2015 IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP) 2015
DOI: 10.1109/issnip.2015.7106964
|View full text |Cite
|
Sign up to set email alerts
|

A trust model-based Bayesian decision theory in large scale Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(16 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…Kurniawan et al find classic security strategies unsuitable because they are centralized and scale poorly in the IoT environment. They propose a trust-based model [39] based on Bayesian decision theory. The authors compute Bayesian trust values based on three inputs: experience (the history of interactions between the actors), knowledge (what is already known about the entity and the context), and recommendation (how much trusted peers trust the entity in question) and use these trust values as input to a loss function that determines the cost of an action.…”
Section: Authorizationmentioning
confidence: 99%
See 3 more Smart Citations
“…Kurniawan et al find classic security strategies unsuitable because they are centralized and scale poorly in the IoT environment. They propose a trust-based model [39] based on Bayesian decision theory. The authors compute Bayesian trust values based on three inputs: experience (the history of interactions between the actors), knowledge (what is already known about the entity and the context), and recommendation (how much trusted peers trust the entity in question) and use these trust values as input to a loss function that determines the cost of an action.…”
Section: Authorizationmentioning
confidence: 99%
“…A novel authorization architecture based on Bayesian decision theory [39] also considers context. The trust parameters of history, knowledge, and reputation (described in the Authorization section) may include contextual elements which are either acquired directly by the device itself or provided indirectly by a peer device.…”
Section: Context-awarenessmentioning
confidence: 99%
See 2 more Smart Citations
“…Many works in the trust modeling domain are based on the following dimensions and history, recommendation and context [3]. Based on above approaches, trust has been represented and estimated in many different ways, such as statistical analysis [4], probability [5] and directed graphs [6]. Providing a quite complete survey of the entire collection of trust-related works in computer science is out of our scoe, and we can refer to the already existing surveyson such topic [7,8 and 9].…”
Section: Introductionmentioning
confidence: 99%