2019
DOI: 10.1109/jiot.2019.2902022
|View full text |Cite
|
Sign up to set email alerts
|

CTRUST: A Dynamic Trust Model for Collaborative Applications in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
44
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 83 publications
(64 citation statements)
references
References 30 publications
1
44
0
Order By: Relevance
“…An example would be an application that allows the SR to request the assistance of some SPs in the collaborative download of a large file by pooling their bandwidths. Each service class is a self-contained collaboration context to which a suitable IoT trust model, such as CTRUST [25], may be applied in selecting the most trustworthy SPs.…”
Section: Iot Service Composition -Concepts and Techniquesmentioning
confidence: 99%
See 2 more Smart Citations
“…An example would be an application that allows the SR to request the assistance of some SPs in the collaborative download of a large file by pooling their bandwidths. Each service class is a self-contained collaboration context to which a suitable IoT trust model, such as CTRUST [25], may be applied in selecting the most trustworthy SPs.…”
Section: Iot Service Composition -Concepts and Techniquesmentioning
confidence: 99%
“…Based on the previous work done in [23]- [29], a list of suitable attributes for an ideal TMS for IoT were enumerated and discussed in our previous work [25]. The list consists of the following 9 properties: 1.…”
Section: Ideal Trust Model For Iot Service Compositionmentioning
confidence: 99%
See 1 more Smart Citation
“…The system considers the concepts from social and physiological science for computing the trust between IoT objects and their owners. Anuoluwapo et al [34] proposed a collaborative approach that reliably estimates the trust between objects in the IoT network. However, the privacy aspects are not considered in this work.…”
Section: Trust Management In Social Iotmentioning
confidence: 99%
“…In previous works, 6,15 the authors propose a distributed trust‐based model for an efficient channel's leasing policy in which a Primary User (PU) willingly leases a portion of its channel access to unlicensed Secondary Users (SUs), and in return, these provide cooperative services by adding intentional jamming to counter eavesdropping and employ cooperative relaying to enhance the quality of communication. Nevertheless, the authors in previous studies 10,12,16,19,20 model the cooperative communication in a spectrum aware environment as a statistical framework and hence propose to employ the cooperative adversarial model for analyzing SSDF's consequences on DSA‐enabled CR‐IIoTs.…”
Section: Literature Reviewmentioning
confidence: 99%