Machine learning empowered trust evaluation method for IoT devices

W Ma, X Wang, M Hu, Q Zhou - IEEE access, 2021 - ieeexplore.ieee.org
With the rapid development of the Internet of Things (IoT), malicious or affected IoT devices
have imposed enormous threats on the IoT environment. To address this issue, trust has …

A smart trust management method to detect on‐off attacks in the Internet of Things

J Caminha, A Perkusich… - Security and …, 2018 - Wiley Online Library
Internet of Things (IoT) resources cooperate with themselves for requesting and providing
services. In heterogeneous and complex environments, those resources must trust each …

[HTML][HTML] EdgeTrust: A lightweight data-centric trust management approach for IoT-based healthcare 4.0

KA Awan, I Ud Din, A Almogren, HA Khattak… - Electronics, 2022 - mdpi.com
Internet of Things (IoT) is bringing a revolution in today's world where devices in our
surroundings become smart and perform daily-life activities and operations with more …

Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges

AIA Ahmed, SH Ab Hamid, A Gani, MK Khan - Journal of Network and …, 2019 - Elsevier
Internet of things (IoT) is a contemporary technology, which links a tremendous number of
devices with each other to ease the life via many useful services such as information …

A review on trust evaluation for internet of things

PU Wang, P Zhang - Proceedings of the 9th EAI International …, 2016 - dl.acm.org
The Internet of Things (IoT) has been widely used in various application domains to provide
advanced and intelligent services for human beings, such as environmental monitoring …

A smart middleware to detect on-off trust attacks in the Internet of Things

J Caminha, A Perkusich… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Security is a key concern in Internet of Things (IoT) designs. In a heterogeneous and
complex environment, service providers and service requesters must trust each other. On-off …

[HTML][HTML] An active and verifiable trust evaluation approach for edge computing

W Mo, T Wang, S Zhang, J Zhang - Journal of Cloud Computing, 2020 - Springer
Abstract Billions of Internet of Thing (IoT) devices are deployed in edge network. They are
used to monitor specific event, process and to collect huge data to control center with smart …

Trust2Vec: Large-scale IoT trust management system based on signed network embeddings

S Dhelim, N Aung, MT Kechadi, H Ning… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
A trust management system (TMS) is an integral component of any Internet of Things (IoT)
network. A reliable TMS must guarantee the network security, data integrity, and act as a …

Trust management and evaluation for edge intelligence in the Internet of Things

KN Qureshi, A Iftikhar, SN Bhatti, F Piccialli… - … Applications of Artificial …, 2020 - Elsevier
Abstract Information and Communication Technologies (ICTs) have revolutionised the
traditional communication processes, converting the cities into Smart Cities. Internet of …

[HTML][HTML] A trust management model for IoT devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique

Y Alghofaili, MA Rassam - Sensors, 2022 - mdpi.com
Recently, Internet of Things (IoT) technology has emerged in many aspects of life, such as
transportation, healthcare, and even education. IoT technology incorporates several tasks to …