Trust Provision in the Internet of Things using Transversal Blockchain Networks

[1]  Frank Leymann,et al.  Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More , 2005 .

[2]  Marc Pilkington,et al.  Blockchain Technology: Principles and Applications , 2015 .

[3]  Jörg Daubert,et al.  A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).

[4]  Ramón Alcarria,et al.  Enhancing Evacuation Plans with a Situation Awareness System Based on End-User Knowledge Provision , 2014, Sensors.

[5]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[6]  Ramón Alcarria,et al.  Detecting Malicious Components in Large-Scale Internet-of-Things Systems and Architectures , 2017, WorldCIST.

[7]  David Evans,et al.  Efficient Data Tagging for Managing Privacy in the Internet of Things , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[8]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[9]  Jiafu Wan,et al.  Security in the Internet of Things: A Review , 2012, 2012 International Conference on Computer Science and Electronics Engineering.

[10]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[11]  Antonio F. Gómez-Skarmeta,et al.  Beyond the separation of identifier and locator: Building an identity-based overlay network architecture for the Future Internet , 2013, Comput. Networks.

[12]  Bin Zhao,et al.  Dynamic trust evaluation in open networks , 2016, Intell. Autom. Soft Comput..

[13]  Ning Zhang,et al.  A solution to privacy-preserving two-party sign test on vertically partitioned data (P22NSTv) using data disguising techniques , 2010, 2010 International Conference on Networking and Information Technology.

[14]  Z Shaikh,et al.  Notice of Violation of IEEE Publication PrinciplesA Study on Secure Multiparty Computation Problems and Their Relevance , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.

[15]  Peter Friess,et al.  Internet of Things Strategic Research Roadmap , 2011 .

[16]  Antonio F. Gómez-Skarmeta,et al.  TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..

[17]  Xiong Li,et al.  Research on the Architecture of Trusted Security System Based on the Internet of Things , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.

[18]  Jaydip Sen,et al.  Internet of Things - Applications and Challenges in Technology and Standardization , 2011 .

[19]  Ramón Alcarria,et al.  Plug-and-Play Transducers in Cyber-Physical Systems for Device-Driven Applications , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).

[20]  Aaron Yelowitz,et al.  Characteristics of Bitcoin users: an analysis of Google search data , 2014 .

[21]  Hailong Feng,et al.  Study of Recent Development about Privacy and Security of the Internet of Things , 2010, 2010 International Conference on Web Information Systems and Mining.

[22]  Jia Guo,et al.  Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).

[23]  Dong,et al.  Attack Resistant Trust Management Model Based on Beta Function for Distributed Routing in Internet of Things , 2012 .

[24]  Tao Liu,et al.  A WSN-Oriented Key Agreement Protocol in Internet of Things , 2013 .

[25]  Quan Zhou,et al.  Trusted architecture for farmland wireless sensor networks , 2012, 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings.

[26]  Antonio Iera,et al.  A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[27]  Tian Junfeng,et al.  A kind of dynamic software behavior trust model based on improved subjective logic , 2016 .

[28]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[29]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[30]  Borja Bordel,et al.  Cyber-physical systems: Extending pervasive sensing from control theory to the Internet of Things , 2017, Pervasive Mob. Comput..

[31]  Ramón Alcarria,et al.  Enhancing Process Control in Industry 4.0 Scenarios using Cyber-Physical Systems , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[32]  Miodrag Potkonjak,et al.  Security of IoT systems: Design challenges and opportunities , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[33]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[34]  Louis Coetzee,et al.  The Internet of Things - promise for the future? An introduction , 2011, 2011 IST-Africa Conference Proceedings.

[35]  Lifeng Wang,et al.  An innovative simulation environment for cross-domain policy enforcement , 2011, Simul. Model. Pract. Theory.

[36]  Mari Carmen Domingo,et al.  An overview of the internet of underwater things , 2012, J. Netw. Comput. Appl..

[37]  Lv Tingjie,et al.  Real-time business network selection based on auction mechanism , 2014, China Communications.

[38]  Zhongchuan Fu,et al.  A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks , 2011, Intell. Autom. Soft Comput..

[39]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[40]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[41]  Fenye Bao,et al.  Dynamic trust management for internet of things applications , 2012, Self-IoT '12.

[42]  Rolf H. Weber,et al.  Internet of Things - New security and privacy challenges , 2010, Comput. Law Secur. Rev..

[43]  Muhammad Sabir Idrees,et al.  HiPoLDS: A Hierarchical Security Policy Language for Distributed Systems , 2013, Inf. Secur. Tech. Rep..

[44]  Diego López-de-Ipiña,et al.  Enabling Flexible and Continuous Capability Invocation in Mobile Prosumer Environments , 2012, Sensors.

[45]  Jin-Hee Cho,et al.  Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[46]  Félix Gómez Mármol,et al.  Dynamic and flexible selection of a reputation mechanism for heterogeneous environments , 2015, Future Gener. Comput. Syst..

[47]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[48]  Bin Sun,et al.  Trust management mechanism for Internet of Things , 2014 .