2018
DOI: 10.1109/access.2018.2831898
|View full text |Cite
|
Sign up to set email alerts
|

A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
117
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 148 publications
(117 citation statements)
references
References 44 publications
0
117
0
Order By: Relevance
“…Generally speaking, the purpose of network security is to provide a trust protection mechanism [11], which can prevent the protected subject from being attacked and illegally accessed by malicious subjects. The introduction of trust mechanism can better ensure the security and collaboration of Internet application systems [12,13]. Data storage and computing tasks in edge computing mostly depend on edge nodes, many of which are exposed to the natural environment.…”
Section: Motivationmentioning
confidence: 99%
See 2 more Smart Citations
“…Generally speaking, the purpose of network security is to provide a trust protection mechanism [11], which can prevent the protected subject from being attacked and illegally accessed by malicious subjects. The introduction of trust mechanism can better ensure the security and collaboration of Internet application systems [12,13]. Data storage and computing tasks in edge computing mostly depend on edge nodes, many of which are exposed to the natural environment.…”
Section: Motivationmentioning
confidence: 99%
“…Yuan et al [12] proposed a reliable and lightweight trust mechanism for IoT edge devices based on multi-source feedback information fusion. It mainly constructs the trust model for the Internet of Things environment.…”
Section: Relevant Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Yuan et al [43] suggested a dependable and lightweight reliance system for IoT edge devices dependent on multi-source criticism data combination. To start with, due to the multi-source input system was utilized for worldwide trust estimation our trust computation component is progressively dependable against sassing assaults brought about by vindictive criticism suppliers.…”
Section: Attack Categorization According To Iot Architecturementioning
confidence: 99%
“…It has already become popular in industry, as well as academic research communities. It empowers many future technologies (for example, 5G, vehicle-to-vehicle and vehicle-to-cloud communications, augmented reality) by putting the connection in between end users and the cloud computing model and services [8][9][10]. Edge computing brings the utilities and services of cloud computing, which results in the faster processing and quicker response time of applications.…”
Section: Introductionmentioning
confidence: 99%