2019
DOI: 10.1049/iet-com.2019.0657
|View full text |Cite
|
Sign up to set email alerts
|

T_CAFE: A Trust based Security approach for Opportunistic IoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(12 citation statements)
references
References 22 publications
0
12
0
Order By: Relevance
“…Kandhoul et al 14 proposed RFCSec: a RF classifier for safe and reliable routing in opportunistic IoT (OppIoT) to associate humans with their own smart devices in opportunistic contact nature. The proposed protocol runs two principal phases.…”
Section: Ml‐based Solutions For Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…Kandhoul et al 14 proposed RFCSec: a RF classifier for safe and reliable routing in opportunistic IoT (OppIoT) to associate humans with their own smart devices in opportunistic contact nature. The proposed protocol runs two principal phases.…”
Section: Ml‐based Solutions For Iotmentioning
confidence: 99%
“…The IoT is a networking architecture that provides pervasive distributed services as a step toward ubiquitous computing. The “IoT” is a network of physical items or things that use the Internet to share information and interact with one another and their surroundings 14 . The IoT enables the connection of millions of objects, including sensors and mobile phones/devices, to carry out numerous functions.…”
Section: Introductionmentioning
confidence: 99%
“…Because of the difficulty in debugging and implementing IoTs in real networks, it is necessary to view simulations as a basic design tool. The primary benefit of simulation is that analysis is simplified and protocol is verified, mostly, it is evident in systems in large scales [28][29][30][31][32][33][34][35]. The performance of the suggested method is assessed in this part by the use of NS-3 as the simulation means, and the discussion on the obtained results is presented.…”
Section: Simulation Setup and Comparing Algorithmsmentioning
confidence: 99%
“…IoT interplays between the paradigms of security and trust, i.e., if we regard security mechanisms in terms of barriers, locks, and accesses, then trust is a worry of when, where, and why to put these barriers, locks, and accesses in an IoT ecosystem to deal with the degree of collaboration and integration between the IoT objects [35]. Over the past decade, trust-based security mechanisms have emerged for enhancing the overall security of IoT, wherein trust and reputation models have been utilized to improve the collaboration and for selecting the trustworthy service provider based on quality-of-service (QoS), especially in service oriented architecture-based IoT [36], [37].…”
Section: Security Privacy and Trust In Iotmentioning
confidence: 99%