2021
DOI: 10.1109/tetc.2019.2957394
|View full text |Cite
|
Sign up to set email alerts
|

Trustee: A Trust Management System for Fog-Enabled Cyber Physical Systems

Abstract: In this paper, we propose a lightweight trust management system (TMS) for fog-enabled cyber physical systems (Fog-CPS). Trust computation is based on multi-factor and multi-dimensional parameters, and formulated as a statistical regression problem which is solved by employing random forest regression model. Additionally, as the Fog-CPS systems could be deployed in open and unprotected environments, the CPS devices and fog nodes are vulnerable to numerous attacks namely, collusion, self-promotion, badmouthing, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 28 publications
0
13
0
Order By: Relevance
“…The evidence can be aggregated in two ways, subjective logic [5] and real-time adaptive trust computation [9,10]. The main difference between the two approaches is the manner in which weights are assigned; in the former, they are assigned manually and/or based on personal preferences, and in the latter, they are assigned using the maximizing deviation method [10], information entropy [9], and regression [11][12][13]. Besides these, some studies employ both subjective and objective trust to evaluate the trustworthiness of systems [6,10,14,15].…”
Section: Background and Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…The evidence can be aggregated in two ways, subjective logic [5] and real-time adaptive trust computation [9,10]. The main difference between the two approaches is the manner in which weights are assigned; in the former, they are assigned manually and/or based on personal preferences, and in the latter, they are assigned using the maximizing deviation method [10], information entropy [9], and regression [11][12][13]. Besides these, some studies employ both subjective and objective trust to evaluate the trustworthiness of systems [6,10,14,15].…”
Section: Background and Related Workmentioning
confidence: 99%
“…The trust is computed at the fog layer to ensure the trust ratings are accessible in real-time with no and/or negligible delay and latency. Recently, the work in [13] proposes a trust management system to compute the trust for different entities in a fog-based cyberphysical system (CPS). This is an objective trust computation model wherein the final trust in fog nodes is computed by combining the evidence gathered from IoT devices and a fog monitoring node.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…For trust computation of fog nodes, two sources of evidence, namely QoS parameters and network communication features, similar to [23], are used. Precisely, the trust of a fog node T f og is computed by aggregating the trust computed from QoS evidence monitored by FO and the network communication parameters sent by IoT devices.…”
Section: Fog Node Trust Computationmentioning
confidence: 99%
“…In [71], Junejo et al integrates CPS with fog computing for its timeliness and low latency but they also point out that the FC-CPS systems are usually deployed in an open and relatively unprotected environment which means both the CPS devices and these fog nodes are very vulnerable and are in a situation where numerous attacks such as collusion and ballot-stuffing may happen from time to time. To deal with those challenges, a Trust Management System is proposed where the FC-CPS devices are the trustor and fog assisted nodes are the trustee.…”
Section: Fig 4 the Exchange Of Data Between Fog Servers And End Devicesmentioning
confidence: 99%