References
- 1. Chen, D., G. Chang, D. Sun, J. Li, J. Jia, X. Wang. TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things. – Comput. Sci. Inf. Syst., Vol. 8, 2011, No 4, pp. 1207-1228.10.2298/CSIS110303056C
- 2. Almogren, Ahmad, et al. FTM-IoMT: Fuzzy-Based Trust Management for Preventing Sybil Attacks in Internet of Medical Things. – IEEE Internet of Things Journal, 2020.10.1109/JIOT.2020.3027440
- 3. Zhao, H., X. Li. VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks. – The Journal of Supercomputing, Vol. 64, 2013, No 3, pp. 805-829.10.1007/s11227-011-0576-6
- 4. Becker, M. Y., P. Sewell. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. – In: Proc. of 17th IEEE Computer Security Foundations Workshop, IEEE, 2004.
- 5. Li, Hui-Jia, et al. Exploring the Trust Management Mechanism in Self-Organizing Complex Network Based on Game Theory. – Physica A: Statistical Mechanics and its Applications, Vol. 542, 2020, 123514.10.1016/j.physa.2019.123514
- 6. Yan, Z., P. Zhang, A. V. Vasilakos. A Survey on Trust Management for Internet of Things. – Journal of Network and Computer Applications, Vol. 42, 2014, pp. 120-134.10.1016/j.jnca.2014.01.014
- 7. Guo, J., R. Chen, J. J. Tsai. A Survey of Trust Computation Models for Service Management in Internet of Things Systems. – Computer Communications, Vol. 97, 2017, pp. 1-14.10.1016/j.comcom.2016.10.012
- 8. Chen, R., F. Bao, J. Guo. Trust-Based Service Management for Social Internet of Things Systems. – IEEE Transactions on Dependable and Secure Computing, Vol. 13, 2015, No 6, pp. 684-696.10.1109/TDSC.2015.2420552
- 9. Bernabe, J. B., J. L. H. Ramos, A. F. S. Gomez. TACIoT: Multidimensional Trust-Aware Access Control System for the Internet of Things. – Soft Computing, Vol. 20, 2016, No 5, pp. 1763-1779.10.1007/s00500-015-1705-6
- 10. Ben, Y., A. Olivereau, D. Zeghlache, M. Laurent. Trust Management System Design for the Internet of Things : A Context-Aware and Multi-Service Approach. – Comput. Secur., 2013, pp. 1-15.
- 11. Alshehri, M. D., F. K. Hussain, O. K. Hussain. – Mobile Netw Appl., Vol. 23, 2018, 419. https://doi.org/10.1007/s11036-018-1017-z10.1007/s11036-018-1017-z
- 12. Mahmud, M., M. S. Kaiser, M. M. Rahman, et al. Cogn. Comput., Vol. 10, 2018, 864. https://doi.org/10.1007/s12559-018-9543-310.1007/s12559-018-9543-3
- 13. Mohammad, M., A. Khalid, C. Subhash. RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks. 2008, pp. 347-352. DOI: 10.1109/ISSNIP.2007.4496868.10.1109/ISSNIP.2007.4496868
- 14. Chen, I. R., F. Bao, J. Guo. Trust-Based Service Management for Social Internet of Things Systems. – IEEE Transactions on Dependable and Secure Computing, 2016.10.1109/TDSC.2015.2420552
- 15. Nitti, M., R. Girau, L. Atzori. Trustworthiness Management in the Social Internet of Things. – IEEE Transactions on Knowledge and Data Management, Vol. 26, 2014, No 5, pp. 1253-1266.10.1109/TKDE.2013.105
- 16. Chen, I. R., et al. Dynamic Trust Management for Delay Tolerant Networks and Its Aapplication to Secure Routing. – IEEE Transactions Parallel and Distributed Systems, Vol. 25, 2014, No 5, pp. 1200-1210.10.1109/TPDS.2013.116
- 17. Liu, Yu-Chao, et al. A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking. – International Journal of Automation and Computing, Vol. 8, 2011, No 3, pp. 280-285.10.1007/s11633-011-0583-3
- 18. Chen, I. R., J. Guo, F. Bao. Trust Management for SOA-Based IoT and Its Application to Service Composition. – IEEE Transactions on Service Computing, Vol. 9, 2016, No 3, pp. 482-495.10.1109/TSC.2014.2365797
- 19. Freeman, L. C. Centrality on Social Networks. – Social Networks, Vol. 1, 1979, pp. 215-239.10.1016/0378-8733(78)90021-7
- 20. Chen, Z., R. Ling, C. M. Huang, X. Zhu. A Scheme of Access Service Recommendation for the Social Internet of Things. – International Journal of Communication Systems, Vol. 29, 2016, No 4, pp. 694-706.10.1002/dac.2930
- 21. Noor, T. H., et al. Trust Management of Services in Cloud Environments: Obstacles and Solutions. – ACM Computing Surveys (CSUR), Vol. 46, 2013, No 1, pp. 1-30.10.1145/2522968.2522980
- 22. Alshehri, M. D., F. K. Hussain. A Fuzzy Security Protocol for Trust Management in the Internet of Things (Fuzzy-IoT). – Computing, Vol. 101, 2019, pp. 791-818. DOI:10.1007/s00607-018-0685-7.10.1007/s00607-018-0685-7
- 23. Javanmardi, S., et al. FRTRUST: A Fuzzy Reputation Based Model for Trust Management in Semantic P2P Grids. – arXiv preprint arXiv:1404.2632, 2014.
- 24. Bendiab, K., S. Shiaeles, S. Boucherkha. A New Dynamic Trust Model for “On Cloud” Federated Identity Management. – In: Proc. of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS’18), Paris, 2018, pp. 1-5.10.1109/NTMS.2018.8328673
- 25. Bendiab, K., N. Kolokotronis, S. Shiaeles, S. Boucherkha. WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. – In: Proc. of 16th IEEE Intl. Conf. on Dependable, Autonomic and Secure Computing, 16th Int. Conf. on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech’18), Athens, 2018, pp. 724-729.
- 26. Asiri, S., A. Miri. An IoT Trust and Reputation Model Based on Recommender Systems. – In: Proc. of 14th Annual Conference on Privacy, Security and Trust (PST’16), Auckland, 2016, pp. 561-568. DOI: 10.1109/PST.2016.7907017.10.1109/PST.2016.7907017
- 27. Singh, A. V., V. Juyal, R. Saggar. Trust Based Intelligent Routing Algorithm for Delay Tolerant Network Using Artificial Neural Network. – Wireless Netw., Vol. 23, 2017, pp. 693-702. DOI:10.1007/s11276-015-1166-y.10.1007/s11276-015-1166-y
- 28. Cha, I., et al. Trust in M2M Communication. – IEEE Vehicular Technology Magazine, Vol. 4, 2009, No 3, pp. 69-75.10.1109/MVT.2009.933478
- 29. Shala, B., et al. Ensuring Trustworthiness for P2P-Based M2M Applications. – Internet Technologies and Applications (ITA), Wrexham, 2017, pp. 58-63.10.1109/ITECHA.2017.8101911
- 30. Zhang, W., et al. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT. – IEEE Internet of Things Journal, 2020.
- 31. Muhati, E., D. B. Rawat. Hidden Markov Model Enabled Prediction and Visualization of Cyber Agility in IoT Era. – IEEE Internet of Things Journal, 2021.10.1109/JIOT.2021.3056118
- 32. Imran, M., et al. PLEDGE: A Proof-of-Honesty Based Consensus Protocol for Blockchain-Based IoT Systems. – In: Proc. of 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, 2020.
- 33. Siby, S., R. R. Maiti, N. O. Tippenhauer. Iotscanner: Detecting Privacy Threats in Iot Neighborhoods. – In: Proc. of 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017.
- 34. Chen, Z., L. Tian, C. Lin. Trust Model of Wireless Sensor Networks and Its Application in Data Fusion. – Sensors, Vol. 17, 2017. 10.3390/s17040703.10.3390/s17040703542166328350347
- 35. Maad, M. Artificial Neural Networks Advantages and Disadvantages. Bagdad College of Economic Science University, 2018.
