

Computing Appraisal of Trust Management Techniques in the Internet of Things
Abstract
Keywords
References
Glowacka J, Krygier J, Amanowicz J. A trust-based situation awareness system for military applications of the internet of things; 1973. doi: 10.1109/WF-IoT.2015.7389103.
Jayasinghe U, Lee GM, Um T, Shi Q. Machine Learning based Trust Computational Model for IoT Services. IEEE Trans Sustain Comput. 1974;4(1):39–52. doi: 10.1109/TSUSC.2018.2839623.
Chen J, Tian Z, XYin L, Wang X. 1975 Trust architecture and reputation evaluation for the internet of things. J Ambient Intell Hum Comput. doi: 10.1007/s12652–018–0887-z.
Li J, Bai Y, Zaman N, Leung VCM. A decentralized trustworthy context and QoS-aware service discovery framework for the Internet of things. IEEE Access. 1976;5:19154–66. doi: 10.1109/ACCESS.2017.2756446.
Kouicem DE, Bouabdallah A, Lakhlef H. Internet of things security: A top-down survey. Comput Netw. 2018;141:199–221. doi: 10.1016/j.comnet.2018.03.012, Google Scholar.
Abderrahim B, Rachedi A. A secure and resistant architecture against attacks for mobile ad hoc networks; 1979. Available from: https://www.researchgate.net/publication/47363501_A_secure_and_resistant_architecture_against_attacks_for_mobile_ad_hoc_networks.
Jayasinghe U, Otebolaku A, Um T, Lee G. Data centric trust evaluation and prediction framework for IoT; 1957. doi: 10.23919/ITU-WT.2017.8246999.
Abderrahim B, Chaimaa B, Abdellatif K. Trust management in the industrial Internet of things. 1980. doi: 10.1109/TIFS.2020.2997179.
Lize G, Jingpei W, Bin S. Trust management mechanism for the Internet of things. 1951. doi: 10.1109/CC.2014.6821746.
Al-Hamadi H, Chen IR. Trust-based decision making for health IoT systems. IEEE Internet Things J. 1983;4(5):1408–19. doi: 10.1109/JIOT.2017.2736446.
Chen J. Embedding the MRC and SC schemes into the trust management algorithm applied to IoT security protection. 1984. doi: 10.1007/s11277–017–5120–4.
Li X, Zhao B, Li J, Zou J, Liu Y. An area-context-based credibility detection for big data in IoT. 1985. doi: 10.1155/2020/5068731.
Chen D, Chang G, Sun D, Li J, Jia J, Wang X. TRM-IoT: a trust management model based on a fuzzy reputation for ”internet of things”. Comput Sci Inf Syst. 2012;8(4):1207–28.
Nitti M, Girau R, Atzori L, Iera A, Morabito G. A subjective model for trustworthiness evaluation in the Social Internet of things; 1990. doi: 10.1109/PIMRC.2012.6362662.
Xiao H, Sidhu N, Christianson B. Guarantor and reputation based trust model for Social Internet of Things; 1991. doi: 10.1109/IWCMC.2015.7289151.
Varghese R, Chithralekha T, Kharkongor C. Self-organized cluster based energy efficient meta trust model for internet of things; 1992. doi: 10.1109/ICETECH.2016.7569281.
Luhach AK, Isha B. Analysis of lightweight cryptographic solutions for internet of things. Indian J Sci Technol. 2016;9(28).
Luhach AK, Luhach R. Research and implementation of security framework for small and medium sized e-commerce based on SOA. J Theor Appl Inf Technol. 2015;82(3):395.
Luhach AK, Isha B, Kumar S. Layer based security in Internet of things: current mechanisms, prospective attacks, and future orientation. In: International Conference on Smart Trends for Information Technology and Computer Communications. Singapore: Springer; 2016, August. p. 896–903.
Ben Saied YB, Olivereau A, Zeghlache D, Laurent M. Trust management system design for the Internet of Things: A context-aware and multi-service approach. Comput Sec. 2013;39:351–65:Article e259118055. doi: 10.1016/j.cose.2013.09.001.
Yassine M, Abdellah E, Mustapha B. Security and privacy in smart sensor networks: advances in information security, privacy and ethics. IGI Global; 2018. Available from: https://www.igi-global.com/book/security-privacy-smart-sensor-networks/192029.
Seeber S, Sehgal A, Stelte B, Rodosek GD, Schonwalder J. Towards a trust computing architecture for RPL in Cyber Physical Systems. Proceedings of the 2013 9th international conference on Network and Service Management. Vols. 134–137, 14–18 October, 2013. Switzerland: Institute of Electrical and Electronics EngineersXplore; 2013, October. doi: 10.1109/CNS M.2013.6727823.
DOI: https://doi.org/10.37591/joces.v11i2.838
Refbacks
- There are currently no refbacks.
Copyright (c) 2021 Journal of Communication Engineering & Systems