[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

A Quantitative Comparative Study of Data-oriented Trust Management Schemes in Internet of Things

Published: 13 April 2022 Publication History

Abstract

In the Internet of Things (IoT) paradigm, all entities in the IoT network, whether home users or industrial things, receive data from other things to make decisions. However, in the decentralized, heterogeneous, and rapidly changing IoT network with billions of devices, deciding about where to get the services or information from is critical, especially because malicious entities can exist in such an unmanaged network. Security provisioning alone cannot solve the issue of service quality or reliability. One way to elevate security and reliability in the IoT network is to bridge the gap of trust between objects, and also between humans and objects, while taking into account the IoT network characteristics. Therefore, a proper trust management system must be established on top of the IoT network service architecture. Trust is related to the manner expected from objects in providing services and recommendations. Recommendations are the basis of decision making in every trust management system. Since trust management ideas in the IoT are still immature, the purpose of this article is to survey, analyze, and compare the approaches that have been taken in building trust management systems for the IoT. We break down the features of such systems by analysis and also do quantitative comparisons by simulation. This article is organized into two main parts. First, studies and approaches in this field are compared from four perspectives: (1) trust computation method, (2) resistance to attacks (3) adherence to the limitations of IoT networks and devices, and (4) performance of the trust management scheme. The second part is quantitative and simulates four major methods in this field and measures their performance. We also make extensive analytical comparisons to demonstrate the similarities and discrepancies of current IoT trust management schemes and extract the essence of a resilient trust management framework.

References

[1]
Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2010. The Internet of Things: A survey. Computer Networks 54, 15 (2010), 2787–2805.
[2]
Harald Sundmaeker, Patrick Guillemin, Peter Friess, and Sylvie Woelfflé. 2016. Vision and challenges for realising the Internet of Things. Cluster of European Research Projects on the Internet of Things, European Commision 3, 3 (2010), 34–36.
[3]
Geir M. Køien. 2011. Reflections on trust in devices: An informal survey of human trust in an Internet-of-Things context. Wireless Personal Communications 61, 3 (2011), 495–510.
[4]
Zheng Yan, Peng Zhang, and Athanasios V. Vasilakos. 2014. A survey on trust management for Internet of Things. Journal of Network and Computer Applications 42 (2014), 120–134.
[5]
Sabrina Sicari, Alessandra Rizzardi, Luigi Alfredo Grieco, and Alberto Coen-Porisini. 2015. Security, privacy and trust in Internet of Things: The road ahead. Computer Networks 76 (2015), 146–164.
[6]
Jia Guo, Ray Chen, and Jeffrey J. P. Tsai. 2017. A survey of trust computation models for service management in Internet of Things systems. Computer Communications 97 (2017), 1–14.
[7]
Ikram Ud Din, Mohsen Guizani, Byung-Seo Kim, Suhaidi Hassan, and Muhammad Khurram Khan. 2018. Trust management techniques for the Internet of Things: A survey. IEEE Access 7 (2018), 29763–29787.
[8]
Vera Suryani. 2016. A survey on trust in Internet of Things. In 8th International Conference on Information Technology and Electrical Engineering (ICITEE’16). IEEE. 1–6.
[9]
R. Thirukkumaran and P. Muthukannan. 2018. Survey: Security and trust management in Internet of Things. In IEEE Global Conference on Wireless Computing and Networking (GCWCN’18), IEEE. 131–134.
[10]
Mahmoud Ammar, Giovanni Russello, and Bruno Crispo. 2018. Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications 38 (2018), 8–27.
[11]
Ayesha Altaf, Haider Abbas, Faiza Iqbal, and Abdelouahid Derhab. 2019. Trust models of internet of smart things: A survey, open issues, and future directions. Journal of Network and Computer Applications 137 (2019), 93–111.
[12]
Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, and Jaedeok Lim. 2020. Security, privacy and trust for smart mobile-Internet of Things (M-IoT): A survey. IEEE Access 8 (2020), 167123–167163.
[13]
Farag Azzedin and Mustafa Ghaleb. 2019. Internet-of-Things and information fusion: Trust perspective survey. Sensors 19, 8 (2019), 1929.
[14]
Ilhem Souissi, Nadia Ben Azzouna, and Lamjed Ben Said. 2019. A multi-level study of information trust models in WSN-assisted IoT. Computer Networks 151 (2019), 12–30.
[15]
Abdelmuttlib Ibrahim Abdalla Ahmed, Siti Hafizah Ab Hamid, Abdullah Gani, and Muhammad Khurram Khan. 2019. Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges. Journal of Network and Computer Applications 145 (2019), 102409.
[16]
Behrouz Pourghebleh, Karzan Wakil, and Nima Jafari Navimipour. 2019. A comprehensive study on the trust management techniques in the Internet of Things. IEEE Internet of Things Journal 6, 6 (2019), 9326–9337.
[17]
Aakanksha Tewari and Brij B. Gupta. 2020. Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems 108 (2020), 909–920.
[18]
Avani Sharma, Emmanuel S. Pilli, Arka P. Mazumdar, and Poonam Gera. 2020. Towards trustworthy Internet of Things: A survey on trust management applications and schemes. Computer Communications 160 (2020), 475--493.
[19]
Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous, and Florence Sèdes. 2016. Trust management in social Internet of Things: A survey. In Conference on e-Business, E-Services and E-Society. Springer, 430–441.
[20]
Rajanpreet Kaur Chahal, Neeraj Kumar, and Shalini Batra. 2020. Trust management in social Internet of Things: A taxonomy, open issues, and challenges. Computer Communications 150 (2020), 13–46.
[21]
M. R. Rashmi and C. Vidya Raj. 2019. A review on trust models of social Internet of Things. In Emerging Research in Electronics, Computer Science and Technology, Springer, 203–209.
[22]
Elizabeth J. Chang, Farookh Hussain, and Tharam Dillon. 2006. Trust and Reputation for Service-oriented Environments: Technologies for Building Business Intelligence and Consumer Confidence. John Wiley & Sons.
[23]
Elizabeth J. Chang, Farookh Khadeer Hussain, and Tharam S. Dillon. 2005. Fuzzy nature of trust and dynamic trust modeling in service oriented environments. In Proceedings of the 2005 Workshop on Secure Web Services 75–83.
[24]
Chaker Abdelaziz Kerrache, Carlos T. Calafate, Juan-Carlos Cano, Nasreddine Lagraa, and Pietro Manzoni. 2016. Trust management for vehicular networks: An adversary-oriented overview. IEEE Access 4 (2016), 9293–9307.
[25]
Matt Blaze, Joan Feigenbaum, and Jack Lacy. 1996. Decentralized trust management. In Proceedings 1996 IEEE Symposium on Security and Privacy. IEEE, 164–173.
[26]
Audun Jøsang, Claudia Keser, and Theo Dimitrakos. 2005. Can we manage trust? In International Conference on Trust Management. Springer, Berlin, 93–107.
[27]
Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2011. Siot: Giving a social structure to the Internet of Things. IEEE Communications Letters 15, 11 (2011), 1193–1195.
[28]
Dong Chen, Guiran Chang, Dawei Sun, Jiajia Li, Jie Jia, and Xingwei Wang. 2011. TRM-IoT: A trust management model based on fuzzy reputation for Internet of Things. Computer Science and Information Systems 8, 4 (2011), 1207–1228.
[29]
Fenye Bao and Ing-Ray Chen. 2012. Dynamic trust management for Internet of Things applications. In Proceedings of the 2012 International Workshop on Self-aware Internet of Things, 1–6.
[30]
Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, and Maryline Laurent. 2013. Trust management system design for the Internet of Things: A context-aware and multi-service approach. Computers & Security 39 (2013), 351–365.
[31]
Ray Chen, Jia Guo, and Fenye Bao. 2016. Trust management for SOA-based IoT and its application to service composition. IEEE Transactions on Services Computing 9, 3 (2016), 482–495.
[32]
Jie Yuan and Xiaoyong Li. 2018. A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion. IEEE Access 6 (2018), 23626–23638.
[33]
Jia Guo, Ray Chen, Jeffrey J. P. Tsai, and Hamid Al-Hamadi. 2016. Trust-based IoT participatory sensing for hazard detection and response. In International Conference on Service-oriented Computing, Springer, 79–84.
[34]
Abouzar Arabsorkhi, Mohammad Sayad Haghighi, and Roghayeh Ghorbanloo. 2016. A conceptual trust model for the Internet of Things interactions. In 8th International Symposium on Telecommunications (IST’16). IEEE, 89–93.
[35]
Ray Chen, Jia Guo, Ding-Chau Wang, Jeffrey J. P. Tsai, Hamid Al-Hamadi, and Ilsun You. 2018. Trust-based service management for mobile cloud IoT systems. IEEE Transactions on Network and Service Management 16, 1 (2018), 246–263.
[36]
Hamid Al-Hamadi, Ray Chen, and Jin-Hee Cho. 2019. Trust management of smart service communities. IEEE Access 7 (2019), 26362–26378.
[37]
Michele Nitti, Roberto Girau, Luigi Atzori, Antonio Iera, and Giacomo Morabito. 2012. A subjective model for trustworthiness evaluation in the social Internet of Things. In IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC’12). IEEE, 18–23.
[38]
Fenye Bao, Ray Chen, and Jia Guo. 2013. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems. In IEEE 11th International Symposium on Autonomous Decentralized Systems (ISADS’13). IEEE, 1–7.
[39]
Michele Nitti, Roberto Girau, and Luigi Atzori. 2013. Trustworthiness management in the social Internet of Things. IEEE Transactions on Knowledge and Data Engineering 26, 5 (2013), 1253–1266.
[40]
Yanbing Liu, Xuehong Gong, and Congcong Xing. 2014. A novel trust-based secure data aggregation for Internet of Things. In 9th International Conference on Computer Science & Education. IEEE, 435–439.
[41]
Hannan Xiao, Nitin Sidhu, and Bruce Christianson. 2015. Guarantor and reputation based trust model for social Internet of Things. In International Wireless Communications and Mobile Computing Conference (IWCMC’15). IEEE, 600–605.
[42]
Ray Chen, Fenye Bao, and Jia Guo. 2016. Trust-based service management for social Internet of Things systems. IEEE Transactions on Dependable and Secure Computing 13, 6 (2016), 684–696.
[43]
Sherif Emad Abdel Rafey, Ayman Abdel-Hamid, and Mohamad Abou El-Nasr. 2016. CBSTM-IoT: Context-based social trust model for the Internet of Things. In International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT’16). IEEE, 1–8.
[44]
Eleftherios Kokoris-Kogias, Orfefs Voutyras, and Theodora Varvarigou. 2016. TRM-SIoT: A scalable hybrid trust & reputation model for the social Internet of Things. In IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA’16). IEEE, 1–9.
[45]
Upul Jayasinghe, Nguyen B. Truong, Gyu Myoung Lee, and Tai-Won Um. 2016. RPR: A trust computation model for social Internet of Things. In International IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld’16). IEEE, 930–937.
[46]
Zhiting Lin and Liang Dong. 2018. Clarifying trust in social Internet of Things. 2018. IEEE Transactions on Knowledge and Data Engineering 30, 2 (2018), 234–248.
[47]
Hui Xia, Fu Xiao, San-Shun Zhang, Xiang-Guo Cheng, and Zhen-Kuan Pan. 2018. A reputation-based model for trust evaluation in social cyber-physical systems. IEEE Transactions on Network Science and Engineering 7, 2 (2018), 792–804.
[48]
Muhammad Ajmal Azad, Samiran Bag, Feng Hao, and Andrii Shalaginov. 2020. Decentralized self-enforcing trust management system for social Internet of Things. IEEE Internet of Things Journal 7, 4 (2020), 2690–2703.
[49]
David Airehrour, Jairo A. Gutierrez, and Sayan Kumar Ray. 2019. SecTrust-RPL: A secure trust-aware RPL routing protocol for Internet of Things. Future Generation Computer Systems 93 (2019), 860–876.
[50]
Aditya Tandon and Prakash Srivastava. 2019. Trust-based enhanced secure routing against rank and sybil attacks in IoT. In 12th International Conference on Contemporary Computing (IC3’19). IEEE, 1–7.
[51]
Mohammad Sayad Haghighi and Kamal Mohamedpour. 2008. Securing wireless sensor networks against broadcast attacks. In International Symposium on Telecommunications. IEEE, 49–54.
[52]
Mohammad Sayad Haghighi and Kamal Mohamedpour. 2010. Neighbor Discovery: Security Challenges in Wireless ad Hoc and Sensor Networks. INTECH Open Access Publisher.
[53]
X. Anita, J. Martin Leo Manickam, and Marcharla Anjaneyulu Bhagyaveni. 2013. Two-way acknowledgment-based trust framework for wireless sensor networks. International Journal of Distributed Sensor Networks 9, 5 (2013), 952905.
[54]
Sovan Bhattacharya and Arnab Ghosh. 2013. Entropy trust based approach against IP spoofing attacks in network. International Journal of Computer Applications 67, 23 (2013), 27--32.
[55]
Radhika A. Raje and Apeksha V. Sakhare. 2014. Routing in wireless sensor network using fuzzy based trust model. In 4th International Conference on Communication Systems and Network Technologies. IEEE, 529–532.
[56]
Yan Gao and Wenfen Liu. 2014. BeTrust: A dynamic trust model based on bayesian inference and tsallis entropy for medical sensor networks. Journal of Sensors 2014, Article 649392 (2014), 10 pages.
[57]
Tao Yang, Xu Xiangyang, Li Peng, Li Tonghui, and Pan Leina. 2018. A secure routing of wireless sensor networks based on trust evaluation model. Procedia Computer Science 131 (2018), 1156–1163.
[58]
Osama AlFarraj, Ahmad AlZubi, and Amr Tolba. 2018. Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. Journal of Ambient Intelligence and Humanized Computing (2018), 1–11.
[59]
M. Selvi, K. Thangaramya, Sannasi Ganapathy, Kanagasabai Kulothungan, H. Khannah Nehemiah, and Arputharaj Kannan. 2019. An energy aware trust based secure routing algorithm for effective communication in wireless sensor networks. Wireless Personal Communications 105, 4 (2019), 1475–1490.
[60]
Weidong Fang, Wuxiong Zhang, Wei Chen, Yang Liu, and Chaogang Tang. 2020. TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wireless Networks 26, 5 (2020), 3169--3182.
[61]
Aljawharah Alnasser and Hongjian Sun. 2017. A fuzzy logic trust model for secure routing in smart grid networks. IEEE Access 5 (2017), 17896–17903.
[62]
Antesar M. Shabut, Keshav P. Dahal, Sanat Kumar Bista, and Irfan U. Awan. 2015. Recommendation based trust model with an effective defence scheme for MANETs. IEEE Transactions on Mobile Computing 14, 10 (2015), 2101–2115.
[63]
Vaishali V. Sarbhukan and Lata Ragha. 2020. Establishing secure routing path using trust to enhance security in MANET. Wireless Personal Communications 110, 1 (2020), 245–255.
[64]
Wenjia Li, Houbing Song, and Feng Zeng. 2017. Policy-based secure and trustworthy sensing for Internet of Things in smart cities. IEEE Internet of Things Journal 5, 2 (2017), 716–723.
[65]
Xiaolong Xu, Xihua Liu, Zhanyang Xu, Fei Dai, Xuyun Zhang, and Lianyong Qi. 2019. Trust-oriented IoT service placement for smart cities in edge computing. IEEE Internet of Things Journal 7, 5 (2019), 4084–4091.
[66]
Jia Guo, Ray Chen, Ding-Chau Wang, Jeffrey J. P. Tsai, and Hamid Al-Hamadi. 2019. Trust-based IoT cloud participatory sensing of air quality. Wireless Personal Communications 105, 4 (2019), 1461–1474.
[67]
Gour C. Karmakar, Rajkumar Das, and Joarder Kamruzzaman. 2019. IoT sensor numerical data trust model using temporal correlation. IEEE Internet of Things Journal 7, 4 (2019), 2573–2581.
[68]
Zhiquan Liu, Jian Weng, Jianfeng Ma, Jingjing Guo, Bingwen Feng, Zhongyuan Jiang, and Kaimin Wei. 2019. TCEMD: A trust cascading-based emergency message dissemination model in VANETs. IEEE Internet of Things Journal 7, 5 (2019), 4028–4048.
[69]
Aljawharah Alnasser, Hongjian Sun, and Jing Jiang. 2019. Recommendation-based trust model for vehicle-to-everything (V2X). IEEE Internet of Things Journal 7, 1 (2019), 440–450.
[70]
Jingjing Guo, Xinghua Li, Zhiquan Liu, Jianfeng Ma, Chao Yang, Junwei Zhang, and Dapeng Wu. 2020. TROVE: A context-awareness trust model for VANETs using reinforcement learning. IEEE Internet of Things Journal 7, 7 (2020), 6647–6662.
[71]
Farhan Ahmad, Fatih Kurugollu, Asma Adnane, Rasheed Hussain, and Fatima Hussain. 2020. MARINE: Man-in-the-middle attack resistant trust model in connected vehicles. IEEE Internet of Things Journal 7, 4 (2020), 3310–3322.
[72]
Xu Han, Niam Yaraghi, and Ram Gopal. 2019. Catching them red-handed: Optimizing the nursing homes’ rating system. ACM Transactions on Management Information Systems (TMIS) 10, 2 (2019), 1–26
[73]
Tatiana Ermakova, Benjamin Fabian, Marta Kornacka, Scott Thiebes, and Ali Sunyaev. 2020. Security and privacy requirements for cloud computing in healthcare: Elicitation and prioritization from a patient perspective. ACM Transactions on Management Information Systems (TMIS) 11, 2 (2020), 1–29.
[74]
Kai Kang, Zhibo Pang, Li Da Xu, Liya Ma, and Cong Wang. 2014. An interactive trust model for application market of the Internet of Things. IEEE Transactions on Industrial Informatics 10, 2 (2014), 1516–1526.
[75]
Hamid Al-Hamadi and Ray Chen. 2017. Trust-based decision making for health IoT systems. IEEE Internet of Things Journal 4, 5 (2017), 1408–1419.
[76]
Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, and Ahmed Serhrouchni. 2018. Bubbles of trust: A decentralized blockchain-based authentication system for IoT. Computers & Security 78 (2018), 126–142.
[77]
Nirnay Ghosh, Saket Chandra, Vinay Sachidananda, and Yuval Elovici. 2019. SoftAuthZ: A context-aware, behavior-based authorization framework for home IoT. IEEE Internet of Things Journal 6, 6 (2019), 10773–10785.
[78]
Carolina V. L. Mendoza and João H. Kleinschmidt. 2015. Mitigating on-off attacks in the Internet of Things using a distributed trust management scheme. International Journal of Distributed Sensor Networks 11, 11 (2015), 859731.
[79]
Joanna Głowacka, Jaroslaw Krygier, and Marek Amanowicz. 2015. A trust-based situation awareness system for military applications of the Internet of Things. In IEEE 2nd World Forum on Internet of Things (WF-IoT’15) IEEE, 490–495.
[80]
Rahul Talreja, SriPradha Sathish, Kamlesh Nenwani, and Kumkum Saxena. 2016. Trust and behavior based system to prevent collision in IoT enabled VANET. In International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES’16). IEEE, 1588–1591.
[81]
A. Meena Kowshalya, and M. L. Valarmathi. 2017. Trust management for reliable decision making among social objects in the Social Internet of Things. IET Networks 6, 4 (2017), 75–80.
[82]
Upul Jayasinghe, Abayomi Otebolaku, Tai-Won Um, and Gyu Myoung Lee. 2017. Data centric trust evaluation and prediction framework for IoT. In ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K’17). IEEE, 1–7.
[83]
Guntur Dharma Putra, Volkan Dedeoglu, Salil S. Kanhere, and Raja Jurdak. 2020. Trust management in decentralized IoT access control system. In IEEE International Conference on Blockchain and Cryptocurrency (ICBC’20). IEEE, 1–9.
[84]
Sidra Malik, Volkan Dedeoglu, Salil S. Kanhere, and Raja Jurdak. 2019. Trustchain: Trust management in blockchain and iot supported supply chains. In IEEE International Conference on Blockchain (Blockchain’19). IEEE, 184–193.
[85]
Besat Jafarian, Nasser Yazdani, and Mohammad Sayad Haghighi. 2020. Discrimination-aware trust management for social Internet of Things. Computer Networks 178 (2020), 107254.
[86]
Sahar Kouroshnezhad, Ali Peiravi, Mohammad Sayad Haghighi, and Alireza Jolfaei. 2020. Energy-efficient drone trajectory planning for the localization of 6G-enabled IoT devices. IEEE Internet of Things Journal 8, 7 (2020), 5202–5210.
[87]
Sahar Kouroshnezhad, Ali Peiravi, Mohammad Sayad Haghighi, and Alireza Jolfaei. 2020. An energy-aware drone trajectory planning scheme for terrestrial sensors localization. Computer Communications 154 (2020), 542–550.
[88]
Sebastian Seeber, Anuj Sehgal, Björn Stelte, Gabi Dreo Rodosek, and Jürgen Schönwälder. 2013. Towards a trust computing architecture for RPL in cyber physical systems. In Proceedings of the 9th International Conference on Network and Service Management (CNSM’13). IEEE, 134–137.
[89]
Parikshit N. Mahalle, Pravin A. Thakre, Neeli Rashmi Prasad, and Ramjee Prasad. 2013. A fuzzy approach to trust based access control in Internet of Things. In International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace and Electronic Systems Technology (Wireless VITAE). IEEE, 1–5.
[90]
Reena Varghese, T. Chithralekha, and Carynthia Kharkongor. 2016. Self-organized cluster based energy efficient meta trust model for Internet of Things. In IEEE International Conference on Engineering and Technology (ICETECH’16). IEEE. 382–389.
[91]
Sarah Asiri and Ali Miri. 2016. An IoT trust and reputation model based on recommender systems. In 14th Annual Conference on Privacy, Security and Trust (PST’16). IEEE, 561–568.
[92]
Xu Wu. 2018. A robust and adaptive trust management system for guaranteeing the availability in the Internet of Things environments. KSII Transactions on Internet and Information Systems (TIIS) 12, 5 (2018), 2396–2413.
[93]
Mufti Mahmud, M. Shamim Kaiser, M. Mostafizur Rahman, M. Arifur Rahman, Antesar Shabut, Shamim Al-Mamun, and Amir Hussain. 2018. A brain-inspired trust management model to assure security in a cloud based IoT framework for neuroscience applications. Cognitive Computation 10, 5 (2018), 864–873.
[94]
Roberto Di Pietro, Xavier Salleras, Matteo Signorini, and Erez Waisbard. 2018. A blockchain-based trust system for the Internet of Things. In Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies. 77–83.
[95]
Dong Chen, Guiran Chang, Lizhong Jin, Xiaodong Ren, Jiajia Li, and Fengyun Li. 2011. A novel secure architecture for the Internet of Things. In 5th International Conference on Genetic and Evolutionary Computing. IEEE, 311–314.
[96]
Ioannis Kounelis, Gianmarco Baldini, Ricardo Neisse, Gary Steri, Mariachiara Tallacchini, and Angela Guimaraes Pereira. 2014. Building trust in the human? Internet of Things relationship. IEEE Technology and Society Magazine 33, 4 (2014), 73–80.
[97]
Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulaki, Panagiotis Vlacheas, and Raffaele Giaffreda. 2014. A model-based security toolkit for the Internet of Things. In 9th International Conference on Availability, Reliability and Security. IEEE, 78–87.
[98]
Hiroyuki Sato, Atsushi Kanai, Shigeaki Tanimoto, and Toru Kobayashi. 2016. Establishing trust in the emerging era of IoT. In IEEE Symposium on Service-Oriented System Engineering (SOSE’16). IEEE, 398–406.
[99]
Ştefan-Ciprian Arseni, Maria Miţoi, and Alexandru Vulpe. 2016. Pass-IoT: A platform for studying security, privacy and trust in IoT. In International Conference on Communications (COMM’16). IEEE. 261–266.
[100]
Carmen Fernandez-Gago, Francisco Moyano, and Javier Lopez. 2017. Modelling trust dynamics in the Internet of Things. Information Sciences 396 (2017), 72–82.
[101]
Mohammad Sayad Haghighi, Maryam Ebrahimi, Sahil Garg, and Alireza Jolfaei. 2021. Intelligent trust-based public key management for IoT by linking edge devices in a fog architecture. IEEE Internet of Things Journal 8, 16 (2021), 12716--12723, DOI:
[102]
Laizhong Cui, Shu Yang, Ziteng Chen, Yi Pan, Zhong Ming, and Mingwei Xu. 2019. A decentralized and trusted edge computing platform for Internet of Things. IEEE Internet of Things Journal 7, 5 (2019), 3910–3922.
[103]
Hui Yang, Jiaqi Yuan, Haipeng Yao, Qiuyan Yao, Ao Yu, and Jie Zhang. 2019. Blockchain-based hierarchical trust networking for JointCloud. IEEE Internet of Things Journal 7, 3 (2019), 1667–1677.
[104]
Shancang Li, Tao Qin, and Geyong Min. 2019. Blockchain-based digital forensics investigation framework in the Internet of Things and social systems. IEEE Transactions on Computational Social Systems 6, 6 (2019), 1433–1441.
[105]
Wenjuan Li, Yu Wang, Jin Li, and Man Ho Au. 2021. Toward a blockchain-based framework for challenge-based collaborative intrusion detection. International Journal of Information Security 20, 2 (2021), 127--139.
[106]
Jun Lin, Zhiqi Shen, and Chunyan Miao. 2017. Using blockchain technology to build trust in sharing LoRaWAN IoT. In Proceedings of the 2nd International Conference on Crowd Science and Engineering. 38–43.
[107]
Bin Wen, Ziqiang Luo, and Yazhi Wen. 2018. Evidence and trust: IoT collaborative security mechanism. In 8th International Conference on Information Science and Technology (ICIST’18). IEEE, 98–99.
[108]
Ma Zhaofeng, Wang Lingyun, Wang Xiaochang, Wang Zhen, and Zhao Weizhe. 2019. Blockchain-enabled decentralized trust management and secure usage control of IoT big data. IEEE Internet of Things Journal 7, 5 (2019), 4000–4015.
[109]
Shaoyong Guo, Yao Dai, Siya Xu, Xuesong Qiu, and Feng Qi. 2019. Trusted cloud-edge network resource management: DRL-driven service function chain orchestration for IoT. IEEE Internet of Things Journal 7, 7 (2019), 6010–6022.
[110]
Fenye Bao and Ray Chen. 2012. Trust management for the Internet of Things and its application to service composition. In IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM’12). IEEE, 1–6.
[111]
Qinghua Li, Sencun Zhu, and Guohong Cao. 2010. Routing in socially selfish delay tolerant networks. In Proceedings IEEE Infocom. IEEE, 1–9.
[112]
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for internet applications. ACM SIGCOMM Computer Communication Review 31, 4 (2001), 149–160.
[113]
Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (2007), 618–644.
[114]
Audun Jøsang and Roslan Ismail. 2002. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference 5, 2502–2511.
[115]
Michele Nitti, Luigi Atzori, and Irena Pletikosa Cvijikj. 2014. Friendship selection in the social Internet of Things: Challenges and possible strategies. IEEE Internet of Things Journal 2, 3 (2014), 240–247.
[116]
Yating Wang, Ray Chen, Jin-Hee Cho, Ananthram Swami, Yen-Cheng Lu, Chang-Tien Lu, and Jeffrey J. P. Tsai. 2016. CATrust: Context-aware trust management for service-oriented ad hoc networks. IEEE Transactions on Services Computing 11, 6 (2016), 908–921.
[117]
Yan Lindsay Sun, Zue Han, Wei Yu, and KJ Ray Liu. 2006. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings Of the 25th IEEE International Conference on Computer Communications (IEEE INFOCOM’06). IEEE, 1–13.
[118]
Zibin Zheng, Yilei Zhang, and Michael R. Lyu. 2012. Investigating QoS of real-world web services. IEEE Transactions on Services Computing 7, 1 (2012), 32–39.
[119]
Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web. 640–651.
[120]
Li Xiong and Ling Liu. 2004. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16, 7 (2004), 843–857.
[121]
Sokol Kosta, Alessandro Mei, and Julinda Stefa. 2010. Small world in motion (SWIM): Modeling communities in ad-hoc mobile networking. In 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON’10). IEEE. 1–9.

Cited By

View all
  • (2025)Using attentive temporal GNN for dynamic trust assessment in the presence of malicious entitiesExpert Systems with Applications10.1016/j.eswa.2024.125391260(125391)Online publication date: Jan-2025
  • (2024)SCoTMan: A Scalable Smart Contract for Trust Management in Social IoT With Real-World ConstraintsIEEE Access10.1109/ACCESS.2024.341158112(137836-137850)Online publication date: 2024
  • (2023)IoT trust and reputation: a survey and taxonomyJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-023-00416-812:1Online publication date: 22-Mar-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Management Information Systems
ACM Transactions on Management Information Systems  Volume 13, Issue 3
September 2022
312 pages
ISSN:2158-656X
EISSN:2158-6578
DOI:10.1145/3512349
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 April 2022
Accepted: 01 July 2021
Revised: 01 May 2021
Received: 01 January 2021
Published in TMIS Volume 13, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Internet of things
  2. trust management
  3. data mining
  4. recommender systems
  5. decision making
  6. cyber security

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • Iran National Science Foundation (INSF)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)173
  • Downloads (Last 6 weeks)21
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2025)Using attentive temporal GNN for dynamic trust assessment in the presence of malicious entitiesExpert Systems with Applications10.1016/j.eswa.2024.125391260(125391)Online publication date: Jan-2025
  • (2024)SCoTMan: A Scalable Smart Contract for Trust Management in Social IoT With Real-World ConstraintsIEEE Access10.1109/ACCESS.2024.341158112(137836-137850)Online publication date: 2024
  • (2023)IoT trust and reputation: a survey and taxonomyJournal of Cloud Computing: Advances, Systems and Applications10.1186/s13677-023-00416-812:1Online publication date: 22-Mar-2023
  • (2023)Trust Management Enhancement for the Internet of Things: a Smart Contract Approach2023 13th International Conference on Computer and Knowledge Engineering (ICCKE)10.1109/ICCKE60553.2023.10326312(383-388)Online publication date: 1-Nov-2023
  • (2023)A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directionsHigh-Confidence Computing10.1016/j.hcc.2023.1001273:2(100127)Online publication date: Jun-2023
  • (2022)Introduction to the Special Issue on Pattern-Driven Mining, Analytics, and Prediction for Decision Making, Part IIACM Transactions on Management Information Systems10.1145/351246813:3(1-3)Online publication date: 11-Feb-2022
  • (2022)A Secure and Decentralized Trust Management Scheme for Smart Health SystemsIEEE Journal of Biomedical and Health Informatics10.1109/JBHI.2021.310733926:5(1961-1968)Online publication date: May-2022

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media