2023
DOI: 10.1145/3558779
|View full text |Cite
|
Sign up to set email alerts
|

Trust in Edge-based Internet of Things Architectures: State of the Art and Research Challenges

Abstract: The Internet of Things (IoT) aims to enable a scenario where smart objects, inserted into information networks, supply smart services for human beings. The introduction of edge computing in IoT can reduce the decision-making latency, save bandwidth resources, and expand the cloud services to be allocated at the network’s edge. However, edge-based IoT systems currently face challenges in their decentralized trust management. Trust management is essential to obtain reliable mining and data fusion, improved user … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 40 publications
(22 citation statements)
references
References 96 publications
0
11
0
Order By: Relevance
“…This allows other nodes to verify the validity of the data logger node without having to maintain a list of node IDs in the database format. This occurs at the communication layer for the sole purpose of protecting the data from tampering, after which the data is not stored in the Tangle (56).…”
Section: Implementation and Evaluationmentioning
confidence: 99%
See 1 more Smart Citation
“…This allows other nodes to verify the validity of the data logger node without having to maintain a list of node IDs in the database format. This occurs at the communication layer for the sole purpose of protecting the data from tampering, after which the data is not stored in the Tangle (56).…”
Section: Implementation and Evaluationmentioning
confidence: 99%
“…In the proposed structure, each message is connected to at least two and up to eight previous messages, and any change in this message will invalidate the message by invalidating the attached message chain. The Iota network guarantees that the message will not be tampered as soon as the message is approved by Milestone, which takes about 8 seconds (56). Each message stores in binary format and can hold up to 32 KB of information.…”
Section: A Transaction Planmentioning
confidence: 99%
“…Trust plays a significant role in guaranteeing UAVs' safe and consistent functioning [14]. Various algorithms and metrics are utilized to assess the trustworthiness of individuals, aiding users in making informed decisions about whom to trust and engage with by evaluating their actions, comments, and interactions with others [15].…”
Section: Introductionmentioning
confidence: 99%
“…The IoB can also be used to track human activity and location to reduce the risk of viral contamination and identify unhealthy behaviors, allowing healthcare providers to intervene and prevent health problems. Additionally, the IoB can support the development of smart apps and devices that act as health advisors, providing users with real-time information on their health status and potential risks [21]. So, in order to conduct daily performances consisting of treatment arrangement and operations planning in healthcare, there is a requirement for the IoB [22].…”
Section: Introductionmentioning
confidence: 99%