2019
DOI: 10.1109/jiot.2019.2933518
|View full text |Cite
|
Sign up to set email alerts
|

A Comprehensive Study on the Trust Management Techniques in the Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
70
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
9

Relationship

3
6

Authors

Journals

citations
Cited by 126 publications
(70 citation statements)
references
References 91 publications
0
70
0
Order By: Relevance
“…For an example ZigBee is vulnerable to packet decoding, data manipulation, and traffic sniffing issues and IEEE 802.11 is vulnerable to jamming, scrambling, and passive attack 90 . The required significance work should be carried out to guard the data communication, trust management techniques in IoT 91,92 …”
Section: Discussionmentioning
confidence: 99%
“…For an example ZigBee is vulnerable to packet decoding, data manipulation, and traffic sniffing issues and IEEE 802.11 is vulnerable to jamming, scrambling, and passive attack 90 . The required significance work should be carried out to guard the data communication, trust management techniques in IoT 91,92 …”
Section: Discussionmentioning
confidence: 99%
“…Pourghebleh et al [92] have presented a structured analysis study in the field of trust management in IoT using a systematic approach. Previous articles have been divided into four groups, including forecast-based, recommendation-based, reputation-based, and policy-based.…”
Section: Related Review Papersmentioning
confidence: 99%
“…Also, authors in Reference 38 have provided an organized review study in the field of trust management in IoT using a systematic method. They have classified the prior papers into four categories comprising prediction‐based, recommendation‐based, reputation‐based, and policy‐based.…”
Section: Related Workmentioning
confidence: 99%
“…Trust methods and strategies : In order to determine trust values and assign them to involved entities or objects, different trust methods can be utilized. In fact, the trust method, which is also called trust strategy in the rest of the paper ensures security and privacy aims during the interactions between objects 38 …”
Section: Introductionmentioning
confidence: 99%