Cite

1. Chen, D., G. Chang, D. Sun, J. Li, J. Jia, X. Wang. TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things. – Comput. Sci. Inf. Syst., Vol. 8, 2011, No 4, pp. 1207-1228.10.2298/CSIS110303056C Search in Google Scholar

2. Almogren, Ahmad, et al. FTM-IoMT: Fuzzy-Based Trust Management for Preventing Sybil Attacks in Internet of Medical Things. – IEEE Internet of Things Journal, 2020.10.1109/JIOT.2020.3027440 Search in Google Scholar

3. Zhao, H., X. Li. VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks. – The Journal of Supercomputing, Vol. 64, 2013, No 3, pp. 805-829.10.1007/s11227-011-0576-6 Search in Google Scholar

4. Becker, M. Y., P. Sewell. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. – In: Proc. of 17th IEEE Computer Security Foundations Workshop, IEEE, 2004. Search in Google Scholar

5. Li, Hui-Jia, et al. Exploring the Trust Management Mechanism in Self-Organizing Complex Network Based on Game Theory. – Physica A: Statistical Mechanics and its Applications, Vol. 542, 2020, 123514.10.1016/j.physa.2019.123514 Search in Google Scholar

6. Yan, Z., P. Zhang, A. V. Vasilakos. A Survey on Trust Management for Internet of Things. – Journal of Network and Computer Applications, Vol. 42, 2014, pp. 120-134.10.1016/j.jnca.2014.01.014 Search in Google Scholar

7. Guo, J., R. Chen, J. J. Tsai. A Survey of Trust Computation Models for Service Management in Internet of Things Systems. – Computer Communications, Vol. 97, 2017, pp. 1-14.10.1016/j.comcom.2016.10.012 Search in Google Scholar

8. Chen, R., F. Bao, J. Guo. Trust-Based Service Management for Social Internet of Things Systems. – IEEE Transactions on Dependable and Secure Computing, Vol. 13, 2015, No 6, pp. 684-696.10.1109/TDSC.2015.2420552 Search in Google Scholar

9. Bernabe, J. B., J. L. H. Ramos, A. F. S. Gomez. TACIoT: Multidimensional Trust-Aware Access Control System for the Internet of Things. – Soft Computing, Vol. 20, 2016, No 5, pp. 1763-1779.10.1007/s00500-015-1705-6 Search in Google Scholar

10. Ben, Y., A. Olivereau, D. Zeghlache, M. Laurent. Trust Management System Design for the Internet of Things : A Context-Aware and Multi-Service Approach. – Comput. Secur., 2013, pp. 1-15. Search in Google Scholar

11. Alshehri, M. D., F. K. Hussain, O. K. Hussain. – Mobile Netw Appl., Vol. 23, 2018, 419. https://doi.org/10.1007/s11036-018-1017-z10.1007/s11036-018-1017-z Search in Google Scholar

12. Mahmud, M., M. S. Kaiser, M. M. Rahman, et al. Cogn. Comput., Vol. 10, 2018, 864. https://doi.org/10.1007/s12559-018-9543-310.1007/s12559-018-9543-3 Search in Google Scholar

13. Mohammad, M., A. Khalid, C. Subhash. RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks. 2008, pp. 347-352. DOI: 10.1109/ISSNIP.2007.4496868.10.1109/ISSNIP.2007.4496868 Search in Google Scholar

14. Chen, I. R., F. Bao, J. Guo. Trust-Based Service Management for Social Internet of Things Systems. – IEEE Transactions on Dependable and Secure Computing, 2016.10.1109/TDSC.2015.2420552 Search in Google Scholar

15. Nitti, M., R. Girau, L. Atzori. Trustworthiness Management in the Social Internet of Things. – IEEE Transactions on Knowledge and Data Management, Vol. 26, 2014, No 5, pp. 1253-1266.10.1109/TKDE.2013.105 Search in Google Scholar

16. Chen, I. R., et al. Dynamic Trust Management for Delay Tolerant Networks and Its Aapplication to Secure Routing. – IEEE Transactions Parallel and Distributed Systems, Vol. 25, 2014, No 5, pp. 1200-1210.10.1109/TPDS.2013.116 Search in Google Scholar

17. Liu, Yu-Chao, et al. A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking. – International Journal of Automation and Computing, Vol. 8, 2011, No 3, pp. 280-285.10.1007/s11633-011-0583-3 Search in Google Scholar

18. Chen, I. R., J. Guo, F. Bao. Trust Management for SOA-Based IoT and Its Application to Service Composition. – IEEE Transactions on Service Computing, Vol. 9, 2016, No 3, pp. 482-495.10.1109/TSC.2014.2365797 Search in Google Scholar

19. Freeman, L. C. Centrality on Social Networks. – Social Networks, Vol. 1, 1979, pp. 215-239.10.1016/0378-8733(78)90021-7 Search in Google Scholar

20. Chen, Z., R. Ling, C. M. Huang, X. Zhu. A Scheme of Access Service Recommendation for the Social Internet of Things. – International Journal of Communication Systems, Vol. 29, 2016, No 4, pp. 694-706.10.1002/dac.2930 Search in Google Scholar

21. Noor, T. H., et al. Trust Management of Services in Cloud Environments: Obstacles and Solutions. – ACM Computing Surveys (CSUR), Vol. 46, 2013, No 1, pp. 1-30.10.1145/2522968.2522980 Search in Google Scholar

22. Alshehri, M. D., F. K. Hussain. A Fuzzy Security Protocol for Trust Management in the Internet of Things (Fuzzy-IoT). – Computing, Vol. 101, 2019, pp. 791-818. DOI:10.1007/s00607-018-0685-7.10.1007/s00607-018-0685-7 Search in Google Scholar

23. Javanmardi, S., et al. FRTRUST: A Fuzzy Reputation Based Model for Trust Management in Semantic P2P Grids. – arXiv preprint arXiv:1404.2632, 2014. Search in Google Scholar

24. Bendiab, K., S. Shiaeles, S. Boucherkha. A New Dynamic Trust Model for “On Cloud” Federated Identity Management. – In: Proc. of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS’18), Paris, 2018, pp. 1-5.10.1109/NTMS.2018.8328673 Search in Google Scholar

25. Bendiab, K., N. Kolokotronis, S. Shiaeles, S. Boucherkha. WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. – In: Proc. of 16th IEEE Intl. Conf. on Dependable, Autonomic and Secure Computing, 16th Int. Conf. on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech’18), Athens, 2018, pp. 724-729. Search in Google Scholar

26. Asiri, S., A. Miri. An IoT Trust and Reputation Model Based on Recommender Systems. – In: Proc. of 14th Annual Conference on Privacy, Security and Trust (PST’16), Auckland, 2016, pp. 561-568. DOI: 10.1109/PST.2016.7907017.10.1109/PST.2016.7907017 Search in Google Scholar

27. Singh, A. V., V. Juyal, R. Saggar. Trust Based Intelligent Routing Algorithm for Delay Tolerant Network Using Artificial Neural Network. – Wireless Netw., Vol. 23, 2017, pp. 693-702. DOI:10.1007/s11276-015-1166-y.10.1007/s11276-015-1166-y Search in Google Scholar

28. Cha, I., et al. Trust in M2M Communication. – IEEE Vehicular Technology Magazine, Vol. 4, 2009, No 3, pp. 69-75.10.1109/MVT.2009.933478 Search in Google Scholar

29. Shala, B., et al. Ensuring Trustworthiness for P2P-Based M2M Applications. – Internet Technologies and Applications (ITA), Wrexham, 2017, pp. 58-63.10.1109/ITECHA.2017.8101911 Search in Google Scholar

30. Zhang, W., et al. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT. – IEEE Internet of Things Journal, 2020. Search in Google Scholar

31. Muhati, E., D. B. Rawat. Hidden Markov Model Enabled Prediction and Visualization of Cyber Agility in IoT Era. – IEEE Internet of Things Journal, 2021.10.1109/JIOT.2021.3056118 Search in Google Scholar

32. Imran, M., et al. PLEDGE: A Proof-of-Honesty Based Consensus Protocol for Blockchain-Based IoT Systems. – In: Proc. of 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, 2020. Search in Google Scholar

33. Siby, S., R. R. Maiti, N. O. Tippenhauer. Iotscanner: Detecting Privacy Threats in Iot Neighborhoods. – In: Proc. of 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017. Search in Google Scholar

34. Chen, Z., L. Tian, C. Lin. Trust Model of Wireless Sensor Networks and Its Application in Data Fusion. – Sensors, Vol. 17, 2017. 10.3390/s17040703.10.3390/s17040703542166328350347 Search in Google Scholar

35. Maad, M. Artificial Neural Networks Advantages and Disadvantages. Bagdad College of Economic Science University, 2018. Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology