도움말

A Survey on Trust Computation in the Internet of Things

Vol.33 No.2, 2016.1, 10-27 (18 pages)
Copy
Quick View Quick View
Purchase $5.29
Export
Usage : 36
Citations : 0
분야내 활용도 : 16%
More detail >

· Usage : Full-text article downdloads count since 2010.

· Citations : Cited in the DBpia's articles

· Impact Score : Calculates the article impact score on a basis of the usage in the last 24 months.

Abstract
Internet of Things defines a large number of diverse entities and services which interconnect with each other and individually or cooperatively operate depending on context, conditions and environments, produce a huge personal and sensitive data. In this scenario, the satisfaction of privacy, security and trust objectives plays a critical role in the success of the Internet of Things. Trust here can be considered as a key property to establish trustworthy and seamless connectivity among entities and to guarantee secure services and applications. The aim of this study is to provide a survey on various trust computation strategies and identify future trends in the field. We discuss trust computation methods under several aspects and provide comparison of the approaches based on trust features, performance, advantages, weaknesses and limitations of each strategy. Finally the research discuss on the gap of the trust literature and raise some research directions in trust computation in the Internet of Things.

TOC
Abstract
Ⅰ. Introduction
Ⅱ. Background and Trust Computation Objectives
Ⅲ. System and Network Architecture of a Trust Platform
Ⅳ. Trust Computation Models
Ⅴ. Hybrid Trust Model and Trust Aggregation
Ⅵ. Discussion and Future Research
References
References (83)

Please found references of this article.

  1. B. A. e. al., “Towards a Decision Model based on Trust and Security Risk Management,” in Seventh Australasian Conference on Information Security, 2009, pp. 61-70.

  2. Z. Yan and C. Prehofer, “Autonomic Trust Management for a Component based Software System,” IEEE Transactions Dependable Secure Computing, pp. 810-823, 2011.

  3. Z. Y. e. al., “A Survey on Trust Management for Internet of Things,” Journal of Network and Computer Applications, pp. 120-134, 2014.

  4. J. F. M. Blaze, J.Lacy, “Decentralized trust management,” in Proceedings of IEEE Conference on Security and Privacy, 1996.

  5. N. Li and J. C. Mitchell, “Datalog with Constraints: A Foundation for Trust-management Languages,” in Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages, 2003.

  6. R. L. e. al., “Internet of Things: Where to be is to Trust “ EURASIP Journal on Wireless Communications and Networking, pp. 1-16, 2012.

  7. P. N. M. e. al., “A Fuzzy Approach to Trust Based Access Control in Internet of Things,” in Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems, 2013.

  8. M. B. T. Beth, B. Klein, “Valuation of trust in open networks,” in European Symposium on Research in Computer Security, 1994.

  9. G. Caronni, “Walking the web of trust,” in Proceedings of 9th IEEE International Workshops on Enabling Technologies (WETICE), 2000.

  10. G. S. Ilung Pranata, Rukshan Athauda, “A Holistic Review on Trust and Reputation Management Systems for Digital Environments,” International Journal of Computer and Information Technology, vol. 1, pp. 2277 – 0764, September 2012 2012.

Cited articles (0)

Please apply for Alerts and check the information by e-mail!

Cited articles not found.

Other articles of first author (0)

Please check the detailed of Nguyen B. Truong Identified author!

Other articles of first author not found.

Within this Journal (18)

Please check the detailed of Vol.33 No.2!

  • 처음
  •  
  • 이전
  •  
  • 1
  •  
  • 2
  •  
  • 다음
  •  
  • 마지막
Recommended Articles (5)

We provide services, 'DBpia Recommended Articles' and 'Customers who used this article also used', that used text mining, usage and citations data.

DBpia Recommended Articles

More recommended articles!

Customers who used this article also used

Customers who used this article also used not found.

Metrics

Usage Status

· Usage

· Top 3 institutions list on usage

More detail >
No Top institutions Usage
1 한밭대학교 8
2 충북대학교 3
3 숭실대학교 2

Impact Score

· Impact Score

· The article impact score on the subject

More detail >

: %

2016-09
2016-10
2016-11
2016-12
0
20
40
60
80
100
  • 0%
  • 20%
  • 40%
  • 60%
  • 80%
  • 100%

Citations

Detailed Info
Copyright Policy

The copyright of all work are belongs to the original author. The contents of each work shall not be responsible or guarantee. Crawl the metadata of articles do not allowed without agreement.

top