“…Nevertheless, performance evaluation in presence of many trust-related attacks and the discussion on suitability of bipartite graph is not known. A social similarity-based trust computational model is presented in [144] where a k-means clustering and random forest classification is used to analyze the trust of the nodes over a period of time. Nevertheless, the proposed solution has no defence mechanism to tackle the trust attacks and is computationally -Direct observation -Reputation -The framework presents a enhanced security mechanism by exploiting prioritization rules, certificates and trust management policies to detect hijacked nodes in the network.…”
“…Nevertheless, performance evaluation in presence of many trust-related attacks and the discussion on suitability of bipartite graph is not known. A social similarity-based trust computational model is presented in [144] where a k-means clustering and random forest classification is used to analyze the trust of the nodes over a period of time. Nevertheless, the proposed solution has no defence mechanism to tackle the trust attacks and is computationally -Direct observation -Reputation -The framework presents a enhanced security mechanism by exploiting prioritization rules, certificates and trust management policies to detect hijacked nodes in the network.…”
“…Moreover, the same trust parameters can be calculated in different ways. For example, the calculation of Community of Interest (CoI) in [37,48] is as follows:…”
Section: Trust Parametersmentioning
confidence: 99%
“…In [48], the authors calculated the community-based trust characteristics of the trustee relative to the trustor at time t.…”
Over the past decade or so, considerable and rapid advancements in the state of the art within the promising paradigms of the Internet of Things (IoT) and Artificial Intelligence (AI) have accelerated the development of conventional Vehicular Ad Hoc Networks (VANETS) into the Internet of Vehicles (IoV), thereby bringing both connected and autonomous driving much closer to realization. IoV is a new concept in the Intelligent Traffic System (ITS) and an extended application of IoV in intelligent transportation. It enhances the existing capabilities of mobile ad hoc networks by integrating them with IoT so as to build an integrated and unified vehicle-to-vehicle network. It is worth mentioning that academic and industrial researchers are paying increasing attention to the concept of trust. Reliable trust models and accurate trust assessments are anticipated to improve the security of the IoV. This paper, therefore, focuses on the existing trustworthiness management models along with their corresponding trust parameters, as well as the corresponding trust evaluation parameters and simulation, which provide the basis for intelligent and efficient model suggestions and optimal parameter integration. In addition, this paper also puts forward some open research directions that need to be seriously solved before trust can play its due role in enhancing IoV network elasticity.
A survey on trust management in the Social Internet of Things (SIoT) is provided, beginning with a discussion of SIoT architectures and relationships. Using a variety of publication databases, we describe efforts that focus on various trust management aspects of SIoT . Trust management models comprise three themes: trust computation, aggregation, and updates. Our study presents a detailed discussion of all three steps. Trust computation and trust aggregation depend upon Trust Attributes (TAs) for the calculation of local and global trust values. Our paper discusses many strategies for aggregating trust, but "Weighted Sum" is the most frequently used in the relevant studies. Our paper addresses trust computation and aggregation scenarios. Our work classifies research by TAs (Social Trust, Quality of Service). We've categorized the research (reputation-based, recommendation-based, knowledge-based) depending on the types of feedback/opinions used to calculate trust values (global feedback/opinion, feedback from a friend, trustor's own opinion considering the trustee's information). Our work classifies studies (policy-based, prediction-based, weighted sum-based/weighted linear combination-based) by trust computation/aggregation approach. Two trust-update schemes are discussed: time-driven and event-driven schemes, while most trust management models utilize an event-driven scheme. Both trust computation and aggregation need propagating trust values in a centralized, decentralized, or semi-centralized way. Our study covers classifying research by trust updates and propagation techniques. Trust models should provide resiliency to SIoT attacks. This analysis classifies SIoT attacks as collaborative or individual. We also discuss scenarios depicted in the relevant studies to incorporate resistance against trust-related attacks in SIoT. Studies suggest context-based or context-free trust management strategies. Our study categorizes studies based on context-based or contextfree approaches. To gain the benefits of an immutable, privacy-preserving approach, a future trust management system should utilize Blockchain technology to support non-repudiation and tracking of trust relationships.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.