[HTML][HTML] Leveraging blockchain for ensuring trust in IoT: A survey

R Kumar, R Sharma - Journal of King Saud University-Computer and …, 2022 - Elsevier
Abstract Internet of Things (IoT) refers to a technology where computing devices are
connected and form a network. IoT faces many security and privacy issues due to less …

[HTML][HTML] A survey on trust management for WBAN: Investigations and future directions

S Ayed, L Chaari, A Fares - Sensors, 2020 - mdpi.com
The rapid uptake of the Wireless Body Area Networks (WBAN) and their services poses
unprecedented security requirements. WBAN are evolving to support these requirements …

Trust in Adoption of Internet of Things: Role of Perceived Ease of Use and Security

MT Nuseir, AI Aljumah… - 2022 International Arab …, 2022 - ieeexplore.ieee.org
This study was designed to examine the effect of perceived ease of use, security, integrity,
and trustworthiness on the adoption of the Internet of things. The mediating role of trust was …

Trust-aware and cooperative routing protocol for IoT security

N Djedjig, D Tandjaoui, F Medjek… - Journal of Information …, 2020 - Elsevier
The resource-constrained nature of IoT objects makes the Routing Protocol for Low-power
and Lossy Networks (RPL) vulnerable to several attacks. Although RPL specification …

[HTML][HTML] A trust management model for IoT devices and services based on the multi-criteria decision-making approach and deep long short-term memory technique

Y Alghofaili, MA Rassam - Sensors, 2022 - mdpi.com
Recently, Internet of Things (IoT) technology has emerged in many aspects of life, such as
transportation, healthcare, and even education. IoT technology incorporates several tasks to …

Robusttrust–a pro-privacy robust distributed trust management mechanism for internet of things

KA Awan, IU Din, A Almogren, M Guizani… - IEEE …, 2019 - ieeexplore.ieee.org
In the promising time of the Internet, connected things have the ability to communicate and
share information. The Internet of Things (IoT) cannot be implemented unless the security …

HIDRA: A distributed blockchain-based architecture for fog/edge computing environments

C Núñez-Gómez, B Caminero, C Carrión - IEEE Access, 2021 - ieeexplore.ieee.org
Nowadays, the fog computing paradigm is being consolidated as a solution for processing
the explosion of data generated by lots of common IoT devices connected to the Internet. In …

Trust evaluation and decision based on DS evidence theory: early models and future perspectives

W Zhang, H Sun, W Fang, C Zhu, G Jia - IEEE Access, 2023 - ieeexplore.ieee.org
Due to the technical characteristics and application scenarios of distributed networks, their
nodes can easily be invaded and compromised. It will result in information being forged or …

[HTML][HTML] A Dynamic Trust-Related Attack Detection Model for IoT Devices and Services Based on the Deep Long Short-Term Memory Technique

Y Alghofaili, MA Rassam - Sensors, 2023 - mdpi.com
The integration of the cloud and Internet of Things (IoT) technology has resulted in a
significant rise in futuristic technology that ensures the long-term development of IoT …

Trust evaluation model in IoT environment: a comprehensive survey

SA Alhandi, H Kamaludin, NAM Alduais - Ieee Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is a rapidly evolving field that provides seamless connections to
a physical object, making it part of a smart environment. To fully realize the potential power …