Machine learning empowered trust evaluation method for IoT devices

W Ma, X Wang, M Hu, Q Zhou - IEEE access, 2021 - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoT), malicious or affected IoT devices
have imposed enormous threats on the IoT environment. To address this issue, trust has …

Network-level security for the Internet of Things: Opportunities and challenges

HH Gharakheili, A Sivanathan, A Hamza… - Computer, 2019 - ieeexplore.ieee.org
Smart environments with many Internet of Things (IoT) devices are at significant risk of
cyberattacks, putting private data and personal safety in danger. While IoT device …

[HTML][HTML] Building trust for smart connected devices: The challenges and pitfalls of TrustZone

N Koutroumpouchos, C Ntantogian, C Xenakis - Sensors, 2021 - mdpi.com
TrustZone-based Trusted Execution Environments (TEEs) have been utilized extensively for
the implementation of security-oriented solutions for several smart intra and inter-connected …

Internet of Things security and forensics: Challenges and opportunities

M Conti, A Dehghantanha, K Franke… - Future Generation …, 2018 - Elsevier
Abstract The Internet of Things (IoT) envisions pervasive, connected, and smart nodes
interacting autonomously while offering all sorts of services. Wide distribution, openness and …

TruSD: Trust framework for service discovery among IoT devices

K Kalkan, K Rasmussen - Computer Networks, 2020 - Elsevier
IoT provides an environment which enables access to a plethora of different services. In
order to reach these services, devices need to decide if the providers are trustable or not …

Defining trust in IoT environments via distributed remote attestation using blockchain

U Javaid, MN Aman, B Sikdar - … and Protocol Design for Mobile Networks …, 2020 - dl.acm.org
The constantly growing number of Internet of Things (IoT) devices and their resource-
constrained nature makes them particularly vulnerable and increasingly attractive for …

Towards secure distributed trust management on a global scale: An analytical approach for applying distributed ledgers for authorization in the IoT

N Alexopoulos, SM Habib, M Mühlhäuser - … of the 2018 Workshop on IoT …, 2018 - dl.acm.org
Authorization, and more generally Trust Management (TM), is an indispensable part of the
correct operation of most IT systems. The advent of the Internet of Things (IoT), with its cyber …

Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks

L Liu, Z Ma, W Meng - Future generation computer systems, 2019 - Elsevier
Abstract The Internet of Things (IoT) has experienced a rapid growth in the last few years
allowing different Internet-enabled devices to interact with each other in various …

[HTML][HTML] A Dynamic Trust-Related Attack Detection Model for IoT Devices and Services Based on the Deep Long Short-Term Memory Technique

Y Alghofaili, MA Rassam - Sensors, 2023 - mdpi.com
The integration of the cloud and Internet of Things (IoT) technology has resulted in a
significant rise in futuristic technology that ensures the long-term development of IoT …

FL4IoT: IoT device fingerprinting and identification using federated learning

H Wang, D Eklund, A Oprea, S Raza - ACM Transactions on Internet of …, 2023 - dl.acm.org
Unidentified devices in a network can result in devastating consequences. It is, therefore,
necessary to fingerprint and identify IoT devices connected to private or critical networks …