<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Supporting Agent CoT Groups Formation by Trust</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Department DICEAM, University of Reggio Calabria, Loc. Feo di Vito</institution>
          ,
          <addr-line>89122 Reggio Cal.</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department DIIES, University of Reggio Calabria, Loc. Feo di Vito</institution>
          ,
          <addr-line>89122 Reggio Cal.</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Department DIMES, University of Calabria</institution>
          ,
          <addr-line>Via P. Bucci, cubo 41c, 87036 Rende, CS</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Department of Mathematics and Informatics, University of Catania</institution>
          ,
          <addr-line>Viale Andrea Doria Catania</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>Gianfranco Fortino</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <fpage>71</fpage>
      <lpage>76</lpage>
      <abstract>
        <p>-IoT devices dealing with complex tasks require powerful hardware capabilities or to get resources on the cloud. When an IoT device is “virtualized” on the Cloud, it can rely on one or more software agent that can exploit its social attitude to interact and cooperate. In this context, the choice of a partner to cooperate is a sensitive question but when an agent cannot perform a reliable choice then, like real communities, it can ask information to other agents it considers as trustworthy. This process can be improved by partitioning the agents in groups by using trust relationships to allow agents to interact with the most reliable partners. To this aim, we designed an algorithm to form agent groups based on reliability and reputation information and the results of some simulations confirmed its potential advantages. Index Terms-Cloud Computing; Cloud of Things; Internet of Things; Multiagent system; Reputation; Trust; Voting</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        Recently, the “Internet of Things” (IoT) and Cloud
Computing (CC) converged into the so called Cloud-of-Things [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ],
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] (CoT) for supporting computational and storing
requirements [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] of ubiquitous and heterogeneous IoT devices, also
in nomadic scenarios [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Moreover, to promote cooperation
among IoT devices, they can be also associated with software
agents [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]–[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] for taking benefit from their social attitudes.
      </p>
      <p>
        In this context, the choice of a reliable partner needs of
suitable information that can be also required as
recommendations to trustworthy agents. To this aim, we propose of
supporting this process by encouraging agents to form groups
of reliable recommenders exploiting some type of social
relationships existing among the group members [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
For instance, an important property within a community is a
high level of mutual trustworthiness among its members [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ],
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Therefore, we consider the trust-based processes to form
agent groups of reliable recommenders over a CoT context as
potentially capable to significantly improve the IoT devices
activities.
      </p>
      <p>
        To this aim, we consider a CoT environment where
heterogeneous devices consume/produce services and/or
extract/exchange knowledge assisted by personal software agents
working over the CC. We take into account a specific scenario
where each IoT device and its associated agent are considered
a single entity; moreover, we also take into account the
dynamicity of agents in the CoT environment, i.e. their ability
to change groups based on their own convenience [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ].
      </p>
      <p>
        The basic idea is that, the generic consumer agent, when
using some data services (s) from a provider agent, should
consider its past experiences. When no data about paste
experience does exist, the agent will exploit the
recommendation given by the community [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. In particular, the
agents belonging to the same group of the agent who has
requested the opinion/recommendation of the provider agent,
will provide the information for free, otherwise a fee has to
be paid for the recommendation/opinion. This approach leads
to a competitive scenario on which groups/agents are
interested in accepting/belonging to those agents/groups having
a high reliability and helpfulness. Moreover, to evaluate the
helpfulness of an agent we consider the effectiveness of its
recommendations, while for a group it is the average of the
helpfulness of its members.
      </p>
      <p>
        In order to maximize the benefits of an agent to join
with a group (and vice versa), we exploit trust measures to
model a distributed group formation process. In particular,
we designed a distributed algorithm matching devices and
groups to improve individual and global satisfaction [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ], [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]
into the CoT on the basis of trust measures considering the
agent helpfulness in providing useful recommendations. In
this respect, as it happens in real user communities, in place
of the global reputation, we adopt a local reputation [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]
approach where the reputation value is based on the opinions
coming from the friends (or friends of friends and so on)
of an agent. This local approach gives important benefits in
a CoT context, among which i) heavy computational tasks
and communication overloads can be avoided when collecting
opinions and evaluating the trustworthiness of their sources
and ii) the system reactivity is increased.
      </p>
      <p>
        Moreover, likely processes having place in human
societies [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], groups are formed by using a voting mechanism,
where each vote combines reliability and local reputation
measures. Finally, to form groups with a high level of mutual
trust among its members we designed a distributed algorithm
for group formation (see Section III) that we verified, in terms
of efficiency and effectiveness, by means of some experiments,
on a simulated agent CoT scenario, which confirmed our
expectations.
      </p>
      <p>The rest of the paper is organized as follows. Section II
describes the adopted local trust model and voting mechanism,
while Section III presents an algorithm to form groups. The
experimental results are dealt in Section IV and in Section V
the related literature is presented. Finally, in Section VI some
conclusions are drawn.</p>
    </sec>
    <sec id="sec-2">
      <title>II. THE LOCAL TRUST MODEL</title>
      <p>
        For convenience, we represent the agents trust relationships
as a graph G, in which a direct edge linking two nodes (i.e.,
agents) is associated with the trust level (ranging [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] ∈ R,
where 0/1 means the minimum/maximum value) an agent has
in another agent, and the ego-network Ei of an agent ai ∈ A
as a sub-graph Ei ⊆ G including those nodes (i.e., agents)
connected to ai in a fixed depth (see Figure 1).
      </p>
      <p>For the generic nodes i, j ∈ G (i.e., the associated agents ai
and aj ), the measure of the local trust τi,j that i has about j
combines the reliability ρi,j (i.e., a measure of the confidence
that ai has about the capability of aj of providing good
suggestions) and the local reputation σi,j (i.e., a measures of
how much, on average, the agents of Ei estimate the capability
of aj of having good interactions).</p>
      <p>
        Usually, ρi,j 6= ρj,i is an asymmetric measure computed as:
ρi,j =
1q · Xq fi,kj
k=1
by means of all the feedback fi,j ∈ [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] ∈ R assigned by ai
to aj for each of the q interactions carried out with it. To this
aim, let recr,j ∈ [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] be the suggestion given by ar about
aj and let ǫi,r ∈ [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] be the (average) helpfulness perceived
by ai about the capability of ar to provide suggestions1. In
detail, the helpfulness ǫi,r of ar perceived by ai is computed,
with respect to the feedback released by ai for each of the m
accepted suggestions provided by ar to ai about other agents,
as:
ǫi,r =
1
m
      </p>
      <p>m
· X |fs − recs|</p>
      <p>s=1</p>
      <p>To give relevance to the recommender agents in Ei which
are closer to ai, it is used a parameter ω computed as:
1If any recommendation was provided by ar to ai, then the helpfulness of
ar perceived by ai will be ǫi,r = 0.
where bl(i,r) is the shortest path between ai and the
recommender agent ar. Now, by assuming that ai, in its ego-network,
is able to exploit a number p of recommenders to receive
recommendations about aj , then σi,j can be calculated as:
1 · Xp
p</p>
      <p>r=1
σi,j =</p>
      <p>ǫi,r · ωi,r · recr,j .</p>
      <p>
        The trust measure that an agent ai has about an agent aj
can be computed by combining reliability and local reputation
(which also takes into account the helpfulness) as:
τi,j = αi · ρi,j + (1 − αi) · βi · σi,j
where α and β are two parameters ranging in [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] ∈ R. The
parameter α simply weights reliability and local reputation for
giving more or less relevance to one or other. The parameter
β is computed as βi = p/kEi(x)k and takes into account the
dependability of σi,j on the number of p nodes belonging to
Ei that contributed to compute σi,j (indeed, if the number of
these nodes is small then the local reputation measure loses
of relevance because ai will not have a sufficient information
from its Ei about aj ). Note that for a newcomer agent, suitable
“cold start” values of reliability, reputation and helpfulness are
adopted.
      </p>
      <p>The “trustworthiness” of a group g, as perceived by ai (i.e.,
τi,g), is determined by simply averaging all the trust measures
computed by ai for all the agents belonging to g. Similarly,
the “trustworthiness” of an agent ai, as perceived by a group
g (i.e., τg,i), is obtained by averaging all the trust measures
about ai computed by all the agents belonging to g.</p>
      <p>
        Finally, when a decision about a new membership with a
group g has to be taken, all the agents belonging to g give a
preference (i.e., a vote) v ∈ {0, 1} to accept or not this agent
into g (e.g., 0/1 means “not accept” “accept”) [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. The vote
depends from i) the local trust measure that the voter computed
about the candidate, also exploiting the recommendations
coming from its ego-network and ii) a suitable threshold Γg ∈ [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ]
that worth 0 (i.e., 1) if τ &lt; Γg (i.e., τ ≥ Γg). In the following,
we represent the voting process referred to a group g for a
potential new member y by adopting the voting criterion v
proposed above, as the output of a function V (g, v, y). For
instance, a reasonable strategy may be of adopting a majority
criterion for accepting a requester into a group.
      </p>
      <p>
        III. THE DISTRIBUTED AGENT GROUPING ALGORITHM
This section presents the distributed agent grouping
algorithm formed by two procedures respectively executed by each
agent: i) belonging to the CoT for finding the “best” groups to
join with, in terms of average value of τi,g (where g identifies
a generic group); ii) acting as group administrator to evaluate
if affiliating a new member with the group itself based on the
mutual trust among the group members and the potential new
member. The symbols used in the description of the algorithm
are listed in Table I.
a) Algorithm 1: It is executed by the agent ai to improve
its configuration of groups in terms of overall mutual trust
with the related peers. More in detail, let Hi ⊂ Gr be the
set of the groups which ai belongs to and for which ai stores
the local trust measure τi,g of each group g ∈ Hi ⊂ Gr
contacted in the past and let tˆg be the time elapsed from its
last updating. Moreover, let W be a parameter specifying the
maximum number of groups that an agent can join with, let
M be the maximum number of groups the generic agent is
capable to analyze, let πi be a time threshold fixed by the
agent ai and, finally, let θi ∈ [
        <xref ref-type="bibr" rid="ref1">0, 1</xref>
        ] be a threshold on the trust
value between the agent ai and the generic group g ∈ Hi.
      </p>
      <p>Firstly, the values of τi,g are updated if older than πi (lines
1-3). Then, it is built a set of candidate groups Sc, with kSck &lt;
W , sorted in decreasing order based on the values τi,g of the
groups, while Y is a set of groups randomly chosen and with
the set Z = Y S H. The sets Y , Z and Sc might store the
groups already belonging to Hi, while some others might be
new groups that were selected at random and put into the set
Y . Based on the groups in Sc not belonging to Hi, the agent ai
could improve the quality of its choices by joining with those
groups. The two loops in lines 6-16 represents the kernel of
the procedure, after that Hi = Sc.</p>
      <p>b) Algorithm 2: It is performed by the administrator ag
of a CoT group g once an agent, denoted as ai, sends a join
request to ag. Let Kg ⊂ Gr be the set of the agents affiliated
to g, where kKk ≤ R (with R the maximum number of agents
allowed to be affiliated with g), let the set X be X = Kg S ai,
where ai is the agent candidate to be affiliated with g and let
φ a time threshold fixed by the administrator ag. Moreover,
the administrator ag of a group g stores the values of the local
trust computed by the members of its group for ai which desire
to join with, and the timestamp t˜i of its retrieval.</p>
      <p>Firstly, the administrator ag asks to the members of its group
the updated local trust values about ai (lines 1 − 5), then if:</p>
      <p>Algorithm 1 The procedure executed by a CoT agent.
Input: Hi ⊂ Gr, W, πi, θi; Y = {g ∈ G} a set of groups randomly
selected : kY k = M ≤ W , Hi T Y = { }, Z = (Hi S Y )
1: for g ∈ Z : tˆg &gt; πi do
2: Compute τi,g by exploiting the agents belonging to g.
3: end for
4: m ← 0
5: Let be Sc = {g ∈ Z : τi,g ≥ θi}, with kSck = W
6: for all g ∈ Sc : g 6∈ Hi do
7: send a join request to the agent administrator of g
8: if g accepts the request then m ← m + 1
9: end if
10: end for
11: for all g ∈ Hi : g 6∈ Sc do
12: Sends a leave message to g
13: m ← m − 1
14: if (m==0) then break
15: end if
16: end for
Algorithm 2 The procedure executed by a group administrator.
Input: Kg, R, ai, φ, X = Kg S{ai};
1: for all k ∈ Kg do
2: if t˜i ≥ φ then ask to k for updating local trust values of ai
3: end if
4: end for
5: if kXk &lt; R then
6: if V (g, v, ai) == 1 then Send an accept message to ai
7: else Send a reject message to ai
8: end if
9: else
10:
11:
12:
for all k ∈ X do compute τk,ai
end for</p>
      <p>Let X′ = {k1, k2, . . . , kkKgk+1} with ki ∈ X S{ai},
ordered by trust with τg,m ≥ τg,n iff m &lt; n
if X[kKgk + 1] == ai then Send a reject message to ai
else
13:
14:
15: Send a leave message to the node X[kKgk + 1]
16: Send an accept message to ai
17: end if
18: end if
1) ||X|| &lt; R (line 6), then all the agents in g give a vote.</p>
      <p>The function V (·), see Section II, combines all the votes
to determine if the agent ai is admitted or not in g.
2) ||X|| = R and the agent ai is admitted into the group in
place of another agent. To make comparable the agents,
a natural measure is the trust of the group vs the agent
itself, which is computed as explained in Section II (line
16). In particular, τg,n denotes the current value of trust
between the group g and the agent kn ∈ X S{ai}.</p>
      <p>The first scenario is dealt with in lines 6 − 11, while the
second one into lines 12 − 18 of Algorithm 2.</p>
    </sec>
    <sec id="sec-3">
      <title>IV. EXPERIMENTS</title>
      <p>Some experiments have been carried out to test the
capability of the proposed algorithm to form groups having a higher,
in average, mutual trust among their members of that obtained
from different compositions. The reader may refer to Table II
for the list of experimental parameters.
3.5
2.5
0.5
4
3
1
0</p>
      <p>A network of 1000 different CoT agents (each one
associated with a IoT device), 1000 initial trust relationships
and |Gr| groups, randomly formed, were generated. Trust
values were set by adopting a normal distribution and with
the ratio between trusted/distrusted agents set to 0.5. During
the simulation the initial sparsity of the trust network will
decrease for the availability of new reliability information.</p>
      <p>At each simulation step some interactions among a subset
of the agents was simulated and their “quality” evaluated
by simulated feedback. For unreliable and reliable agents,
the values of feedback were generated based on a normal
distribution; these and the other simulation parameters are
shown into Table II. More in detail, for each simulation step:
1) a number of interactions is simulated among agents;
2) 100 execution of the algorithm are simulated by
triggering the algorithm 1 on 100 different agents randomly
selected. For each agent request to join with a group, the
administrator executes the algorithm 2 to decide whether
or not to accept the requiring agent;
3) some statistics are computed.</p>
      <p>To evaluate the simulation results, the measure Average
Mutual Trust among the components of a group g as:
AM T g =</p>
      <p>(τi,j + τj,i)
1
2kgk
kgk
X
i,j=1
i6=j
and the Mean Average Mutual Trust, for a certain configuration
at a certain time-step, as:
1
kGrk</p>
      <p>X
kGrk i=1
M AM T (Gr) =</p>
      <p>AM T gi
were defined.</p>
      <p>The first set of results is shown in Figure 3 and reports the
median value of MAMT measured after each single step of
the simulation for the different values of M = [5 ÷ 10] for
the first 30 steps of the simulation. For M = 5 is shown a
slow convergence of the MAMT values, while for M ≥ 6 there
exist a radical change. Indeed, the parameter M represents the
number of new groups analyzed by the single agent ai in the</p>
      <p>TABLE II</p>
      <p>EXPERIMENTAL SETTINGS
Parameter
General
No. of Agents (kAk)
No. of Feedbacks per step (Poisson distrib.)
Agents Performance (Reliability and trust)
Low Performance (Normal Distribution)
High Performance (Normal Distribution)
Cold start value of trust
Ratio of reliable/unreliable agents
Group formation
K (Max no. of agents per group)
M (Max no. of groups an agent analyzes)
kGrk (No. of groups)
lMax (Maximum recommender distance)
θ (Minimum value of trust for a group to be
selected as candidate for group formation)
Value
execution of Algorithm 1, which are then mixed with groups
already present in the set Hi, in the new set Sc. Therefore,
the higher the parameter M , the higher the number of new
groups analyzed in the algorithm 1, the higher the probability
to join with a new group containing distrusted agents and
replacing that showing the worst value of trust (by increasing
the MAMT value because, sooner or later, distrusted agents
will leave groups). Moreover, the presence into the all groups
of distrusted agents at different simulation steps per different
values of M is shown in Figure 4. Results confirm that almost
distrusted agents are replaced by trusted agents into the groups.</p>
      <p>Therefore, the execution of the distributed algorithm for
group formation leads to a configuration of groups with a
high level of (average) mutual trust among their members. In
particular, in a simulated environment, the convergence of the
algorithm towards a group configuration with trusted agents
can be very fast, when the algorithm parameters are properly
set (e.g. parameter M ), leading to ruling out the unreliable
agents from the groups very quickly.</p>
    </sec>
    <sec id="sec-4">
      <title>V. RELATED WORK In open, competitive and distributed contexts a large number of potential threats exist and, to this aim, trust systems can avoid to be engaged with unreliable partners [21]–[26].</title>
      <p>T
AM 0.65
M
0.85
0.8
0.75
0.7
0.6
0.55
0.5
0.45</p>
      <p>M=5
M=6
M=7
M=8
M=9</p>
      <p>M=10
0
5
10
20
25</p>
      <p>30
15</p>
      <p>Step
Fig. 3. MAMT - results until 30 Steps
500
450
400
ts 350
gen 300
dae 250
t
rsu 200
tnU 150
100
50
0</p>
      <p>M=5
M=10</p>
      <p>M=15
0
20
40
60
80</p>
      <p>100</p>
      <p>
        Step
With respect to the problem of suggesting to a group (i.e.,
a member of a community) if accepting (i.e., joining with) a
candidate (i.e., a group), several trust-based approaches have
been proposed. For instance, in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] is proofed that
trustbased groups are more stable over time with respect to groups
formed without to consider trust. Indeed, the expectations
of receiving benefits is higher among the members of
trustformed groups. In such a context, the predominance of local
trust is particularly true in large communities where each actor
usually interacts only with a narrowest share of the community.
      </p>
      <p>
        Examples of local trust approaches can be find in [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]
and [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. The first one is TidalTrust which exploits the closer
neighbors to compute its trust predictions, also by ignoring
part of the neighbors if the trust network is too sparse. The
second techniques, named MoleTrust, performs a backward
exploration by fixing a maximum depth in the search-tree of
the trust network to calculate trust scores by using at depth x
only the trust scores at depth x − 1.
      </p>
      <p>
        Independently from the adopted group formation modalities,
to reach a decision within a group voting mechanisms [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ],
[
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] optimize the social utility [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] and avoid conflicts [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ],
although any “ideal” voting procedure exists due to the risks
of manipulations [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]. This aspect is very critical for
software agent communities, where agents can quickly examine
the effects of each manipulation strategy [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]–[
        <xref ref-type="bibr" rid="ref37">37</xref>
        ]. In this
respect, [
        <xref ref-type="bibr" rid="ref38">38</xref>
        ] presents a local trust-based voting, working in
a mobile wireless scenario, where a node is admitted in a
transmission path on the basis of the trustworthiness perceived
by the other nodes. The actual trust of a node is propagated
by mutual acquaintance among neighbors placed at one hop
of distance on an oriented trust network by combining their
confidence values considered as trust measures. A node will
be trusted/distrusted by using a local voting scheme. In [
        <xref ref-type="bibr" rid="ref39">39</xref>
        ]
faulting sensors are discovered by using a trustworthiness
measure, named SensorRank, modeled by a Markov chain on
the sensor network. This value is used in a voting scheme,
named TrustVoting, where each vote implicitly represents the
number neighbors referencing the opinions of a node and by
weighting each vote proportionally to their proximity to the
target node on the sensor network. In [
        <xref ref-type="bibr" rid="ref40">40</xref>
        ] a grid of agent-based
sensors monitoring traffic flows on the roads is described. Each
agent-based sensor of the grid is associated with a road and
gathers, analyzes and aggregates acoustical signals generated
by vehicles in their motion. Based on a distributed
trustsystem, each agent improves own performances by interacting
with other sensors in its neighboring.
      </p>
      <p>
        Finally, some trust systems have been conceived for IoT
and CC contexts. For instance, in [
        <xref ref-type="bibr" rid="ref41">41</xref>
        ] two interacting IoT
devices can mutually trust each other device and propagate
their evaluations to the other nodes with a word of mouth
approach. In [
        <xref ref-type="bibr" rid="ref42">42</xref>
        ] each node evaluates the trustworthiness of
its friend nodes and the opinions of the common friends (by
considering reliability and local reputation measures). A Trust
Management system for a CC marketplace in [
        <xref ref-type="bibr" rid="ref43">43</xref>
        ] evaluates a
multidimensional trustworthiness of the CC providers by
exploiting different sources and trust information. CC federation
are considered in [
        <xref ref-type="bibr" rid="ref44">44</xref>
        ], where a fully decentralized trust-based
model for large-scale federations is designed to allow any node
to find the most suitable collaborators in an efficient way,
avoiding exploration of the whole node space by including
trustworthiness information about the set of candidate nodes.
      </p>
    </sec>
    <sec id="sec-5">
      <title>VI. CONCLUSIONS</title>
      <p>In this paper, a CoT scenario supporting the virtualization
of IoT devices over the cloud in a multi-agent context has
been presented. The social attitude of software agents has been
exploited to form groups for promoting satisfactory agents
interactions. However, a satisfactory interaction depends on
the choice of the partner but in absence of suitable information
to perform an autonomous choice, some suggestions can be
asked to those agents perceived as the mostly trustworthy.</p>
      <p>To this aim, we designed a distributed algorithm to guide
the formation of agent groups of reliable recommenders, in
a competitive and cooperative scenario, exploiting a voting
procedure focused on the agent capability of providing useful
recommendation on the basis of reliability, local reputation
and helpfulness measures. In particular, the adoption of local
reputation measures avoids the heavy computational tasks and
communication overheads required from a global reputation
mechanism because only a little share of the agent community
is involved in this process. Some experiments, in a
simulated agent CoT scenario, confirmed the potential advantages
deriving by our proposal in improving individual and group
satisfaction in terms of mutual trust.</p>
    </sec>
    <sec id="sec-6">
      <title>ACKNOWLEDGMENT</title>
      <p>This study has been developed at NeCS Laboratory
(DICEAM, University Mediterranea of Reggio Calabria).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>M.</given-names>
            <surname>Aazam</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Alsaffar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.-N.</given-names>
            <surname>Huh</surname>
          </string-name>
          , “
          <article-title>Cloud of things: Integrating internet of things and cloud computing and the issues involved</article-title>
          ,
          <source>” in Applied Sciences and Technology (IBCAST)</source>
          ,
          <year>2014</year>
          11th International Bhurban Conference on. IEEE,
          <year>2014</year>
          , pp.
          <fpage>414</fpage>
          -
          <lpage>419</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>P.</given-names>
            <surname>Parwekar</surname>
          </string-name>
          , “
          <article-title>From internet of things towards cloud of things,” in 2011 2nd International Conference on Computer and Communication Technology (ICCCT-</article-title>
          <year>2011</year>
          ),
          <year>Sept 2011</year>
          , pp.
          <fpage>329</fpage>
          -
          <lpage>333</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Botta</surname>
          </string-name>
          , W. De Donato,
          <string-name>
            <given-names>V.</given-names>
            <surname>Persico</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <surname>A</surname>
          </string-name>
          . Pescape´, “
          <article-title>Integration of cloud computing and internet of things: a survey,” Future Generation Computer Systems</article-title>
          , vol.
          <volume>56</volume>
          , pp.
          <fpage>684</fpage>
          -
          <lpage>700</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>G.</given-names>
            <surname>Aloi</surname>
          </string-name>
          , G. Caliciuri, G. Fortino,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gravina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pace</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Russo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Savaglio</surname>
          </string-name>
          , “
          <article-title>Enabling iot interoperability through opportunistic smartphone-based mobile gateways</article-title>
          ,
          <source>” Journal of Network and Computer Applications</source>
          , vol.
          <volume>81</volume>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>84</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>D.</given-names>
            <surname>Uckelmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Harrison</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Michahelles</surname>
          </string-name>
          , “
          <article-title>An architectural approach towards the future internet of things,” in Architecting the internet of things</article-title>
          . Springer,
          <year>2011</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Gravina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Russo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Savaglio</surname>
          </string-name>
          , “
          <article-title>Modeling and simulating internet-of-things systems: A hybrid agent-oriented approach</article-title>
          ,” Computing in Science &amp; Engineering, vol.
          <volume>19</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>68</fpage>
          -
          <lpage>76</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>De Meo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Messina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Postorino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>A reputation framework to share resources into iot-based environments</article-title>
          ,” in
          <source>2017 IEEE 14th International Conference on Networking, Sensing and Control (ICNSC)</source>
          . IEEE,
          <year>2017</year>
          , pp.
          <fpage>513</fpage>
          -
          <lpage>518</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Messina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>Using trust and local reputation for group formation in the cloud of things,” Future Generation Computer Systems</article-title>
          , vol.
          <volume>89</volume>
          , pp.
          <fpage>804</fpage>
          -
          <lpage>815</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>C.-M. Chiu</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.-H. Hsu</surname>
            , and
            <given-names>E. T.</given-names>
          </string-name>
          <string-name>
            <surname>Wang</surname>
          </string-name>
          , “
          <article-title>Understanding knowledge sharing in virtual communities: An integration of social capital and social cognitive theories,” Decision support systems</article-title>
          , vol.
          <volume>42</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>1872</fpage>
          -
          <lpage>1888</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Ferrara</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            , and
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne</surname>
          </string-name>
          `, “
          <article-title>Trust and compactness in social network groups</article-title>
          ,
          <source>” ACM Transactions on Cybernetics</source>
          , vol.
          <volume>45</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>205</fpage>
          -
          <lpage>2016</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Messina</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            , and
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>Combining trust and skills evaluation to form e-learning classes in online social networks</article-title>
          ,
          <source>” Information Sciences</source>
          , vol.
          <volume>405</volume>
          , pp.
          <fpage>107</fpage>
          -
          <lpage>122</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>C.</given-names>
            <surname>Castelfranchi</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Falcone</surname>
          </string-name>
          ,
          <article-title>Trust theory: A socio-cognitive and computational model</article-title>
          . John Wiley &amp; Sons,
          <year>2010</year>
          , vol.
          <volume>18</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Messina</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            , and
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>An agentoriented, trust-aware approach to improve the qos in dynamic grid federations</article-title>
          ,
          <source>” Concurrency and Computation: Practice and Experience</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>F.</given-names>
            <surname>Messina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>A trustbased, multi-agent architecture supporting inter-cloud vm migration in iaas federations</article-title>
          ,
          <source>” in International Conference on Internet and Distributed Computing Systems</source>
          . Springer,
          <year>2014</year>
          , pp.
          <fpage>74</fpage>
          -
          <lpage>83</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>L.</given-names>
            <surname>Palopoli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>A multi-tiered recommender system architecture for supporting e-commerce,” in Intelligent Distributed Computing VI</article-title>
          . Springer,
          <year>2013</year>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>81</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16] --, “
          <article-title>A distributed and multi-tiered software architecture for assessing e-commerce recommendations</article-title>
          ,
          <source>” Concurrency and Computation: Practice and Experience</source>
          , vol.
          <volume>28</volume>
          , no.
          <issue>18</issue>
          , pp.
          <fpage>4507</fpage>
          -
          <lpage>4531</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Blanchard</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Horan</surname>
          </string-name>
          , “
          <article-title>Virtual communities and social capital,” in Knowledge and social capital</article-title>
          .
          <source>Elsevier</source>
          ,
          <year>2000</year>
          , pp.
          <fpage>159</fpage>
          -
          <lpage>178</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Messina</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            , and
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>Recommending users in social networks by integrating local and global reputation,”</article-title>
          <source>in Proc. of the 7th Int. Conf. on Internet and Distributed Information Systems, ser. LNCS</source>
          , vol.
          <volume>8729</volume>
          . Springer,
          <year>2014</year>
          , pp.
          <fpage>437</fpage>
          -
          <lpage>446</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D. M.</given-names>
            <surname>Kilgour</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Eden</surname>
          </string-name>
          ,
          <article-title>Handbook of group decision and negotiation</article-title>
          . Springer Science &amp; Business
          <string-name>
            <surname>Media</surname>
          </string-name>
          ,
          <year>2010</year>
          , vol.
          <volume>4</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>L. S.</given-names>
            <surname>Lai</surname>
          </string-name>
          and E. Turban, “
          <article-title>Groups formation and operations in the web 2.0 environment and social networks,” Group Decision and negotiation</article-title>
          , vol.
          <volume>17</volume>
          , no.
          <issue>5</issue>
          , pp.
          <fpage>387</fpage>
          -
          <lpage>402</lpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>T.</given-names>
            <surname>Grandison</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Sloman</surname>
          </string-name>
          , “
          <article-title>A survey of trust in internet applications</article-title>
          ,
          <source>” IEEE Communications Surveys &amp; Tutorials</source>
          , vol.
          <volume>3</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>2</fpage>
          -
          <lpage>16</lpage>
          ,
          <year>2000</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>G.</given-names>
            <surname>Lax and G. M. L. Sarne</surname>
          </string-name>
          ´, “
          <article-title>CellTrust: a reputation model for C2C commerce</article-title>
          ,”
          <source>Electronic Commerce Research</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>193</fpage>
          -
          <lpage>216</lpage>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>G.</given-names>
            <surname>Fortino</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Trunfio</surname>
          </string-name>
          ,
          <article-title>Internet of things based on smart objects: Technology, middleware and applications</article-title>
          . Springer,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jøsang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Ismail</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Boyd</surname>
          </string-name>
          , “
          <article-title>A survey of trust and reputation systems for online service provision,” Decision support systems</article-title>
          , vol.
          <volume>43</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>618</fpage>
          -
          <lpage>644</lpage>
          ,
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>M.</given-names>
            <surname>Momani</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Challa</surname>
          </string-name>
          , “
          <article-title>Survey of trust models in different network domains</article-title>
          ,
          <source>” arXiv preprint arXiv:1010.0168</source>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>P. R.</given-names>
            <surname>Vamsi</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Kant</surname>
          </string-name>
          , “
          <article-title>Systematic design of trust management systems for wireless sensor networks: A review,” in Advanced Computing &amp; Communication Technologies (ACCT</article-title>
          ),
          <source>2014 Fourth International Conference on. IEEE</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>208</fpage>
          -
          <lpage>215</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>P. De Meo</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          <string-name>
            <surname>Messina</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Rosaci</surname>
            , and
            <given-names>G. M. L.</given-names>
          </string-name>
          <string-name>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>Forming timestable homogeneous groups into online social networks</article-title>
          ,
          <source>” Information Sciences</source>
          , vol.
          <volume>414</volume>
          , pp.
          <fpage>117</fpage>
          -
          <lpage>132</lpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>J.</given-names>
            <surname>Golbeck</surname>
          </string-name>
          , “
          <article-title>Computing and applying trust in web-based social networks</article-title>
          ,” in
          <source>PhD Thesis</source>
          . University of Maryland, Department of Computer Science,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>P.</given-names>
            <surname>Massa</surname>
          </string-name>
          and
          <string-name>
            <given-names>P.</given-names>
            <surname>Avesani</surname>
          </string-name>
          , “
          <article-title>Trust-aware recommender systems,”</article-title>
          <source>in Proc. of the 2007 ACM Conference on Recommender systems. ACM</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>17</fpage>
          -
          <lpage>24</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>S. J.</given-names>
            <surname>Brams</surname>
          </string-name>
          and
          <string-name>
            <given-names>P. C.</given-names>
            <surname>Fishburn</surname>
          </string-name>
          , “Voting procedures,”
          <article-title>Handbook of social choice and welfare</article-title>
          , vol.
          <volume>1</volume>
          , pp.
          <fpage>173</fpage>
          -
          <lpage>236</lpage>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>N. R.</given-names>
            <surname>Council</surname>
          </string-name>
          et al.,
          <article-title>Public participation in environmental assessment and decision making</article-title>
          . National Academies Press,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>L.</given-names>
            <surname>Xia</surname>
          </string-name>
          , “
          <article-title>Computational voting theory: game-theoretic and combinatorial aspects</article-title>
          ,
          <source>” Ph.D. dissertation</source>
          , Duke University,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>T. C.</given-names>
            <surname>Beierle</surname>
          </string-name>
          and
          <string-name>
            <given-names>J.</given-names>
            <surname>Cayford</surname>
          </string-name>
          ,
          <article-title>Democracy in practice: Public participation in environmental decisions</article-title>
          .
          <source>Resources for the Future</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>V.</given-names>
            <surname>Conitzer</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Sandholm</surname>
          </string-name>
          , “
          <article-title>Universal voting protocol tweaks to make manipulation hard</article-title>
          ,
          <source>” arXiv preprint cs/0307018</source>
          ,
          <year>2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pitt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kamara</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sergot</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Artikis</surname>
          </string-name>
          , “
          <article-title>Formalization of a voting protocol for virtual organizations</article-title>
          ,”
          <source>in Proc. of the 4th Int joint Conf. on Autonomous Agents and Multiagent Systems. ACM</source>
          ,
          <year>2005</year>
          , pp.
          <fpage>373</fpage>
          -
          <lpage>380</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>A.</given-names>
            <surname>Gibbard</surname>
          </string-name>
          , “
          <article-title>Manipulation of voting schemes: a general result,”</article-title>
          <source>Econometrica: J. of the Econometric Society</source>
          , pp.
          <fpage>587</fpage>
          -
          <lpage>601</lpage>
          ,
          <year>1973</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [37]
          <string-name>
            <given-names>M.</given-names>
            <surname>Satterthwaite</surname>
          </string-name>
          , “
          <article-title>Strategy-proofness and arrow's conditions: Existence and correspondence theorems for voting procedures and social welfare functions</article-title>
          ,
          <source>” J. of Economic Theory</source>
          , vol.
          <volume>10</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>187</fpage>
          -
          <lpage>217</lpage>
          ,
          <year>1975</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [38]
          <string-name>
            <given-names>T.</given-names>
            <surname>Jiang</surname>
          </string-name>
          and
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Baras</surname>
          </string-name>
          , “
          <article-title>Trust evaluation in anarchy: A case study on autonomous networks</article-title>
          .”
          <string-name>
            <surname>in</surname>
            <given-names>INFOCOM</given-names>
          </string-name>
          ,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          [39]
          <string-name>
            <given-names>X.-Y.</given-names>
            <surname>Xiao</surname>
          </string-name>
          , W.-C. Peng,
          <string-name>
            <surname>C.-C. Hung</surname>
          </string-name>
          , and W.-C. Lee, “
          <article-title>Using sensorranks for in-network detection of faulty readings in wireless sensor networks,”</article-title>
          <source>in Proc. of the 6th ACM Int. Work. on Data Engineering for Wireless and Mobile Access. ACM</source>
          ,
          <year>2007</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [40]
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Postorino and G. M. L. Sarne</surname>
          </string-name>
          ´, “
          <article-title>An agent-based sensor grid to monitor urban traffic</article-title>
          ,”
          <source>in Proceedings of the 15th Workshop dagli Oggetti agli Agenti</source>
          ,
          <source>WOA</source>
          <year>2014</year>
          ,
          <article-title>ser</article-title>
          .
          <source>CEUR Workshop Proceedings</source>
          , vol.
          <volume>1260</volume>
          . CEUR-WS.org,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          [41]
          <string-name>
            <given-names>F.</given-names>
            <surname>Bao</surname>
          </string-name>
          and
          <string-name>
            <given-names>I.-R.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “
          <article-title>Dynamic trust management for internet of things applications</article-title>
          ,”
          <source>in Proceedings of the 2012 international workshop on Self-aware internet of things. ACM</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          [42]
          <string-name>
            <given-names>M.</given-names>
            <surname>Nitti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Girau</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Atzori</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Iera</surname>
          </string-name>
          , and G. Morabito, “
          <article-title>A subjective model for trustworthiness evaluation in the social internet of things,” in Personal Indoor and Mobile Radio Communications (PIMRC</article-title>
          ),
          <source>2012 IEEE 23rd International Symposium on. IEEE</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>18</fpage>
          -
          <lpage>23</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          [43]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Habib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ries</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Muhlhauser</surname>
          </string-name>
          , “
          <article-title>Towards a trust management system for cloud computing,” in Trust, Security and Privacy in Computing and Communications (TrustCom</article-title>
          ),
          <source>2011 IEEE 10th International Conference on. IEEE</source>
          ,
          <year>2011</year>
          , pp.
          <fpage>933</fpage>
          -
          <lpage>939</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          [44]
          <string-name>
            <given-names>F.</given-names>
            <surname>Messina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Pappalardo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Rosaci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Santoro</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. M. L.</given-names>
            <surname>Sarne</surname>
          </string-name>
          ´, “
          <article-title>A trust-aware, self-organizing system for large-scale federations of utility computing infrastructures,” Future Generation Computer Systems</article-title>
          , vol.
          <volume>56</volume>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>94</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>