2021
DOI: 10.1049/ise2.12029
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive and survivable trust management for Internet of Things systems

Abstract: The Internet of Things (IoT) is characterized by the seamless integration of heterogeneous devices into information networks to enable collaborative environments, specifically those concerning the collection of data and exchange of information and services. Security and trustworthiness are among the critical requirements for the effective deployment of IoT systems. However, trust management in IoT is extremely challenging due to its open environment, where the quality of information is often unknown because en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…In addition, the protocol mainly targeted the requirements of adaptability and scalability for IoT systems. The research findings expressed that this protocol could improve the adaptability of IoT systems to a certain extent and enhance their own scalability [8]. Otari and other researchers proposed a trust management model based on a multi-objective genetic algorithm to study the identification of trusted nodes in mobile grid systems.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, the protocol mainly targeted the requirements of adaptability and scalability for IoT systems. The research findings expressed that this protocol could improve the adaptability of IoT systems to a certain extent and enhance their own scalability [8]. Otari and other researchers proposed a trust management model based on a multi-objective genetic algorithm to study the identification of trusted nodes in mobile grid systems.…”
Section: Related Workmentioning
confidence: 99%
“…CTBET fuses direct and indirect trust values (i.e., computed using QoS statistics) to protect IoT devices against OO or BM trust attacks. Resistance against attacks also represented a focal point for Jabeen et al [61]. To combat trust attacks such as BM or SB, a QoS based approach was undertaken to build their trust model.…”
Section: A Bayesian Theory and Statistical Modelsmentioning
confidence: 99%
“…Jabeen et al 15 proposed a hybrid trust management framework that facilitated the option of centralized and distributed strategies of trustworthiness evaluation between entities. It imposed the IoT nodes to conduct the network processing for the objective of improving the scalability requirements inherent with the centralized trust management strategy.…”
Section: Related Workmentioning
confidence: 99%
“…It imposed the IoT nodes to conduct the network processing for the objective of improving the scalability requirements inherent with the centralized trust management strategy. This centralized strategy confined itself to the fine-grained values associated with the fog nodes during the The semantic considered for ranking is not complete Jabeen et al 15…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation