2022
DOI: 10.1016/j.comnet.2021.108558
|View full text |Cite
|
Sign up to set email alerts
|

A survey of trust management in the Internet of Vehicles

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
18
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 53 publications
(18 citation statements)
references
References 84 publications
0
18
0
Order By: Relevance
“…Souissi et al [17] reviewed trust models from the aspects of data perception trust, communication trust and data fusion trust in Wireless Sensor Network (WSN) assisted IoT. Ahmed et al [18] summarized Trust calculation components and trust-related attacks [16] 2017 IoT Design dimensions of a trust calculation model [17] 2019 IoT Data perception trust, communication trust and data fusion trust [18] 2019 IoT Trust applications, calculation schemes, metrics and attacks [19] 2018 IoT A systematic description of popular TM techniques [20] 2020 IoT TM in social IoT [21] 2019 IoT Taxonomy of TM techniques and criteria [22] 2020 IoT Applications and challenges of TM in IoT [23] 2016 MANET TM techniques dealing with trust-related attacks [24] 2016 VANET Survey trust models in VANET based on adversary models [25] 2018 VANET Security services, location privacy and TM in VANET [26] 2020 VANET Traditional and emerging TM techniques in VANET [27] 2022 IoV AI-enabled and emerging TM techniques in IoV [28] 2020 5G Trust and reputation management in 5G access networks [9] 2021 5G/B5G Trust dimensions and trust enablers in 5G and its beyond [29] 2022 5G/B5G Pre-standardization proposals of 5G/B5G trust models This paper 2022 HetNet Trust models in HetNets and quality of trust : Fully supported; : Partially supported; None: Not supported; ①: Propose a set of criteria that a sound trust model should satisfy; ②: Define quality of trust and how to evaluate it; ③: Summarize trust-related attacks and defense strategies; ④: Present a taxonomy of trust models;…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Souissi et al [17] reviewed trust models from the aspects of data perception trust, communication trust and data fusion trust in Wireless Sensor Network (WSN) assisted IoT. Ahmed et al [18] summarized Trust calculation components and trust-related attacks [16] 2017 IoT Design dimensions of a trust calculation model [17] 2019 IoT Data perception trust, communication trust and data fusion trust [18] 2019 IoT Trust applications, calculation schemes, metrics and attacks [19] 2018 IoT A systematic description of popular TM techniques [20] 2020 IoT TM in social IoT [21] 2019 IoT Taxonomy of TM techniques and criteria [22] 2020 IoT Applications and challenges of TM in IoT [23] 2016 MANET TM techniques dealing with trust-related attacks [24] 2016 VANET Survey trust models in VANET based on adversary models [25] 2018 VANET Security services, location privacy and TM in VANET [26] 2020 VANET Traditional and emerging TM techniques in VANET [27] 2022 IoV AI-enabled and emerging TM techniques in IoV [28] 2020 5G Trust and reputation management in 5G access networks [9] 2021 5G/B5G Trust dimensions and trust enablers in 5G and its beyond [29] 2022 5G/B5G Pre-standardization proposals of 5G/B5G trust models This paper 2022 HetNet Trust models in HetNets and quality of trust : Fully supported; : Partially supported; None: Not supported; ①: Propose a set of criteria that a sound trust model should satisfy; ②: Define quality of trust and how to evaluate it; ③: Summarize trust-related attacks and defense strategies; ④: Present a taxonomy of trust models;…”
Section: Introductionmentioning
confidence: 99%
“…Hussain et al [26] reviewed traditional and emerging TM techniques for VANETs. Hbaieb et al [27] discussed TM in Internet of Vehicles (IoV). In addition, Ahmad et al [28] presented a survey on trust and reputation management in 5G and traditional networks.…”
Section: Introductionmentioning
confidence: 99%
“…Vehicles will be able to exchange information with many more entities, such as pedestrians, infrastructure, and networks, via Vehicle-to-Everything (V2X) communications [ 21 ]. With all these entities connected through vehicles and with many others being designed for the Internet of Things (IoT), the term ad hoc was considered obsolete by many researchers as it does not comprehensively cover the wide range of technologies involved within/connecting these entities [ 22 , 23 , 24 , 25 ]. The concept of the Internet of Vehicles (IoV) has emerged as a broader concept to better represent the new era of vehicular networks [ 26 ].…”
Section: Introductionmentioning
confidence: 99%
“…FC helps cloud computing perform its role more efficiently. Considering the features of cloud computing, traffic safety [12,13], electronic health [5], web content delivery [14], augmented reality [15], virtual reality [16] and big data analysis [17], including new IoT applications and services are suitable for cloud computing. Due to the characteristics of fog such as het-erogeneous environment, flexibility, dynamics and geographical distribution, fog can be in a vulnerable and uncertain situation.…”
Section: Introductionmentioning
confidence: 99%