Have a personal or library account? Click to login
Linear Regression Trust Management System for IoT Systems Cover

References

  1. 1. Chen, D., G. Chang, D. Sun, J. Li, J. Jia, X. Wang. TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things. – Comput. Sci. Inf. Syst., Vol. 8, 2011, No 4, pp. 1207-1228.10.2298/CSIS110303056C
  2. 2. Almogren, Ahmad, et al. FTM-IoMT: Fuzzy-Based Trust Management for Preventing Sybil Attacks in Internet of Medical Things. – IEEE Internet of Things Journal, 2020.10.1109/JIOT.2020.3027440
  3. 3. Zhao, H., X. Li. VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks. – The Journal of Supercomputing, Vol. 64, 2013, No 3, pp. 805-829.10.1007/s11227-011-0576-6
  4. 4. Becker, M. Y., P. Sewell. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. – In: Proc. of 17th IEEE Computer Security Foundations Workshop, IEEE, 2004.
  5. 5. Li, Hui-Jia, et al. Exploring the Trust Management Mechanism in Self-Organizing Complex Network Based on Game Theory. – Physica A: Statistical Mechanics and its Applications, Vol. 542, 2020, 123514.10.1016/j.physa.2019.123514
  6. 6. Yan, Z., P. Zhang, A. V. Vasilakos. A Survey on Trust Management for Internet of Things. – Journal of Network and Computer Applications, Vol. 42, 2014, pp. 120-134.10.1016/j.jnca.2014.01.014
  7. 7. Guo, J., R. Chen, J. J. Tsai. A Survey of Trust Computation Models for Service Management in Internet of Things Systems. – Computer Communications, Vol. 97, 2017, pp. 1-14.10.1016/j.comcom.2016.10.012
  8. 8. Chen, R., F. Bao, J. Guo. Trust-Based Service Management for Social Internet of Things Systems. – IEEE Transactions on Dependable and Secure Computing, Vol. 13, 2015, No 6, pp. 684-696.10.1109/TDSC.2015.2420552
  9. 9. Bernabe, J. B., J. L. H. Ramos, A. F. S. Gomez. TACIoT: Multidimensional Trust-Aware Access Control System for the Internet of Things. – Soft Computing, Vol. 20, 2016, No 5, pp. 1763-1779.10.1007/s00500-015-1705-6
  10. 10. Ben, Y., A. Olivereau, D. Zeghlache, M. Laurent. Trust Management System Design for the Internet of Things : A Context-Aware and Multi-Service Approach. – Comput. Secur., 2013, pp. 1-15.
  11. 11. Alshehri, M. D., F. K. Hussain, O. K. Hussain. – Mobile Netw Appl., Vol. 23, 2018, 419. https://doi.org/10.1007/s11036-018-1017-z10.1007/s11036-018-1017-z
  12. 12. Mahmud, M., M. S. Kaiser, M. M. Rahman, et al. Cogn. Comput., Vol. 10, 2018, 864. https://doi.org/10.1007/s12559-018-9543-310.1007/s12559-018-9543-3
  13. 13. Mohammad, M., A. Khalid, C. Subhash. RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks. 2008, pp. 347-352. DOI: 10.1109/ISSNIP.2007.4496868.10.1109/ISSNIP.2007.4496868
  14. 14. Chen, I. R., F. Bao, J. Guo. Trust-Based Service Management for Social Internet of Things Systems. – IEEE Transactions on Dependable and Secure Computing, 2016.10.1109/TDSC.2015.2420552
  15. 15. Nitti, M., R. Girau, L. Atzori. Trustworthiness Management in the Social Internet of Things. – IEEE Transactions on Knowledge and Data Management, Vol. 26, 2014, No 5, pp. 1253-1266.10.1109/TKDE.2013.105
  16. 16. Chen, I. R., et al. Dynamic Trust Management for Delay Tolerant Networks and Its Aapplication to Secure Routing. – IEEE Transactions Parallel and Distributed Systems, Vol. 25, 2014, No 5, pp. 1200-1210.10.1109/TPDS.2013.116
  17. 17. Liu, Yu-Chao, et al. A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking. – International Journal of Automation and Computing, Vol. 8, 2011, No 3, pp. 280-285.10.1007/s11633-011-0583-3
  18. 18. Chen, I. R., J. Guo, F. Bao. Trust Management for SOA-Based IoT and Its Application to Service Composition. – IEEE Transactions on Service Computing, Vol. 9, 2016, No 3, pp. 482-495.10.1109/TSC.2014.2365797
  19. 19. Freeman, L. C. Centrality on Social Networks. – Social Networks, Vol. 1, 1979, pp. 215-239.10.1016/0378-8733(78)90021-7
  20. 20. Chen, Z., R. Ling, C. M. Huang, X. Zhu. A Scheme of Access Service Recommendation for the Social Internet of Things. – International Journal of Communication Systems, Vol. 29, 2016, No 4, pp. 694-706.10.1002/dac.2930
  21. 21. Noor, T. H., et al. Trust Management of Services in Cloud Environments: Obstacles and Solutions. – ACM Computing Surveys (CSUR), Vol. 46, 2013, No 1, pp. 1-30.10.1145/2522968.2522980
  22. 22. Alshehri, M. D., F. K. Hussain. A Fuzzy Security Protocol for Trust Management in the Internet of Things (Fuzzy-IoT). – Computing, Vol. 101, 2019, pp. 791-818. DOI:10.1007/s00607-018-0685-7.10.1007/s00607-018-0685-7
  23. 23. Javanmardi, S., et al. FRTRUST: A Fuzzy Reputation Based Model for Trust Management in Semantic P2P Grids. – arXiv preprint arXiv:1404.2632, 2014.
  24. 24. Bendiab, K., S. Shiaeles, S. Boucherkha. A New Dynamic Trust Model for “On Cloud” Federated Identity Management. – In: Proc. of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS’18), Paris, 2018, pp. 1-5.10.1109/NTMS.2018.8328673
  25. 25. Bendiab, K., N. Kolokotronis, S. Shiaeles, S. Boucherkha. WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. – In: Proc. of 16th IEEE Intl. Conf. on Dependable, Autonomic and Secure Computing, 16th Int. Conf. on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech’18), Athens, 2018, pp. 724-729.
  26. 26. Asiri, S., A. Miri. An IoT Trust and Reputation Model Based on Recommender Systems. – In: Proc. of 14th Annual Conference on Privacy, Security and Trust (PST’16), Auckland, 2016, pp. 561-568. DOI: 10.1109/PST.2016.7907017.10.1109/PST.2016.7907017
  27. 27. Singh, A. V., V. Juyal, R. Saggar. Trust Based Intelligent Routing Algorithm for Delay Tolerant Network Using Artificial Neural Network. – Wireless Netw., Vol. 23, 2017, pp. 693-702. DOI:10.1007/s11276-015-1166-y.10.1007/s11276-015-1166-y
  28. 28. Cha, I., et al. Trust in M2M Communication. – IEEE Vehicular Technology Magazine, Vol. 4, 2009, No 3, pp. 69-75.10.1109/MVT.2009.933478
  29. 29. Shala, B., et al. Ensuring Trustworthiness for P2P-Based M2M Applications. – Internet Technologies and Applications (ITA), Wrexham, 2017, pp. 58-63.10.1109/ITECHA.2017.8101911
  30. 30. Zhang, W., et al. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT. – IEEE Internet of Things Journal, 2020.
  31. 31. Muhati, E., D. B. Rawat. Hidden Markov Model Enabled Prediction and Visualization of Cyber Agility in IoT Era. – IEEE Internet of Things Journal, 2021.10.1109/JIOT.2021.3056118
  32. 32. Imran, M., et al. PLEDGE: A Proof-of-Honesty Based Consensus Protocol for Blockchain-Based IoT Systems. – In: Proc. of 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, 2020.
  33. 33. Siby, S., R. R. Maiti, N. O. Tippenhauer. Iotscanner: Detecting Privacy Threats in Iot Neighborhoods. – In: Proc. of 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017.
  34. 34. Chen, Z., L. Tian, C. Lin. Trust Model of Wireless Sensor Networks and Its Application in Data Fusion. – Sensors, Vol. 17, 2017. 10.3390/s17040703.10.3390/s17040703542166328350347
  35. 35. Maad, M. Artificial Neural Networks Advantages and Disadvantages. Bagdad College of Economic Science University, 2018.
DOI: https://doi.org/10.2478/cait-2021-0040 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 15 - 27
Submitted on: Apr 26, 2021
Accepted on: Oct 12, 2021
Published on: Dec 9, 2021
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2021 Ananda Kumar Subramanian, Aritra Samanta, Sasmithaa Manickam, Abhinav Kumar, Stavros Shiaeles, Anand Mahendran, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.