremented by 1 leading
it to
RV=RV-1
(3)
When RV of an Atomic_Agent reaches threshold of negative RV (assumed to be -5, in this case), it is debarred from
further bid submission. However if an agent gets negative
RV, it may improve its performance next time and get its RV
changed to positive side. BEA give least priority to
Atomic_Agent having negative RV, but in certain cases when
© 2013 ACEEE
DOI: 01.IJCOM.4.1.1003

(4)
Where

represents the number of interactions agents have
had with the system.
 conditions are interpreted as either True (1) or false
(0)
 Time shall be interpreted as
{Max=-1, Moderate =0 , Min=+1}
 Results are interpreted as
{Complete=+1, Failure=0 , Incomplete=-1}
21
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013

Figure 2. Architecture of RCNTEP

Once the reliability score is available for appealing agents,
most reliable agent is selected based on highest reliability
score:
Reliable_Agent=Max(Reliability_score)
(5)
In case of more than one agent having highest
reliability_score, the agent who submitted the BP first is
chosen for task delegation.
8 The BEA returns most reliable agent_id to
Composite_Agent.
9 Composite_Agent then awards the task to Atomic_Agent
nominated by BEA through step 8.
10 The awarded Atomic_Agent is required to inform the status
of designated task to Composite_Agent within a
specified period.
11 If the Composite_Agent is satisfied with the results
supplied by Atomic_Agent then it increases RV by +1
otherwise decrease it by 1. These values are updated in
the Agent_Reliability_Table for future use.
The figure 3 given below provides the flow diagram of
RCNTEP.
The algorithms of various agents involved in RCNTEP
are given in figures 4(a)-4(d) below:C. Result Analysis
For testing the proposed work a prototype of the above
framework was developed in JADE. The results of execution
of RCNTEP are compared with execution of CNTEP and
significant improvement in efficiency of task execution has
been observed. The figures 5(a)-5(d) given below illustrate
the difference in performance of CNTEP and RCNTEP.
Although CNTEP placed limit on the number of contractors
which can be considered for task delegation, in contrast to
© 2013 ACEEE
DOI: 01.IJCOM.4.1.1003

Figure 3. Flow Chart of RCNTEP

standard CNP (see fig. 5(a) below), but due to lack of reliability
feature success rate of task performance was not improved
much.
Now with introduction of reliability computation
mechanism, number of contractors considered for task
22
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013

Figure 4(c) Algorithm for Bid Evaluation Agent

Figure 4(a) Algorithm for Composite Agent

Atomic_Agent ( )
Input: cfp;
Output: Bid_Packet, results;
Figure 4(d) Algorithm for RCNTEP

{ on( cfp) activate;
if(interested(cfp)
{ enter cfp in list;
get TPC Ħ Execute ( CNTEP);
generate Bid;
create Bid_Packet=Trust_Percentile_Cretificate +
Bid;
return (Bid_Packet);
}
else sleep; }
Figure 4(b) Algorithm for Atomic Agent

delegation is further reduced (shown in figure 5(b) below). It
is clear from the graph below that number of contractors has
been reduced considerably.
However, performance analysis of CNTEP and RCNTEP
clearly highlights that with RCNTEP the success rate of task
execution & completion improves significantly. Since with
RCNTEP, only reliable contractors are considered for task
delegation, which saves bandwidth consumption in managing
© 2013 ACEEE
DOI: 01.IJCOM.4.1.1003

Figure 5(a) Performance of CNTEP in Terms of Task Delegation

failed contracts, provides timely results to the end users and
improves quality of service.

23
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013
CONCLUSIONS
This work has presented a new variation of already proposed Contract Net Trust Establishment Protocol (CNTEP)
by incorporating reliability computation mechanism in it. The
obtained results were analyzed in terms of task performance
and significant improvement could be observed in terms of
successful task completion, timely response to the user and
better bandwidth utilization by reducing contract failures.
Thus this work significantly improved task performance
mechanism of agents in comparison to the traditional CNP.
REFERENCES
[1] Agerri R. and Alonso E., “Semantics and Pragmatics for Agent
Communication”. In EPIA 2005, LNAI 3808, pp. 524-535.
[2] Alibhai Z., “What is Contract Net Interaction Protocol?”
.IRMS Lab,SFU, Jul. 2003.
[3] Bui H.H., Venkatesh S. and Kieronska D., “A Framework for
Coordination and Learning Among Team of Agents”, Lecture
Notes in Artificial Intelligence, vol. 1441, pp. 164–178.
Springer-Verlag, 1998.
[4] E. Michael Maximilien and Munindar P. Singh, ‘Reputation
and Endorsement for Web Services’. Published in Newsletter
ACM SIGecom Exchanges - Chains of commitment , Volume
3, Issue 1, Winter, 2002 Pages 24 – 31.
[5] Huynh D., Jennings R.N., and Shadbolt R.N., “Developing an
Integrated Trust and Reputation Model for Open Multi-Agent
Systems”. Autonomous Agents and Multi-Agent Systems,
vol. 13, No.2, pp. 119- 154, September, 2006.
[6] Maamar Z., Sheng Q. Z. and Benatallah B., ‘Interleaving Web
Services Composition and Execution Using Software Agents
and Delegation’. Published in Proceedings of First International
Workshop on Web Services and Agent- Based Eng. (WSABE
’03), held in conjunction with the Second International Joint
Conf. Autonomous Agents and Multi-Agent Systems
(AAMAS ’03), 2003.
[7] Novak P., “Communication Platform for Open heterogeneous
MASs”. In IFI Technical Report Series.IFI-08-13, December
2008.
[8] Paes B.D.R., Almeida D.O.H., Lucena D.P.J.C. and Alencar
S.C.P.,”Enforcing Interaction Protocols in Multi-Agent
Systems”. In PUCRioInf. MCC 09/04 March, 2004.
[9] Poslad S. and Calisti M., ‘Towards Improved Trust and
Security in FIPA Agent Platforms’. Published in In
Autonomous Agents 2000 Workshop on Deception, Fraud
and Trust in Agent Societies, Spain, 2000.
[10] Singh A., Juneja D. and Sharma A.K.(2010), ‘Introducing Trust
Establishment Protocol in Contract Net Protocol’. Proceedings
of 2010 IEEE International Conference on Advances in
Computer Engineering, Bangalore, India, June 21-22, 2010.
[11] Smith G.R., “The Contract Net Protocol: High-level
Communication and Control in a Distributed Problem Solver”.
In IEEE Transactions on Computers, Vol. C-29, No. 12,
December 1980.
[12] Tsai W. T., Zhang D., Chen Y., Huang H., Paul R.and Liao N.,
‘A Software Reliability Model For Web Services’. Published
in the 8th IASTED International Conference on Software
Engineering and Applications, Cambridge, MA, November
2004, pp. 144-149.

Figure 5(b) Contract Delegation Ratio of CNTEP & RCNTEP

Figure 5(c) Performance with CNTEP

Figure 5(d) Performance with RCNTEP

© 2013 ACEEE
DOI: 01.IJCOM.4.1.1003

24
Full Paper
ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013
[14] Wu J., “Contract Net Protocol for Coordination in MultiAgent System”. Proc. of 2nd International Symposium on
Intelligent Information Technology Application, pp. 10521058, 2008.

[13] Wang Y. and Singh P.M., “Formal Trust Model for Multiagent
Systems”. Proceedings of 20th International Joint Conference
on Artificial Intelligence (IJCAI-07), pp. 1551-1556, 2007.

[15] Y. Mass and O. Shehory, “Distributed Trust in Open
Multi-Agent Systems”. Trust in Cyber-Societies, pp.
159–173. Springer-Verlag, Berlin Heidelberg, 2001.

© 2013 ACEEE
DOI: 01.IJCOM.4.1.1003

25

Mais conteúdo relacionado

Mais procurados

Dynamic Web Service Composition based on Network Modeling with Statistical An...
Dynamic Web Service Composition based on Network Modeling with Statistical An...Dynamic Web Service Composition based on Network Modeling with Statistical An...
Dynamic Web Service Composition based on Network Modeling with Statistical An...ijwscjournal
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
Using big data to predict organizational commitment
Using big data to predict organizational commitmentUsing big data to predict organizational commitment
Using big data to predict organizational commitmentRajiv B Deo
 
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETS
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETSFORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETS
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETScsandit
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS IAEME Publication
 
A novel approach a hybrid semantic
A novel approach a hybrid semanticA novel approach a hybrid semantic
A novel approach a hybrid semanticIJNSA Journal
 
An Overview of Workflow Management on Mobile Agent Technology
An Overview of Workflow Management on Mobile Agent TechnologyAn Overview of Workflow Management on Mobile Agent Technology
An Overview of Workflow Management on Mobile Agent TechnologyIJERA Editor
 
Fuzzy Logic Framework for Qualitative Evaluation of Supply Chain Responsiveness
	Fuzzy Logic Framework for Qualitative Evaluation of Supply Chain Responsiveness	Fuzzy Logic Framework for Qualitative Evaluation of Supply Chain Responsiveness
Fuzzy Logic Framework for Qualitative Evaluation of Supply Chain Responsivenesstheijes
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingIRJET Journal
 
Adopting trust and assurance as indicators for the reassignment of responsibi...
Adopting trust and assurance as indicators for the reassignment of responsibi...Adopting trust and assurance as indicators for the reassignment of responsibi...
Adopting trust and assurance as indicators for the reassignment of responsibi...christophefeltus
 
The Hunt for Leading Indicators
The Hunt for Leading IndicatorsThe Hunt for Leading Indicators
The Hunt for Leading IndicatorsServiceWave 2010
 
An explicit trust model towards better system security
An explicit trust model towards better system securityAn explicit trust model towards better system security
An explicit trust model towards better system securitycsandit
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...Conference Papers
 
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...Stephen Kwan
 

Mais procurados (17)

Dynamic Web Service Composition based on Network Modeling with Statistical An...
Dynamic Web Service Composition based on Network Modeling with Statistical An...Dynamic Web Service Composition based on Network Modeling with Statistical An...
Dynamic Web Service Composition based on Network Modeling with Statistical An...
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
Using big data to predict organizational commitment
Using big data to predict organizational commitmentUsing big data to predict organizational commitment
Using big data to predict organizational commitment
 
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETS
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETSFORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETS
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELLFORMED NETS
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
 
A novel approach a hybrid semantic
A novel approach a hybrid semanticA novel approach a hybrid semantic
A novel approach a hybrid semantic
 
An Overview of Workflow Management on Mobile Agent Technology
An Overview of Workflow Management on Mobile Agent TechnologyAn Overview of Workflow Management on Mobile Agent Technology
An Overview of Workflow Management on Mobile Agent Technology
 
Fuzzy Logic Framework for Qualitative Evaluation of Supply Chain Responsiveness
	Fuzzy Logic Framework for Qualitative Evaluation of Supply Chain Responsiveness	Fuzzy Logic Framework for Qualitative Evaluation of Supply Chain Responsiveness
Fuzzy Logic Framework for Qualitative Evaluation of Supply Chain Responsiveness
 
BNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid ComputingBNTM: Bayesian Network based Trust Model for Grid Computing
BNTM: Bayesian Network based Trust Model for Grid Computing
 
Adopting trust and assurance as indicators for the reassignment of responsibi...
Adopting trust and assurance as indicators for the reassignment of responsibi...Adopting trust and assurance as indicators for the reassignment of responsibi...
Adopting trust and assurance as indicators for the reassignment of responsibi...
 
The Hunt for Leading Indicators
The Hunt for Leading IndicatorsThe Hunt for Leading Indicators
The Hunt for Leading Indicators
 
IJET-V3I2P8
IJET-V3I2P8IJET-V3I2P8
IJET-V3I2P8
 
An explicit trust model towards better system security
An explicit trust model towards better system securityAn explicit trust model towards better system security
An explicit trust model towards better system security
 
Validation of early testing method for e government projects by requirement ...
Validation of early testing method for e  government projects by requirement ...Validation of early testing method for e  government projects by requirement ...
Validation of early testing method for e government projects by requirement ...
 
G45014345
G45014345G45014345
G45014345
 
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
Kwan & Muller-Grochs Cambridge Understanding Complex Service Systems Conferen...
 
Metamodel for reputation based agents system – case study for electrical dist...
Metamodel for reputation based agents system – case study for electrical dist...Metamodel for reputation based agents system – case study for electrical dist...
Metamodel for reputation based agents system – case study for electrical dist...
 

Destaque

CEM Best Practices - 2011 KC Call Center EXPO
CEM Best Practices - 2011 KC Call Center EXPOCEM Best Practices - 2011 KC Call Center EXPO
CEM Best Practices - 2011 KC Call Center EXPOVITEC, Inc.
 
A Humorous Look at Life Before Customer Engagement Insight
A Humorous Look at Life Before Customer Engagement InsightA Humorous Look at Life Before Customer Engagement Insight
A Humorous Look at Life Before Customer Engagement InsightEvergage
 
Net Promoter Score: Automatic Root Cause Analysis with a Waterfall chart
Net Promoter Score: Automatic Root Cause Analysis with a Waterfall chartNet Promoter Score: Automatic Root Cause Analysis with a Waterfall chart
Net Promoter Score: Automatic Root Cause Analysis with a Waterfall chartCustomerGauge
 
CustomerGauge B2b Net Promoter Score Measurement
CustomerGauge B2b Net Promoter Score MeasurementCustomerGauge B2b Net Promoter Score Measurement
CustomerGauge B2b Net Promoter Score MeasurementCustomerGauge
 
Dr Robert East: Net Promoter Score - is there a better alternative?
Dr Robert East: Net Promoter Score - is there a better alternative?Dr Robert East: Net Promoter Score - is there a better alternative?
Dr Robert East: Net Promoter Score - is there a better alternative?WOMMA UK
 
Flashing Eye Robot / Teaching Electronic Circuits
Flashing Eye Robot / Teaching Electronic CircuitsFlashing Eye Robot / Teaching Electronic Circuits
Flashing Eye Robot / Teaching Electronic CircuitsCustomerGauge
 

Destaque (6)

CEM Best Practices - 2011 KC Call Center EXPO
CEM Best Practices - 2011 KC Call Center EXPOCEM Best Practices - 2011 KC Call Center EXPO
CEM Best Practices - 2011 KC Call Center EXPO
 
A Humorous Look at Life Before Customer Engagement Insight
A Humorous Look at Life Before Customer Engagement InsightA Humorous Look at Life Before Customer Engagement Insight
A Humorous Look at Life Before Customer Engagement Insight
 
Net Promoter Score: Automatic Root Cause Analysis with a Waterfall chart
Net Promoter Score: Automatic Root Cause Analysis with a Waterfall chartNet Promoter Score: Automatic Root Cause Analysis with a Waterfall chart
Net Promoter Score: Automatic Root Cause Analysis with a Waterfall chart
 
CustomerGauge B2b Net Promoter Score Measurement
CustomerGauge B2b Net Promoter Score MeasurementCustomerGauge B2b Net Promoter Score Measurement
CustomerGauge B2b Net Promoter Score Measurement
 
Dr Robert East: Net Promoter Score - is there a better alternative?
Dr Robert East: Net Promoter Score - is there a better alternative?Dr Robert East: Net Promoter Score - is there a better alternative?
Dr Robert East: Net Promoter Score - is there a better alternative?
 
Flashing Eye Robot / Teaching Electronic Circuits
Flashing Eye Robot / Teaching Electronic CircuitsFlashing Eye Robot / Teaching Electronic Circuits
Flashing Eye Robot / Teaching Electronic Circuits
 

Semelhante a An Improved Design of Contract Net Trust Establishment Protocol

Selecting Trustworthy Clients in the Cloud
Selecting Trustworthy Clients in the CloudSelecting Trustworthy Clients in the Cloud
Selecting Trustworthy Clients in the Cloudijccsa
 
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUDSELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUDijccsa
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
Dynamic Web Service Composition based on Network Modeling with Statistical An...
Dynamic Web Service Composition based on Network Modeling with Statistical An...Dynamic Web Service Composition based on Network Modeling with Statistical An...
Dynamic Web Service Composition based on Network Modeling with Statistical An...ijwscjournal
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
 
An Elite Model for COTS Component Selection Process
An Elite Model for COTS Component Selection ProcessAn Elite Model for COTS Component Selection Process
An Elite Model for COTS Component Selection ProcessIJEACS
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTIJNSA Journal
 
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET Journal
 
IRJET- Decentralized Freelancing System - Trust and Transparency
IRJET-  	  Decentralized Freelancing System - Trust and TransparencyIRJET-  	  Decentralized Freelancing System - Trust and Transparency
IRJET- Decentralized Freelancing System - Trust and TransparencyIRJET Journal
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...idescitation
 
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTSTRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTSijp2p
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Pallavi Agarwal
 
A trust evaluation scheme of service providers in mobile edge computing
A trust evaluation scheme of service providers in mobile edge  computingA trust evaluation scheme of service providers in mobile edge  computing
A trust evaluation scheme of service providers in mobile edge computingIJECEIAES
 

Semelhante a An Improved Design of Contract Net Trust Establishment Protocol (20)

Selecting Trustworthy Clients in the Cloud
Selecting Trustworthy Clients in the CloudSelecting Trustworthy Clients in the Cloud
Selecting Trustworthy Clients in the Cloud
 
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUDSELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
SELECTING TRUSTWORTHY CLIENTS IN THE CLOUD
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
Dynamic Web Service Composition based on Network Modeling with Statistical An...
Dynamic Web Service Composition based on Network Modeling with Statistical An...Dynamic Web Service Composition based on Network Modeling with Statistical An...
Dynamic Web Service Composition based on Network Modeling with Statistical An...
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
An Elite Model for COTS Component Selection Process
An Elite Model for COTS Component Selection ProcessAn Elite Model for COTS Component Selection Process
An Elite Model for COTS Component Selection Process
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
 
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...IRJET-  	  Improvement of Security and Trustworthiness in Cloud Computing usi...
IRJET- Improvement of Security and Trustworthiness in Cloud Computing usi...
 
IRJET- Decentralized Freelancing System - Trust and Transparency
IRJET-  	  Decentralized Freelancing System - Trust and TransparencyIRJET-  	  Decentralized Freelancing System - Trust and Transparency
IRJET- Decentralized Freelancing System - Trust and Transparency
 
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
Trust Assessment Policy Manager in Cloud Computing – Cloud Service Provider’s...
 
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTSTRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
TRUST MANAGEMENT FRAMEWORK FOR IOTBASED P2P OBJECTS
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
Agent basedqos
Agent basedqosAgent basedqos
Agent basedqos
 
Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET Overview of Trust and Cryptography in VANET
Overview of Trust and Cryptography in VANET
 
A trust evaluation scheme of service providers in mobile edge computing
A trust evaluation scheme of service providers in mobile edge  computingA trust evaluation scheme of service providers in mobile edge  computing
A trust evaluation scheme of service providers in mobile edge computing
 

Mais de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mais de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)cama23
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 

Último (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)Global Lehigh Strategic Initiatives (without descriptions)
Global Lehigh Strategic Initiatives (without descriptions)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 

An Improved Design of Contract Net Trust Establishment Protocol

  • 1. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013 An Improved Design of Contract Net Trust Establishment Protocol Aarti Singh1, Dimple Juneja2 1,2 MMICT & BM, MMU, Mullana, Haryana, India Email: {singh22081, dimplejunejagupta2}@gmail.com down the procedure for establishing trust among perspective communication counterparts, which could lead to more reliable outputs. However reliability of participating agents was not paid much attention. Reliability of agents participating in communication, who will later be performing parts of critical tasks, is also equally crucial. Even if an agent is trustworthy doesn’t guarantee that it is reliable too and will provide the desired results within specified time. Aim of this work is to extend CNTEP to incorporate reliability computation mechanism in it so that an agent will be delegated a job iff it is reliable, leading to better system performance. This paper is structured as follows: section II explores the literature in the field of interest, Section III elaborates the proposed reliability calculation mechanism termed as RCNTEP. Finally section IV concludes the work. Abstract— Contract Net Protocol (CNP) is FIPA standardized high level communication protocol which specifies the way software agents should follow while communicating. However it lacks methods for ensuring trust and reliability of the agents participating in the communication. In an earlier paper authors proposed a variation of CNP involving trust establishment feature into it, termed as Contract Net Trust Establishment Protocol (CNTEP). However, efficient communication can not be ensured unless the communicating counterpart is reliable. This fact provided the motivation for the present work, which extends CNTEP and incorporates reliability computation component in it. Index Terms— CNP, FIPA, CNTEP, Trust, Reliability, Agent Communication, Agent Communication Protocol. I. INTRODUCTION II. LITERATURE SURVEY Agents are widely been employed in critical applications like e-commerce, web personalization etc. A single agent is unable to provide complex services desired by the user, thereby giving rise to social communities of agents termed as Multi-agent systems (MAS). Multi-agent systems are serving as instruments in many web based applications, where they need communication among agents to place together the independent pieces of knowledge drawn from diverse sources into meaningful form. For agent communication FIPA1 standardized Contract Net Protocol [2] is most commonly employed protocol where FIPA is a Foundation for Intelligent Physical Agents, a nonprofit organization working towards standardization of agent development platforms and communication protocols. Although CNP[11] addresses most of the issues related to agent communication, it did not provide any means for establishing trust among communicating counterparts which is very essential for agents operating in dynamic, distributed and open environments where any agent is free to enter or leave a MAS at its own aspiration. It also doesn’t enforce any prerequisite for ensuring reliability of the participating agents. Since agents are by nature self-centered and work for accomplishment of their own goal, all of them might not be reliable all the time. Lack of procedures for ensuring trust and reliability of agents are major barrier towards optimal utilization of this promising technology. This work is an extension of our earlier work in which authors proposed a variation of CNP incorporating trust establishment feature into it, which was termed as Contract Net Trust Establishment Protocol (CNTEP) [10]. This work laid 1 Bui, Venkatesh & Kieronska (1998) [3] demanded sharing of private knowledge of agents to each other for trust establishement. Poslad and Calisti (2000) [9] examined the notions of trust and security inherent in the core FIPA specifications. They highlighted that there is still no coherent and complete picture for agent security within FIPA at this point, the implicit assumption in FIPA security management is that agents are co-operative and trustworthy and that agent security is responsibility of the infrastructure in which it is embedded. Mass & Shehory (2001) [15] introduced architecture for implementing trust establishment mechanism in common agent architectures. Maximilien and Singh (2001) [4] proposed Web Service Agent Proxy (WSAP) based reputation and endorsement mechanism. However their approach doesn’t address challenge of accountability of agents and also implementation of the proposed framework is left as part of future work. Alibhai (2003) [2] elaborated the role of CNP in complex, truly distributed environments emphasizing CNP as life force of distributed systems. Maamar, Sheng & Benatallah(2003) [6] proposed deployment of agents for composition and execution of web services , although they have not considered the reliability or trustworthiness of the agents employed. Paes, Almeida, Lucena & Alencar (2004) [8] proposed FROG to enforce secure interaction protocols in MASs. Tsai, Zheng, Chen, Huang, Paul and Liao (2004) [12] proposed service oriented software reliability model for atomic and composite web services. Agerri & Alonso (2005) [1] proposed rights based framework that mainly focuses on communication semantics and the pragmatics. However, it http://www.fipa.org © 2013 ACEEE DOI: 01.IJCOM.4.1.1003 19
  • 2. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013 fails to cover other patterns of conversations and mechanisms to punish violations. Huynh, Jennings & Shadbolt (2006) [5] presented a trust and reputation model called FIRE based on the assumption that agent report their trust information truthfully which is not possible in open, dynamic MAS. Wang & Singh (2007) [13] presented a theoretical development of trust that would work in variety of situations where evidence based trust reports are desired. Their work contributes a mathematical understanding of trust. However extension of this work from binary to multi-valued events is left as part of future work. Novak (2008) [7] highlighted FIPA complying platforms are not suitable for development of open heterogeneous MASs. Wu (2008) [14] proposed a norm based CNP for improving the efficiency and effectiveness of the coordinating processes in a MASs. Singh, Juneja & Sharma (2010) [10] proposed a variation of CNP incorporating trust establishment mechanism into it, thereby facilitating agents to have initial trust with their communicating counterparts, however ensuring reliability of those trusted agents is still left. The literature survey presented above highlights that researchers had been recommending for trust establishment mechanisms in agent communication and some variations in CNP has also been proposed. However, reliability of communicating agents is completely ignored. Reliability of communicating agents has not been paid any attention so far, although it’s an equally essential dimension to be focused upon. Both CNP and CNTEP work on broadcast-based communication strategy, thus even after ensuring the trustworthiness of task agents, they may come out to be unreliable leading to wasted efforts. On the other hand delegating the task to trustworthy and reliable agents will improve the probability of successful task completion, resulting in enhanced customer satisfaction. Next section elaborates the proposed new variation of CNTEP involving agent reliability computation mechanism, thereby termed as Reliable Contract Net Trust Establishment Protocol (RCNTEP). contract net trust establishment protocol (RCNTEP) has been proposed in existing CNTEP to help monitor and select effective communication partners. Before proposing the main RCNTEP, following basic terms must be understood: TPC: TPC stands for Trust Percentile Certificate that is official document of trust for an agent generated by CNTEP. Without this document no agent is permissible to send their bids to composite/initiator agent. Bid_Packet: Bid_Packet is a combination as given below: Bid_Packet= <Agentid, Condition,Cost,Time_ Required,Bid,TPC>  Bid_Record_Table: It maintains the record of all Bid_Packets received for a particular proposal. For every proposal, initially it is empty and it is populated with the information from Bid_Packets arriving subsequently. Agent Reliability Table: This table contains the reliability parameter values for Atomic_Agents. It comprises of TPC, Reliability Value (RV), Conditions and Time. RV: RV stands for Reliability Value of participating agents, calculated by initiator agent. It ranges between possible set of values that is {…..-2,-1, 0, +1, +2…..}. If RV of an Atomic_Agent exceeds the negative threshold value, the corresponding Atomic_Agent is permanently blocked from bidding. Condition: Condition refers to the constraints imposed on the task performance by the composite agent (CA). These conditions has to be taken care of by Atomic_Agent while executing the task. Result: Result specifies the information (material) and its format to be provided by Atomic_Agent to the CA after the task is successfully executed. Result of task execution may be either complete, incomplete or failure_to_complete. A task successfully completed is indicated by OK entry in ART, incomplete or failure_to_complete is indicated by NOK entry. Time: Time is the total duration required for the completion of the task. This attribute can take three possible values: Max for utmost time, Min for less time and Mod for moderate timing. The composite agent will decide the range for Max, Min and Mod depending upon the task to be delegated. In RCNTEP participating agents are Atomic_Agents and Composite_Agents (CA). Atomic_Agent performs a specific task independently and do not further divide the same, whereas Composite_Agent itself comprises of various Atomic_Agents and provides a service to the user by dividing it among atomic agents. Thus it depends on these atomic agents for accomplishment of its task. Figure 1 provides the high level view of RCNTEP where CAi is a composite agent that is further composed of atomic agents named Atomic_Agent 1…… Atomic_Agent i……...Atomic_Agent n. These Atomic_Agents are answerable to their corresponding Composite_Agents. Whenever there is a task to be performed, Composite_Agent generates a call for proposal and sends it to Atomic_Agents associated with it. The interested Atomic_Agents proceed for bid submission. Before submitting their bid Atomic_Agent initiates CNTEP to get its TPC (the procedure for computing trust percentile has already been discussed in [10]). Since the focus of this work is to III. PROPOSED WORK Reliability and trust are two important dimensions for ensuring efficient and fruitful agent communications in dynamic, open and distributed environments such as Internet. In such open environments agents are created by variety of stakeholders for various purposes and they may join or leave MAS dynamically depending on their own motives. Thus there is large possibility that the agents involved in communications and in providing services are likely to be un-reliable, self-interested and possessed with incomplete knowledge. Agent reliability is further degraded by the fact that they are intelligent and may change their plan of action depending on their motives and intentions, which also keep on changing with time. In the light of above facts, credibility of the agents becomes questionable and leads to necessity of a mechanism for ensuring credibility of the agents before delegating task to them. To meet above stated needs, a reliable © 2013 ACEEE DOI: 01.IJCOM.4.1.1003 20
  • 3. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013 no other Atomic_Agent is free/interested in bid submission or no other Atomic_Agent is capable for a specific task, BEA is forced to consider less reliable Atomic_Agent giving it a chance to improve its reliability for future. Conditions and Time entries are populated once the task is delegated to Atomic_Agent and is completed by it. On successful completion Composite_Agent analyzes whether Atomic_Agent satisfied all the imposed constraints and the time it consumed. Time is analyzed and entered in ART even on unsuccessful completion. B. Working of RCNTEP The working of RCNTEP is explained in figure 2. As can be seen, the working of RCNTEP is divided in eleven steps. These steps are explained as follow: 1 Composite_Agent generates cfp and sends it to all possible Atomic_Agents who might be interested in that cfp. CA might consult the directory listing the functionality of Atomic_Agents. 2 On receiving cfp, the Atomic_Agents are not permitted to respond back immediately to Composite_Agent unless and until they possess the TPC from CNTEP. Thus for getting TPC Atomic_Agents call CNTEP. For detailed working of CNTEP, refer to [9]. 3 CNTEP returns TPC to all atomic agents (Atomic_Agent 1…….Atomic_Agent i…….. Atomic_Agent n) after calculating their trust percentile. 4 After getting TPC the Atomic_Agent makes a packet of TPC and its bid and sends this Bid_Packet to the concerned Composite_Agent. 5 Composite_Agent forwards all Bid_Packets to BEA demanding for the most reliable agent. 6 BEA records every Bid in Bid_Record_Table and enters TPC value in Agent_Reliability_Table. 7 When bid submission date expires, BEA first analyses Bid_Record_Table to shortlist the Atomic_Agents having least cost and time specification. Then it accesses Agent_Reliability_Table to compute the most reliable agent among all the candidate agents. Evaluation process is based on various parameter values like high TPC, high RV, fulfillment of specified conditions and minimum time duration and above all successful completion of earlier designated tasks. A reliability_score is computed for every shortlisted agent using the formula: Reliability_score Figure 1. High Level View of RCNTEP compute the reliability of a participating agent which is based on the exisiting design of CNTEP, it is only after getting the TPC, Atomic_Agent generates a Bid_Packet and submits the same to Composite_Agent which in turn forwards it to Bid Evaluation agent (BEA). BEA is supported with two data structures namely Bid_Record_Table a nd Agent_Reliability_Table which help in bid evaluation and reliability assessment. When an Atomic_Agent interacts with this system for the first time, an entry for it is created in Agent_Reliability_Table with its initial TPC value. In contrast, if an Atomic_Agent has earlier interacted with the system its entry exists in Agent_Reliability_Table illustrating its past behavior and the TPC value is updated in the same record. Reliability Value of an agent refers to its credibility for Composite_Agent. When an Atomic_Agent interacts with Composite_Agent for the first time its RV is set to 0 i.e. unknown since the Atomic_Agent is yet to prove its credibility. Once a task is delegated to an Atomic_Agent and it successfully completes it, Composite_Agent increases its RV value by 1 i.e. RV=RV+1 (2) Whereas if due to any reason agent doesn’t complete its task within specified time its RV is decremented by 1 leading it to RV=RV-1 (3) When RV of an Atomic_Agent reaches threshold of negative RV (assumed to be -5, in this case), it is debarred from further bid submission. However if an agent gets negative RV, it may improve its performance next time and get its RV changed to positive side. BEA give least priority to Atomic_Agent having negative RV, but in certain cases when © 2013 ACEEE DOI: 01.IJCOM.4.1.1003 (4) Where  represents the number of interactions agents have had with the system.  conditions are interpreted as either True (1) or false (0)  Time shall be interpreted as {Max=-1, Moderate =0 , Min=+1}  Results are interpreted as {Complete=+1, Failure=0 , Incomplete=-1} 21
  • 4. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013 Figure 2. Architecture of RCNTEP Once the reliability score is available for appealing agents, most reliable agent is selected based on highest reliability score: Reliable_Agent=Max(Reliability_score) (5) In case of more than one agent having highest reliability_score, the agent who submitted the BP first is chosen for task delegation. 8 The BEA returns most reliable agent_id to Composite_Agent. 9 Composite_Agent then awards the task to Atomic_Agent nominated by BEA through step 8. 10 The awarded Atomic_Agent is required to inform the status of designated task to Composite_Agent within a specified period. 11 If the Composite_Agent is satisfied with the results supplied by Atomic_Agent then it increases RV by +1 otherwise decrease it by 1. These values are updated in the Agent_Reliability_Table for future use. The figure 3 given below provides the flow diagram of RCNTEP. The algorithms of various agents involved in RCNTEP are given in figures 4(a)-4(d) below:C. Result Analysis For testing the proposed work a prototype of the above framework was developed in JADE. The results of execution of RCNTEP are compared with execution of CNTEP and significant improvement in efficiency of task execution has been observed. The figures 5(a)-5(d) given below illustrate the difference in performance of CNTEP and RCNTEP. Although CNTEP placed limit on the number of contractors which can be considered for task delegation, in contrast to © 2013 ACEEE DOI: 01.IJCOM.4.1.1003 Figure 3. Flow Chart of RCNTEP standard CNP (see fig. 5(a) below), but due to lack of reliability feature success rate of task performance was not improved much. Now with introduction of reliability computation mechanism, number of contractors considered for task 22
  • 5. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013 Figure 4(c) Algorithm for Bid Evaluation Agent Figure 4(a) Algorithm for Composite Agent Atomic_Agent ( ) Input: cfp; Output: Bid_Packet, results; Figure 4(d) Algorithm for RCNTEP { on( cfp) activate; if(interested(cfp) { enter cfp in list; get TPC Ħ Execute ( CNTEP); generate Bid; create Bid_Packet=Trust_Percentile_Cretificate + Bid; return (Bid_Packet); } else sleep; } Figure 4(b) Algorithm for Atomic Agent delegation is further reduced (shown in figure 5(b) below). It is clear from the graph below that number of contractors has been reduced considerably. However, performance analysis of CNTEP and RCNTEP clearly highlights that with RCNTEP the success rate of task execution & completion improves significantly. Since with RCNTEP, only reliable contractors are considered for task delegation, which saves bandwidth consumption in managing © 2013 ACEEE DOI: 01.IJCOM.4.1.1003 Figure 5(a) Performance of CNTEP in Terms of Task Delegation failed contracts, provides timely results to the end users and improves quality of service. 23
  • 6. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013 CONCLUSIONS This work has presented a new variation of already proposed Contract Net Trust Establishment Protocol (CNTEP) by incorporating reliability computation mechanism in it. The obtained results were analyzed in terms of task performance and significant improvement could be observed in terms of successful task completion, timely response to the user and better bandwidth utilization by reducing contract failures. Thus this work significantly improved task performance mechanism of agents in comparison to the traditional CNP. REFERENCES [1] Agerri R. and Alonso E., “Semantics and Pragmatics for Agent Communication”. In EPIA 2005, LNAI 3808, pp. 524-535. [2] Alibhai Z., “What is Contract Net Interaction Protocol?” .IRMS Lab,SFU, Jul. 2003. [3] Bui H.H., Venkatesh S. and Kieronska D., “A Framework for Coordination and Learning Among Team of Agents”, Lecture Notes in Artificial Intelligence, vol. 1441, pp. 164–178. Springer-Verlag, 1998. [4] E. Michael Maximilien and Munindar P. Singh, ‘Reputation and Endorsement for Web Services’. Published in Newsletter ACM SIGecom Exchanges - Chains of commitment , Volume 3, Issue 1, Winter, 2002 Pages 24 – 31. [5] Huynh D., Jennings R.N., and Shadbolt R.N., “Developing an Integrated Trust and Reputation Model for Open Multi-Agent Systems”. Autonomous Agents and Multi-Agent Systems, vol. 13, No.2, pp. 119- 154, September, 2006. [6] Maamar Z., Sheng Q. Z. and Benatallah B., ‘Interleaving Web Services Composition and Execution Using Software Agents and Delegation’. Published in Proceedings of First International Workshop on Web Services and Agent- Based Eng. (WSABE ’03), held in conjunction with the Second International Joint Conf. Autonomous Agents and Multi-Agent Systems (AAMAS ’03), 2003. [7] Novak P., “Communication Platform for Open heterogeneous MASs”. In IFI Technical Report Series.IFI-08-13, December 2008. [8] Paes B.D.R., Almeida D.O.H., Lucena D.P.J.C. and Alencar S.C.P.,”Enforcing Interaction Protocols in Multi-Agent Systems”. In PUCRioInf. MCC 09/04 March, 2004. [9] Poslad S. and Calisti M., ‘Towards Improved Trust and Security in FIPA Agent Platforms’. Published in In Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies, Spain, 2000. [10] Singh A., Juneja D. and Sharma A.K.(2010), ‘Introducing Trust Establishment Protocol in Contract Net Protocol’. Proceedings of 2010 IEEE International Conference on Advances in Computer Engineering, Bangalore, India, June 21-22, 2010. [11] Smith G.R., “The Contract Net Protocol: High-level Communication and Control in a Distributed Problem Solver”. In IEEE Transactions on Computers, Vol. C-29, No. 12, December 1980. [12] Tsai W. T., Zhang D., Chen Y., Huang H., Paul R.and Liao N., ‘A Software Reliability Model For Web Services’. Published in the 8th IASTED International Conference on Software Engineering and Applications, Cambridge, MA, November 2004, pp. 144-149. Figure 5(b) Contract Delegation Ratio of CNTEP & RCNTEP Figure 5(c) Performance with CNTEP Figure 5(d) Performance with RCNTEP © 2013 ACEEE DOI: 01.IJCOM.4.1.1003 24
  • 7. Full Paper ACEEE Int. J. on Communications, Vol. 4, No. 1, July 2013 [14] Wu J., “Contract Net Protocol for Coordination in MultiAgent System”. Proc. of 2nd International Symposium on Intelligent Information Technology Application, pp. 10521058, 2008. [13] Wang Y. and Singh P.M., “Formal Trust Model for Multiagent Systems”. Proceedings of 20th International Joint Conference on Artificial Intelligence (IJCAI-07), pp. 1551-1556, 2007. [15] Y. Mass and O. Shehory, “Distributed Trust in Open Multi-Agent Systems”. Trust in Cyber-Societies, pp. 159–173. Springer-Verlag, Berlin Heidelberg, 2001. © 2013 ACEEE DOI: 01.IJCOM.4.1.1003 25