The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.1109/access.2019.2916340
|View full text |Cite
|
Sign up to set email alerts
|

RobustTrust – A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things

Abstract: In the promising time of the Internet, connected things have the ability to communicate and share information. The Internet of Things (IoT) cannot be implemented unless the security-related concerns have been resolved. Sharing information among different devices can compromise the private information of users. Thus, a suitable mechanism is needed to exclude the risk of malicious and compromised nodes. As follows, trust has been proposed in the literature as a useful technology to maintain users' security. Prio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
45
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 86 publications
(45 citation statements)
references
References 69 publications
0
45
0
Order By: Relevance
“…This section briefly surveys state‐of‐the‐art focusing on countering Spectrum Sensing Data Falsification (SSDF) attacks in network environment. The Trust‐reputation 3‐8 and game‐theory 9‐11 ‐based security frameworks have intrigued great attentions in research key groups. In previous studies, 3,11,12 the authors explore statistical interference in licensed spectrum and then adopt a cooperative game theory approach for allocating spectrum holes to in CR‐environment.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…This section briefly surveys state‐of‐the‐art focusing on countering Spectrum Sensing Data Falsification (SSDF) attacks in network environment. The Trust‐reputation 3‐8 and game‐theory 9‐11 ‐based security frameworks have intrigued great attentions in research key groups. In previous studies, 3,11,12 the authors explore statistical interference in licensed spectrum and then adopt a cooperative game theory approach for allocating spectrum holes to in CR‐environment.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In previous studies, 4,9,13 the authors consider the reputation as a characteristic of probabilities and compute the trust as the statistical expectation of reputation. In other studies, 6,15 the authors only acknowledge self‐observations for trust computation, whereas the authors inother works 12,16 use this trust value for guiding the interaction of legitimate node in such a manner that the internal confronts and collusion attacks are countered. Nevertheless, the authors in previous works 3,17 propose a novel approach for immunizing the trust of a legitimate SU by introducing an analyzing module based on the Link Quality Indicators.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Without a robust solution, it is not possible to take a complete advantage of the smart agriculture. The major security challenges of IoAT can be summarized as the identification of malicious and compromised nodes [47,48], authenticity [49], confidentiality [50,51], and privacy preservation of users [52]. In IoT, sensors are considered as edge nodes, which do not have enough capability to maintain resilience towards several potential attacks in distinct scenarios, such as smart homes [53], smart universities, and smart agriculture [54].…”
Section: Introductionmentioning
confidence: 99%