2020
DOI: 10.1016/j.engappai.2020.103756
|View full text |Cite
|
Sign up to set email alerts
|

Trust management and evaluation for edge intelligence in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
26
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1
1

Relationship

3
7

Authors

Journals

citations
Cited by 49 publications
(26 citation statements)
references
References 30 publications
0
26
0
Order By: Relevance
“…The recommendation-based trust evaluation provides a way to evaluate trust degree by requesting the surroundings nocentral authorise we have utilized an open-source library Zetta [58,65] to create central authorise and IoTivity library [23] to enable inter-object connectivity where the wireless communication is performed by utilizing Zigbee (IEEE 802.15) [28]. Several existing mechanism has been utilized to compare the performance which are TMEI [49], RobustD [26], SGSQ-TM [19].…”
Section: Recommendation-based Indirect Trustmentioning
confidence: 99%
“…The recommendation-based trust evaluation provides a way to evaluate trust degree by requesting the surroundings nocentral authorise we have utilized an open-source library Zetta [58,65] to create central authorise and IoTivity library [23] to enable inter-object connectivity where the wireless communication is performed by utilizing Zigbee (IEEE 802.15) [28]. Several existing mechanism has been utilized to compare the performance which are TMEI [49], RobustD [26], SGSQ-TM [19].…”
Section: Recommendation-based Indirect Trustmentioning
confidence: 99%
“…Moreover, the home automation system requires the sensor devices to be connected to the cloud and are usually controlled from the user's mobile. Furthermore, real-time IoT networks provide many benefits and also suffer from various security vulnerabilities, such as data leakage, multi-latency, side-channels, and cross-site scripting [1][2][3]. An IoT sensor network collects data from a source node and passes it to the multiple intermediate sensor nodes to reach a destination node.…”
Section: Introductionmentioning
confidence: 99%
“…In order to avoid networks being attacked by malicious nodes, researchers have recently carried out related studies. In [23], Qureshi et al proposed an effective technique based on cumulative trust evaluation. In [24], Raza et al proposed a novel scheme in which each node can identify the malicious node and select the route by calculating the trust level of its neighboring nodes.…”
Section: Introductionmentioning
confidence: 99%