TruSD: Trust framework for service discovery among IoT devices
Tài liệu tham khảo
Walden, 2016, Contracting for the internet of things: looking into the nest, Queen’s University of Belfast, 219
Raya, 2008, On data-centric trust establishment in ephemeral ad hoc networks, 1238
Feng, 2019, Mcs-chain: decentralized and trustworthy mobile crowdsourcing based on blockchain, Future Generation Computer Systems, 95, 649, 10.1016/j.future.2019.01.036
Yan, 2003, Trust evaluation based security solution in ad hoc networks, 14
Tang, 2015, Cloudrec: A mobile cloud service recommender system based on adaptive qos management, 1, 9
Kamvar, 2003, The eigentrust algorithm for reputation management in p2p networks, 640
Xiong, 2004, Peertrust: supporting reputation-based trust for peer-to-peer electronic communities, IEEE Trans. Knowl. Data. Eng., 16, 843, 10.1109/TKDE.2004.1318566
Guo, 2017, A survey of trust computation models for service management in internet of things systems, Comput Commun, 97, 1, 10.1016/j.comcom.2016.10.012
Mendoza, 2015, Mitigating on-off attacks in the internet of things using a distributed trust management scheme, Int. J. Distrib. Sens. Netw., 11, 859731, 10.1155/2015/859731
Sen, 2010, A survey on reputation and trust-based systems for wireless communication networks, arXiv preprint arXiv:1012.2529
Lize, 2014, Trust management mechanism for internet of things, China Commun., 11, 148, 10.1109/CC.2014.6821746
Namal, 2015, Autonomic trust management in cloud-based and highly dynamic iot applications, 1
Saied, 2013, Trust management system design for the internet of things: a context-aware and multi-service approach, Computers & Security, 39, 351, 10.1016/j.cose.2013.09.001
Din, 2018, Trust management techniques for the internet of things: a survey, IEEE Access, 7, 29763, 10.1109/ACCESS.2018.2880838
Saied, 2013, Trust management system design for the internet of things: a context-aware and multi-service approach, Computers & Security, 39, 351, 10.1016/j.cose.2013.09.001
Sonja, 2004, A robust reputation system for peer-to-peer and mobile ad-hoc networks, 4
Ganeriwal, 2008, Reputation-based framework for high integrity sensor networks, ACM Transactions on Sensor Networks (TOSN), 4, 1, 10.1145/1362542.1362546
Bao, 2012, Dynamic trust management for internet of things applications, 1
Bao, 2012, Trust management for the internet of things and its application to service composition, 1
Chen, 2015, Trust-based service management for social internet of things systems, IEEE Trans Dependable Secure Comput, 13, 684, 10.1109/TDSC.2015.2420552
Liu, 2012, An efficient trust evaluation approach in attacker dominated networks in internet of things, 559
Bao, 2013, Scalable, adaptive and survivable trust management for community of interest based internet of things systems, 1
Chen, 2014, Trust management for soa-based iot and its application to service composition, IEEE Trans. Serv. Comput., 9, 482, 10.1109/TSC.2014.2365797
Ratnasamy, 2001, 31
Stoica, 2001, Chord: a scalable peer-to-peer lookup service for internet applications, ACM SIGCOMM Computer Communication Review, 31, 149, 10.1145/964723.383071
Rowstron, 2001, Pastry: Scalable, distributed object location and routing for large-scale, persistent peer-to-peer storage utility
Maymounkov, 2002, Kademlia: A peer-to-peer information system based on the xor metric, 53
Lua, 2005, A survey and comparison of peer-to-peer overlay network schemes, IEEE Communications Surveys & Tutorials, 7, 72, 10.1109/COMST.2005.1610546
Chen, 2011, Trm-iot: a trust management model based on fuzzy reputation for internet of things, Computer Science and Information Systems, 8, 1207, 10.2298/CSIS110303056C
Jøsang, 2007, A survey of trust and reputation systems for online service provision, Decis. Support Syst., 43, 618, 10.1016/j.dss.2005.05.019
Nitti, 2014, Trustworthiness management in the social internet of things, IEEE Trans Knowl Data Eng, 26, 1253, 10.1109/TKDE.2013.105
Mármol, 2009, Security threats scenarios in trust and reputation models for distributed systems, computers & security, 28, 545, 10.1016/j.cose.2009.05.005
Singh, 2017, Advanced lightweight encryption algorithms for iot devices: survey, challenges and solutions, J. Ambient. Intell. Humaniz. Comput., 1
Chowdhury, 2017, Performance analysis of r/kademlia, pastry and bamboo using recursive routing in mobile networks, International Journal of Computer Networks & Communications (IJCNC), 9
Wander, 2005, Energy analysis of public-key cryptography for wireless sensor networks, 324
Abassi, 2018, Dealing with collusion attack in a trust-based manet, Cybern. Syst, 49, 475, 10.1080/01969722.2018.1541598
Becker, 2012, Foundations of logic-based trust management, 161
Drawel, 2017, Reasoning about trust and time in a system of agents, Procedia Comput. Sci., 109, 632, 10.1016/j.procs.2017.05.369
Aldini, 2018, Design and verification of trusted collective adaptive systems, ACM Transactions on Modeling and Computer Simulation (TOMACS), 28, 1, 10.1145/3155337
Casadei, 2018, Towards attack-resistant aggregate computing using trust mechanisms, Sci. Comput. Program., 167, 114, 10.1016/j.scico.2018.07.006
Liu, 2017, Reasoning about belief, evidence and trust in a multi-agent setting, 71