2014
DOI: 10.1016/j.jnca.2014.01.014
|View full text |Cite
|
Sign up to set email alerts
|

A survey on trust management for Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
443
0
4

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 999 publications
(450 citation statements)
references
References 111 publications
3
443
0
4
Order By: Relevance
“…[1] Enhancing security in data sharing applications by demonstrating the one to one, one to many and many to one schemes [2] Design of efficient and secure cryptographic technique predicated utilize attributes [3] Learning of gregarious networking and sizably voluminous data…”
Section: Resultsmentioning
confidence: 99%
“…[1] Enhancing security in data sharing applications by demonstrating the one to one, one to many and many to one schemes [2] Design of efficient and secure cryptographic technique predicated utilize attributes [3] Learning of gregarious networking and sizably voluminous data…”
Section: Resultsmentioning
confidence: 99%
“…Autonomous trustworthiness-evaluation and -judgment is important when networks are vulnerable to malicious interference. Indeed, trustworthiness evaluation programs are considered increasingly important with the proliferation of autonomous systems connected via the Internet of Things (IoT) (see [17,83,104]). …”
Section: Who or What Is Trustworthy?mentioning
confidence: 99%
“…In [14], authors classified the existing trust management for IoT into five categories depending on the context, the objective and subjective properties of the trustees and the trustors. According to the authors, trust should be ensured vertically in all the layers through different security aspects.…”
Section: Related Workmentioning
confidence: 99%