Trust Management Techniques for the Internet of Things: A Survey
暂无分享,去创建一个
Byung-Seo Kim | Mohsen Guizani | Ikram Ud Din | Suhaidi Hassan | Muhammad Khurram Khan | M. Guizani | Muhammad Khurram Khan | S. Hassan | Ikram Ud Din | Byung-Seo Kim
[1] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[2] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[3] Oumaima Ben Abderrahim,et al. CTMS-SIOT: A context-based trust management system for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[4] Antonio Iera,et al. A subjective model for trustworthiness evaluation in the social Internet of Things , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[5] Alberto Maria Segre,et al. Programs for Machine Learning , 1994 .
[6] Quan Z. Sheng,et al. Trust as a Service: A Framework for Trust Management in Cloud Environments , 2011, WISE.
[7] F. Fukuyama. Trust: The Social Virtues and the Creation of Prosperity Penguin London , 1995 .
[8] Barry Smyth,et al. Trust in recommender systems , 2005, IUI.
[9] Yanxin Zhang,et al. A decentralized solution for IoT data trusted exchange based-on blockchain , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).
[10] Xenofon Fafoutis,et al. Adaptive Security in ODMAC for Multihop Energy Harvesting Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[11] Rahul Talreja,et al. Trust and behavior based system to prevent collision in IoT enabled VANET , 2016, 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES).
[12] Eric Rescorla,et al. The Design and Implementation of Datagram TLS , 2004, NDSS.
[13] Arkady B. Zaslavsky,et al. Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.
[14] Xiao Chen,et al. A Cloud-Based Trust Evaluation Scheme Using a Vehicular Social Network Environment , 2017, 2017 24th Asia-Pacific Software Engineering Conference (APSEC).
[15] F. Richard Yu,et al. A Novel Interference Alignment Scheme Based on Sequential Antenna Switching in Wireless Networks , 2013, IEEE Transactions on Wireless Communications.
[16] Piero A. Bonatti,et al. Protune: A Framework for Semantic Web Policies , 2008, International Semantic Web Conference.
[17] Zhu Han,et al. Data Collection and Wireless Communication in Internet of Things (IoT) Using Economic Analysis and Pricing Models: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[18] Neeraj Suri,et al. Trust & security RTD in the internet of things: opportunities for international cooperation , 2012, SecurIT '12.
[19] Bernhard Kauer. OSLO: Improving the Security of Trusted Computing , 2007, USENIX Security Symposium.
[20] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[21] Luigi Atzori,et al. The Virtual Object as a Major Element of the Internet of Things: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[22] Hongbin Zhang,et al. Trust and Attribute-Based Dynamic Access Control Model for Internet of Things , 2017, 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[23] Bojan Cukic,et al. Trust-Based Development Framework for Distributed Systems and IoT , 2016, 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC).
[24] Abdelmadjid Bouabdallah,et al. TAS-IoT: Trust-Based Adaptive Security in the IoT , 2016, 2016 IEEE 41st Conference on Local Computer Networks (LCN).
[25] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[26] Mohsen Guizani,et al. Smart Cities: A Survey on Data Management, Security, and Enabling Technologies , 2017, IEEE Communications Surveys & Tutorials.
[27] Oumaima Ben Abderrahim,et al. TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[28] Rajkumar Buyya,et al. Article in Press Future Generation Computer Systems ( ) – Future Generation Computer Systems Cloud Computing and Emerging It Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility , 2022 .
[29] David M. Eyers,et al. TrustCEP: Adopting a Trust-Based Approach for Distributed Complex Event Processing , 2017, 2017 18th IEEE International Conference on Mobile Data Management (MDM).
[30] Alessandro Margara,et al. Deployment strategies for distributed complex event processing , 2012, Computing.
[31] Wu Guoqing,et al. Trust of Hardware , 2008, 2008 International Conference on Embedded Software and Systems Symposia.
[32] Dirk Timmermann,et al. ANTs: Application-driven network trust zones on MAC layer in smart buildings , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[33] Jia Guo,et al. A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems , 2017, 2017 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud).
[34] Hyun-Woo Lee,et al. Toward a Trust Evaluation Mechanism in the Social Internet of Things , 2017, Sensors.
[35] João H. Kleinschmidt,et al. Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.
[36] Eric Gilbert,et al. Predicting tie strength with social media , 2009, CHI.
[37] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[38] Antonio F. Gómez-Skarmeta,et al. A Global Perspective of Smart Cities: A Survey , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[39] Mohamed Hamdi,et al. Game-based adaptive security in the Internet of Things for eHealth , 2014, 2014 IEEE International Conference on Communications (ICC).
[40] Mirko Perkusich,et al. A smart middleware to perform semantic discovery and trust evaluation for the Internet of Things , 2018, 2018 15th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[41] Ralf Steinmetz,et al. Operator Migration for Distributed Complex Event Processing in Device-to-Device Based Networks , 2016, M4IoT@Middleware.
[42] Fabrício Enembreck,et al. Trust and Reputation Models for Multiagent Systems , 2015, ACM Comput. Surv..
[43] Mohamad Abou El-Nasr,et al. CBSTM-IoT: Context-based social trust model for the Internet of Things , 2016, 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT).
[44] Marcelo Knörich Zuffo,et al. The semantic Mediation for the Swarm: An adaptable and organic solution for the Internet of Things , 2017, 2017 IEEE International Conference on Consumer Electronics (ICCE).
[45] Antonio Iera,et al. SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.
[46] Athanasios V. Vasilakos,et al. A Survey on Ambient Intelligence in Healthcare , 2013, Proceedings of the IEEE.
[47] Walaa Hamouda,et al. Cellular LTE-A Technologies for the Future Internet-of-Things: Physical Layer Features and Challenges , 2017, IEEE Communications Surveys & Tutorials.
[48] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[49] Sarah Asiri,et al. An IoT trust and reputation model based on recommender systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).
[50] Dongman Lee,et al. A Place-Aware Stereotypical Trust Supporting Scheme , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[51] Jia Guo,et al. Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.
[52] Chen Shou,et al. A data exchange optimized approach for cloud migration , 2015, 2015 4th International Conference on Computer Science and Network Technology (ICCSNT).
[53] Shafiz Affendi Mohd Yusof,et al. Timely trust: The use of IoT and cultural effects on swift trust formation within global virtual teams , 2017, 2017 8th International Conference on Information Technology (ICIT).
[54] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[55] Johannes Hund,et al. Toward the Web of Things: Applying Web Technologies to the Physical World , 2015, Computer.
[56] Roman Beck,et al. Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.
[57] Anind K. Dey,et al. Understanding and Using Context , 2001, Personal and Ubiquitous Computing.
[58] Laurence T. Yang,et al. Data Mining for Internet of Things: A Survey , 2014, IEEE Communications Surveys & Tutorials.
[59] Antonio Iera,et al. From "smart objects" to "social objects": The next evolutionary step of the internet of things , 2014, IEEE Communications Magazine.
[60] Jia Guo,et al. A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..
[61] Félix Gómez Mármol,et al. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems , 2010, Comput. Stand. Interfaces.
[62] Prem Prakash Jayaraman,et al. Internet of Things and Edge Cloud Computing Roadmap for Manufacturing , 2016, IEEE Cloud Computing.
[63] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[64] K A Rafidha Rehiman,et al. A trust management model for sensor enabled mobile devices in IoT , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[65] Nei Kato,et al. A Survey on Network Methodologies for Real-Time Analytics of Massive IoT Data and Open Research Issues , 2017, IEEE Communications Surveys & Tutorials.
[66] Farookh Khadeer Hussain,et al. A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT) , 2017, BWCCA.
[67] Yang Liu,et al. A Storage Solution for Massive IoT Data Based on NoSQL , 2012, 2012 IEEE International Conference on Green Computing and Communications.
[68] Katia P. Sycara,et al. Bootstrapping trust evaluations through stereotypes , 2010, AAMAS.
[69] Friedemann Mattern,et al. From the Internet of Computers to the Internet of Things , 2010, From Active Data Management to Event-Based Systems and More.
[70] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[71] ChangSup Keum,et al. Trustworthy gateway system providing IoT trust domain of smart home , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).
[72] Bin Sun,et al. Trust management mechanism for Internet of Things , 2014 .
[73] Mahadev Satyanarayanan,et al. The Role of Cloudlets in Hostile Environments , 2013, IEEE Pervasive Comput..
[74] Mark S. Granovetter. T H E S T R E N G T H O F WEAK TIES: A NETWORK THEORY REVISITED , 1983 .
[75] David M. Nicol,et al. A Formal-Semantics-Based Calculus of Trust , 2010, IEEE Internet Computing.
[76] Futai Zou,et al. MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things , 2014, ICGEC.
[77] Paul D. Manuel,et al. A trust model of cloud computing based on Quality of Service , 2015, Ann. Oper. Res..
[78] Kurt Rothermel,et al. MCEP: A Mobility-Aware Complex Event Processing System , 2014, ACM Trans. Internet Techn..
[79] Frank Englert,et al. Analyzing the Influence of Instant Messaging on User Relationship Estimation , 2016, 2016 IEEE International Conference on Mobile Services (MS).
[80] Marjorie Derven. Four drivers to enhance global virtual teams , 2016 .
[81] Jia Guo,et al. A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems , 2015, 2015 IEEE International Conference on Services Computing.
[82] Uthpala Subodhani Premarathne. MAG-SIoT: A multiplicative attributes graph model based trust computation method for social Internet of Things , 2017, 2017 IEEE International Conference on Industrial and Information Systems (ICIIS).
[83] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[84] Gyu Myoung Lee,et al. Autonomic trust management in cloud-based and highly dynamic IoT applications , 2015, 2015 ITU Kaleidoscope: Trust in the Information Society (K-2015).
[85] Thiemo Voigt,et al. Lithe: Lightweight Secure CoAP for the Internet of Things , 2013, IEEE Sensors Journal.
[86] Navya Sri Nizamkari,et al. A graph-based trust-enhanced recommender system for service selection in IOT , 2017, 2017 International Conference on Inventive Systems and Control (ICISC).
[87] Carolina V. L. Mendoza,et al. Defense for selective attacks in the IoT with a distributed trust management scheme , 2016, 2016 IEEE International Symposium on Consumer Electronics (ISCE).
[88] Dongman Lee,et al. An adaptive IoT trust estimation scheme combining interaction history and stereotypical reputation , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[89] Luis L. Martins,et al. Global Virtual Teams: Key Developments, Research Gaps, and Future Directions , 2011 .
[90] Geir M. Køien,et al. Security and privacy in the Internet of Things: Current status and open issues , 2014, 2014 International Conference on Privacy and Security in Mobile Systems (PRISMS).
[91] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[92] Gyu Myoung Lee,et al. RpR: A Trust Computation Model for Social Internet of Things , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[93] Alberto Ferrante,et al. QoS and security in energy-harvesting wireless sensor networks , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[94] S NandiniPrasadK,et al. Adaptation Trust based Protocol for IoT using Smartphones in social media: Travel map guide , 2016 .
[95] Sherali Zeadally,et al. Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.
[96] Adam Wierzbicki,et al. Enriching Trust Prediction Model in Social Network with User Rating Similarity , 2009, 2009 International Conference on Computational Aspects of Social Networks.
[97] Gyu Myoung Lee,et al. Data centric trust evaluation and prediction framework for IOT , 2017, 2017 ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K).
[98] Mohsen Guizani,et al. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.
[99] Hannes Tschofenig,et al. The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method , 2007, RFC.
[100] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..