Trust Management in the Internet of Things
暂无分享,去创建一个
Imed Romdhani | Djamel Tandjaoui | Faiza Medjek | Nabil Djedjig | I. Romdhani | Nabil Djedjig | Djamel Tandjaoui | Faiza Medjek
[1] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[2] Tharam S. Dillon,et al. Keynote 2: Trust and Reputation Relationships in Service-Oriented Environments , 2005, ICITA.
[3] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[4] Yang Yu,et al. Distributed Trust Management Mechanism for the Internet of Things , 2013 .
[5] Wei Wang,et al. A Trust Establishment Scheme for Cluster-Based Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[6] Annett Laube,et al. Trustworthiness Assessment of Wireless Sensor Data for Business Applications , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[7] Kai-Di Chang,et al. Mobility-Aware Interference Avoidance Scheme for Vehicular WLANs , 2012, KSII Trans. Internet Inf. Syst..
[8] Mohammad Sayad Haghighi,et al. A conceptual trust model for the Internet of Things interactions , 2016, 2016 8th International Symposium on Telecommunications (IST).
[9] Yoonmee Doh,et al. PLUS: Parameterized and Localized trUst management Scheme for sensor networks security , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[10] Gabi Dreo Rodosek,et al. Towards a trust computing architecture for RPL in Cyber Physical Systems , 2013, Proceedings of the 9th International Conference on Network and Service Management (CNSM 2013).
[11] Zheng Yan,et al. Trust Modeling and Management: From Social Trust to Digital Trust , 2008 .
[12] Djamal Zeghlache,et al. Trust management system design for the Internet of Things: A context-aware and multi-service approach , 2013, Comput. Secur..
[13] Jin-Hee Cho,et al. Hierarchical trust management for wireless sensor networks and its application to trust-based routing , 2011, SAC '11.
[14] Theodore B. Zahariadis,et al. Design of primary and composite routing metrics for RPL-compliant Wireless Sensor Networks , 2012, 2012 International Conference on Telecommunications and Multimedia (TEMU).
[15] Susan Wiedenbeck,et al. On-line trust: concepts, evolving themes, a model , 2003, Int. J. Hum. Comput. Stud..
[16] Félix Gómez Mármol,et al. Dynamic and flexible selection of a reputation mechanism for heterogeneous environments , 2015, Future Gener. Comput. Syst..
[17] Tae Kyung Kim,et al. A Trust Model using Fuzzy Logic in Wireless Sensor Network , 2008 .
[18] Zheng Yan,et al. Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.
[19] Javier López,et al. Modelling trust dynamics in the Internet of Things , 2017, Inf. Sci..
[20] Djamel Tandjaoui,et al. Trust-based RPL for the Internet of Things , 2015, 2015 IEEE Symposium on Computers and Communication (ISCC).
[21] Marimuthu Palaniswami,et al. Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..
[22] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[23] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[24] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[25] Imed Romdhani,et al. A Trust-Based Intrusion Detection System for Mobile RPL Based Networks , 2017, 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[26] Levente Buttyán,et al. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .
[27] Yan Lindsay Sun,et al. Trust Management for Defending On-Off Attacks , 2015, IEEE Transactions on Parallel and Distributed Systems.
[28] Antonio Pescapè,et al. Integration of Cloud computing and Internet of Things: A survey , 2016, Future Gener. Comput. Syst..
[29] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[30] Wang-Chien Lee,et al. Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.
[31] Oumaima Ben Abderrahim,et al. DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[32] Bin Sun,et al. Trust management mechanism for Internet of Things , 2014 .
[33] Hyunsoo Yoon,et al. Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
[34] Zou Deqing,et al. A hierarchical virus immunization method for community networks , 2014, China Communications.
[35] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[36] Mark Perry,et al. Online Trust: Definition and Principles , 2010, 2010 Fifth International Multi-conference on Computing in the Global Information Technology.
[37] Jia Guo,et al. Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[38] Huafeng Wu,et al. Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .
[39] Jeremy M. Kaplan,et al. Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds , 2017, IEEE Transactions on Cloud Computing.
[40] Yeping He,et al. A secure and rapid response architecture for virtual machine migration from an untrusted hypervisor to a trusted one , 2017, Frontiers of Computer Science.
[41] Kathryn M. Kimery,et al. THIRD-PARTY ASSURANCES: MAPPING THE ROAD TO TRUST IN E-RETAILING , 2002 .
[42] Carlo Maria Medaglia,et al. An Overview of Privacy and Security Issues in the Internet of Things , 2010 .
[43] H. T. Mouftah,et al. Mobility-aware trustworthy crowdsourcing in cloud-centric Internet of Things , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[44] Luigi Alfredo Grieco,et al. Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.
[45] Imed Romdhani,et al. New trust metric for the RPL routing protocol , 2017, 2017 8th International Conference on Information and Communication Systems (ICICS).
[46] Javier López,et al. A framework for enabling trust requirements in social cloud applications , 2013, Requirements Engineering.
[47] Mohsen Guizani,et al. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.
[48] José Manuel Moya,et al. Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing Maps , 2011, CISIS.
[49] Henry Nunoo-Mensah,et al. The adoption of socio- and bio-inspired algorithms for trust models in wireless sensor networks: A survey , 2018, Int. J. Commun. Syst..
[50] Jia Guo,et al. Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[51] Theodore B. Zahariadis,et al. Evaluation of RPL with a transmission count-efficient and trust-aware routing metric , 2014, 2014 IEEE International Conference on Communications (ICC).
[52] Hyun-Woo Lee,et al. Toward a Trust Evaluation Mechanism in the Social Internet of Things , 2017, Sensors.
[53] João H. Kleinschmidt,et al. Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.
[54] Sayan Kumar Ray,et al. Secure routing for internet of things: A survey , 2016, J. Netw. Comput. Appl..
[55] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[56] Heejo Lee,et al. Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.
[57] Jörg Daubert,et al. A view on privacy & trust in IoT , 2015, 2015 IEEE International Conference on Communication Workshop (ICCW).
[58] Javier López,et al. A Conceptual Framework for Trust Models , 2012, TrustBus.
[59] Guangjie Han,et al. Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..
[60] Peter Herrmann,et al. A Trust-based Resilient Routing Mechanism for the Internet of Things , 2017, ARES.
[61] Jia Guo,et al. A survey of trust computation models for service management in internet of things systems , 2017, Comput. Commun..