true for higher α. If multiple TC are allowed, an ex-
cluded agent cannot join the same TC again, but is
allowed to join any other (this is also the reason why
there are more exclusions, considering the changed
value range in Figure 9). To explain why reputation-
based performs better than accusation-based, we have
to consider the peculiarities of these two strategies.
Both use a form of history when judging which agents
should be observed: the accusation-based strategy
is more likely to observe agents which accumulated
more accusations in the past than agents that did not
do so. The reputation-based strategy is more likely to
observe agents with a low reputation (relative to the
other TC members). If an agent is excluded from a
TC, its accusations are reset: the TCM of the new TC,
where this agent becomes a member, does not know
about former accusations in other TC. In contrast to
that, when the TCM uses the reputation-based strat-
egy, there is already some information available for
the TCM in form of the agent’s reputation. Therefore,
from the moment the agent enters the new TC, it is
already more likely to be observed. Thus, the results
focussing on the number of exclusions as well as t
res
of the reputation-based strategy are superior to those
of the accusation-based strategy.
6 RELATED WORK
Our application scenario described in Section 2 is a
Desktop Grid System. We model our grid nodes as
agents, which can be seen as black boxes. Thereby,
we cannot observe the internal state. Thus, their ac-
tions and behaviour can only be predicted with un-
certainty (Hewitt, 1991). Our TDG supports Bag-of-
Tasks application (Anglano et al., 2006). A classifi-
cation and taxonomy of Desktop Grid Systems can be
found in (Choi et al., 2007), respectively (Choi et al.,
2008).
Desktop Grid Systems are used to share resources
between multiple administrative authorities. One ex-
ample for a peer-to-peer based system is the Share-
Grid Project (Anglano et al., 2008). A second ap-
proach is the Organic Grid, a peer-to-peer based
approach with decentralised scheduling (Chakravarti
et al., 2004). Compared to our system, these ap-
proaches assume benevolence (Wang and Vassileva,
2004), i.e. that there are no malicious agents partic-
ipating and misbehaving. Another approach is the
open source Berkeley Open Infrastructure for Net-
work Computing Project (BOINC) (Anderson and
Fedak, 2006) or XtremWeb (Fedak et al., 2001),
which aims at setting up a Global Computing ap-
plication and “harvest[ing] the idle time of Inter-
net connected computers which may be widely dis-
tributed across the world, to run a very large and
distributed application” with an ad-hoc verification
process for participating computers. We introduce a
trust metric (see Section 2.5) with a reputation sys-
tem to cope with the problem of misbehaving agents.
A panoramic view on computational trust in Multi
Agent Systems can be found in (Ramchurn et al.,
2004), (Castelfranchi and Falcone, 2010), or (Sabater
and Sierra, 2005). Sabotage-tolerance and distributed
trust management in Desktop Grid Systems was eval-
uated in (Domingues et al., 2007). Here, mechanisms
for sabotage detection are presented, but proposed for
a paradigm of volunteer-based computing. Trust is
also used in other disciplines such as philosophy (Kar-
lins and Abelson, 1959), psychology (Hume, 1739),
or sociology (Buskens, 1998).
7 CONCLUSION
In this paper, we presented several strategies to find
and exclude malicious or bad behaving agents from
open, distributed multi-agent systems. We have to
differentiate between quantity-based strategies (such
as the random-based, the round-robin-based, and the
Lottery-based strategy) and quality-based strategies
(like the accusation-based and the reputation-based
strategy). To show the advantages and disadvantages
of these strategies, we implemented them in our appli-
cation scenario, the Trusted Desktop Grid (TDG). In
several evaluations we showed the influence of the pa-
rameters acceptance rate (how many work units does
one agent accept?), surveillance rate (how much bud-
get do we have for surveillance, how many agents
can we observe within a certain period of time?), the
forgiveness (when will a former incident be forgot-
ten?), as well as the incidents before exclusion. We
found out that in most cases (especially at low surveil-
lance levels) the quality-based strategies perform bet-
ter than the quantity-based strategies. For future work
we plan to further improve the TDG and the surveil-
lance in multi-agent systems, e.g. by establishing a
dynamic surveillance. This means, the choice of the
current strategy used for surveillance will depend on
a dynamically changing surveillance budget to make
the system more realistic and life-like.
REFERENCES
Anderson, D. and Fedak, G. (2006). The Computational and
Storage Potential of Volunteer Computing. In Proc. of
CCGRID 2006, pages 73–80. IEEE.
Comparison of Surveillance Strategies to Identify Undesirable Behaviour in Multi-Agent Systems
139