MobiQuitous 2020 - 17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2020
DOI: 10.1145/3448891.3448927
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Machine Learning-driven Trust Evaluation Model for Social Internet of Things: A Time-aware Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3
1

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(16 citation statements)
references
References 19 publications
0
15
0
1
Order By: Relevance
“…Nevertheless, performance evaluation in presence of many trust-related attacks and the discussion on suitability of bipartite graph is not known. A social similarity-based trust computational model is presented in [144] where a k-means clustering and random forest classification is used to analyze the trust of the nodes over a period of time. Nevertheless, the proposed solution has no defence mechanism to tackle the trust attacks and is computationally -Direct observation -Reputation -The framework presents a enhanced security mechanism by exploiting prioritization rules, certificates and trust management policies to detect hijacked nodes in the network.…”
Section: Yesmentioning
confidence: 99%
“…Nevertheless, performance evaluation in presence of many trust-related attacks and the discussion on suitability of bipartite graph is not known. A social similarity-based trust computational model is presented in [144] where a k-means clustering and random forest classification is used to analyze the trust of the nodes over a period of time. Nevertheless, the proposed solution has no defence mechanism to tackle the trust attacks and is computationally -Direct observation -Reputation -The framework presents a enhanced security mechanism by exploiting prioritization rules, certificates and trust management policies to detect hijacked nodes in the network.…”
Section: Yesmentioning
confidence: 99%
“…Moreover, the same trust parameters can be calculated in different ways. For example, the calculation of Community of Interest (CoI) in [37,48] is as follows:…”
Section: Trust Parametersmentioning
confidence: 99%
“…In [48], the authors calculated the community-based trust characteristics of the trustee relative to the trustor at time t.…”
mentioning
confidence: 99%
“…To combine various trust features (TAs) in order to determine an overall trust value of one node with respect to another node in time 't' [106].…”
Section: Machine Learningmentioning
confidence: 99%
“…Time-Driven [63], [80], [81], [82], [84], [85], [87], [7], [89], [90], [95], [96], [97], [102], [103], [106], [109], [110], [78], [112], [114], [115] [132], [133] [79], [86], [88], [98], [100], [101],…”
Section: Classification Of Studies On the Basis Of Trust Update Schem...unclassified