Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges

AIA Ahmed, SH Ab Hamid, A Gani, MK Khan - Journal of Network and …, 2019 - Elsevier
Internet of things (IoT) is a contemporary technology, which links a tremendous number of
devices with each other to ease the life via many useful services such as information …

Privacy-preserving reputation systems based on blockchain and other cryptographic building blocks: A survey

O Hasan, L Brunie, E Bertino - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
The purpose of a reputation system is to hold the users of a distributed application
accountable for their behavior. The reputation of a user is computed as an aggregate of the …

A survey on blockchain-based trust management for Internet of Things

Y Liu, J Wang, Z Yan, Z Wan… - IEEE internet of Things …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) aims to create a vast network with billions of things that can
seamlessly create and exchange data, establishing intelligent interactions between people …

Delegate the smartphone user? Security awareness in smartphone platforms

A Mylonas, A Kastania, D Gritzalis - Computers & Security, 2013 - Elsevier
Smartphone users increasingly download and install third-party applications from official
application repositories. Attackers may use this centralized application delivery architecture …

IoT public fog nodes reputation system: A decentralized solution using Ethereum blockchain

M Debe, K Salah, MHU Rehman, D Svetinovic - Ieee Access, 2019 - ieeexplore.ieee.org
Public fog nodes extend cloud services for the Internet of Things (IoT) clients and smart
devices to provide additional computation capabilities, storage space, and reduce latency …

TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks

FG Mármol, GM Pérez - Journal of network and computer applications, 2012 - Elsevier
Vehicular ad hoc networks (VANETs) have drawn the attention of a number of researchers
due to their several advantages and benefits. It is a very promising area of knowledge where …

Optimal countermeasures selection against cyber attacks: A comprehensive survey on reaction frameworks

P Nespoli, D Papamartzivanos… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
It is without doubt that today the volume and sophistication of cyber attacks keeps
consistently growing, militating an endless arm race between attackers and defenders. In …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

A novel security-driven scheduling algorithm for precedence-constrained tasks in heterogeneous distributed systems

T Xiaoyong, K Li, Z Zeng… - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
In the recent past, security-sensitive applications, such as electronic transaction processing
systems, stock quote update systems, which require high quality of security to guarantee …

Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems

FG Mármol, GM Pérez - Computer Standards & Interfaces, 2010 - Elsevier
Different trust and/or reputation models have arisen in the last few years. All of them have
certain key processes in common such as scoring, ranking, rewarding, punishing or …