Base for Trust Score Estimation for Device to Device Communication in Internet of Thing Using Fuzzy Approach and Machine Learning

[1]  Costin Badica,et al.  Evaluating the effect of voting methods on ensemble-based classification , 2017, 2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA).

[2]  M. M. Ollivier RFID-a new solution technology for security problems , 1995 .

[3]  Ramjee Prasad,et al.  Identity driven capability based access control (ICAC) scheme for the Internet of Things , 2012, 2012 IEEE International Conference on Advanced Networks and Telecommunciations Systems (ANTS).

[4]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[5]  Yusheng Ji,et al.  Decentralized Trust Evaluation in Vehicular Internet of Things , 2019, IEEE Access.

[6]  Ing-Ray Chen,et al.  Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[7]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[8]  T. Ross Fuzzy Logic with Engineering Applications , 1994 .

[9]  Stephane Maag,et al.  Towards a Generic Trust Management Framework Using a Machine-Learning-Based Trust Model , 2015, TrustCom 2015.

[10]  Guiran Chang,et al.  TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..

[11]  Timothy J. Ross,et al.  Fuzzy Logic with Engineering Applications: Ross/Fuzzy Logic with Engineering Applications , 2010 .

[12]  Azzedine Boukerche,et al.  Trust-based Secure Routing in Software-defined Vehicular Ad Hoc Networks , 2016, ArXiv.

[13]  Ebrahim H. Mamdani,et al.  A linguistic self-organizing process controller , 1979, Autom..

[14]  Neeli R. Prasad,et al.  A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.

[15]  Zheng Yan,et al.  Predict Pairwise Trust Based on Machine Learning in Online Social Networks: A Survey , 2018, IEEE Access.

[16]  F. Richard Yu,et al.  A Machine Learning Approach for Software-Defined Vehicular Ad Hoc Networks with Trust Management , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).

[17]  Qi Shi,et al.  Machine Learning Based Trust Computational Model for IoT Services , 2019, IEEE Transactions on Sustainable Computing.

[18]  I. Maqsood,et al.  Random Forests and Decision Trees , 2012 .

[19]  Guanglin Xing,et al.  Trust calculation and delivery control in trust-based access control , 2008, Wuhan University Journal of Natural Sciences.

[20]  Indrajit Ray,et al.  A Vector Model of Trust for Developing Trustworthy Systems , 2004, ESORICS.

[21]  Ramjee Prasad,et al.  Identity establishment and capability based access control (IECAC) scheme for Internet of Things , 2012, The 15th International Symposium on Wireless Personal Multimedia Communications.