2021
DOI: 10.21203/rs.3.rs-453986/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

EdgeTrust - A Lightweight Data-centric Trust Management Approach for Green Internet of Edge Things

Abstract: Internet of Things (IoT) is bringing revolution into today’s world where devices in our surroundings become smart and perform daily-life activities and operations with more precision. The architecture of IoT is heterogeneous as it provides autonomy to nodes that they can communicate among other nodes and can also exchange information at any period. Due to the heterogeneous environment, IoT faces numerous security and privacy challenges, and one of the most significant challenges is the identification of malici… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 61 publications
0
4
0
Order By: Relevance
“…However, it lacks robustness evaluation regarding attacks on blockchain, so that Ro is partially satisfied. The performance evaluation of the proposed mechanism is not comprehensive [119]. Ef is not mentioned.…”
Section: B Trust Value-based Bc-tmssmentioning
confidence: 99%
“…However, it lacks robustness evaluation regarding attacks on blockchain, so that Ro is partially satisfied. The performance evaluation of the proposed mechanism is not comprehensive [119]. Ef is not mentioned.…”
Section: B Trust Value-based Bc-tmssmentioning
confidence: 99%
“…IDS and IPS are used to observe, gather, and analyze the system to get the interruptions, keep up a log of each entrance, and adjust information. They are used for detection and prevention, but also they cannot handle any encrypted data which can be malicious [ 35 ]. The Next-generation firewall (NGFW) has been discussed by Kishan Neupane et al [ 36 ].…”
Section: Related Workmentioning
confidence: 99%
“…Figure 1 depicts the general fog computing architecture which is a three-layer model consisting of sensor layer, fog layer, and cloud layer. The sensor layer consists of edge devices responsible for detecting the change in the environment [4]. The fog layer consists of fog devices having limited power, storage, and computational capabilities [5].…”
Section: Introductionmentioning
confidence: 99%