Trust based Algorithm for communication between Machine to Machine

In today’s world, the driving force is the human race, who are carrying out experiments, doing researches and inventing goods and services for the benefits of their own kind. N number of smart machines and techniques are invented continuously such inventions are responsible for changing our lives every second, every minute and every hour. In computer world trust in m2m is a communication between devices like mobile phone, laptop, tablet, etc. The modern world is totally into the computer field where every way of communication is done in machine based for example; money transaction, bill payment, chatting, etc. The trust in m2m is something that the whole world is totally dependent on. Where ever we go we depend on machine for transportation we use vehicle which is made up of machines wireless and wired machines. This module has been created using the socket programming in python where the communications are been done using the sockets. The communication among the devices gets more secured. And at the last when the communication has been done then the socket is closed to make the connection disable. This allows the communication or the transfer of the data to be more secure and more trustful. At the time when the message or the data is sent to any other device, it first gets encoded using “UTF-8” and then it is sent to another node basically the client node.

[1]  Qiang Ni,et al.  A K-Anonymity Based Schema for Location Privacy Preservation , 2019, IEEE Transactions on Sustainable Computing.

[2]  Ziyan Jia,et al.  An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things , 2017, Wirel. Pers. Commun..

[3]  Keng Siau,et al.  Building Trust in Artificial Intelligence, Machine Learning, and Robotics , 2018 .

[4]  Qi Shi,et al.  Machine Learning Based Trust Computational Model for IoT Services , 2019, IEEE Transactions on Sustainable Computing.

[5]  Mirko Perkusich,et al.  A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things , 2018, Secur. Commun. Networks.

[6]  Feng Jiang,et al.  Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.

[7]  Aurelio Tommasetti,et al.  A Review of Smart Cities Based on the Internet of Things Concept , 2017 .

[8]  Zeinab Movahedi,et al.  A Trust-Based Offloading for Mobile M2M Communications , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[9]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[10]  Xuan Li,et al.  Communication-efficient outsourced privacy-preserving classification service using trusted processor , 2019, Inf. Sci..

[11]  Ajay Vikram Singh,et al.  Trust based Intelligent Routing Algorithm for Delay Tolerant Network using Artificial Neural Network , 2016, Wireless Networks.

[12]  Guangjie Han,et al.  A Trust Cloud Model for Underwater Wireless Sensor Networks , 2017, IEEE Communications Magazine.

[13]  Gu Li-ze,et al.  Trust management mechanism for Internet of Things , 2014, China Communications.

[14]  Swapna B Sasi,et al.  On - off attack management based on trust , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).

[15]  K. Kulothungan,et al.  Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things , 2019, EURASIP J. Wirel. Commun. Netw..