2023
DOI: 10.1016/j.hcc.2023.100127
|View full text |Cite
|
Sign up to set email alerts
|

A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…However, the authors neither conducted the review systematically nor defined the process of paper selection as well publication years of reviewed papers. An evaluation of emerging IIoT paradigm was done by Tyagi et al [12] by identifying specific domains of IIoT adoption, assessing threats and vulnerabilities, and carried out a detailed analysis of existing countermeasures. The authors also highlighted the benefits and challenges of IIoT adoption in industrial sectors with emphasis on the distinctive peculiarities of IIoT deployments.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, the authors neither conducted the review systematically nor defined the process of paper selection as well publication years of reviewed papers. An evaluation of emerging IIoT paradigm was done by Tyagi et al [12] by identifying specific domains of IIoT adoption, assessing threats and vulnerabilities, and carried out a detailed analysis of existing countermeasures. The authors also highlighted the benefits and challenges of IIoT adoption in industrial sectors with emphasis on the distinctive peculiarities of IIoT deployments.…”
Section: Related Workmentioning
confidence: 99%
“…In the study by Tyagi et al [12] the challenges and problems associated with the use of trust management systems for security and privacy in IoT were highlighted. An analysis of trust evaluation and management techniques was done, and these techniques were classified under four major areas: computational, cryptography, and probabilistic, information theory-based and others.…”
Section: Introductionmentioning
confidence: 99%