2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion) 2018
DOI: 10.1109/ucc-companion.2018.00059
|View full text |Cite
|
Sign up to set email alerts
|

Building Trustable Remote Monitoring and Management Systems

Abstract: Internet of Things (IoT) is an emerging technology that expands wireless and mobile networks into heterogeneous network of connected devices. Trustable remote monitoring and management systems are required to establish a controlled environment for new services and devices in order to (i) improve the quality of existing services and (ii) enable novel services. However, monitoring and remote management can cause security and privacy concerns and thus affect the trust formation between customer and service provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Also, Aydarov et al (2019) presented the results of the development and implementation of the remote monitoring system for audit and quality assessment of car‐service industry. Morshedi et al (2018) argue that remote monitoring and management systems are required to establish a controlled environment, although they can cause security and privacy concerns. Hence, they proposed governance model as an approach to remote monitoring and management systems.…”
Section: Methodsmentioning
confidence: 99%
“…Also, Aydarov et al (2019) presented the results of the development and implementation of the remote monitoring system for audit and quality assessment of car‐service industry. Morshedi et al (2018) argue that remote monitoring and management systems are required to establish a controlled environment, although they can cause security and privacy concerns. Hence, they proposed governance model as an approach to remote monitoring and management systems.…”
Section: Methodsmentioning
confidence: 99%
“…The model protects against good-mouthing, bad-mouthing, and ballot stuffing attacks by constantly updating the weights and taking the history of behavior and rating quality into account for calculations. The model uses a probabilistic neural network framework to differentiate between trustworthy and malicious nodes [19]. The probabilistic neural network comprises a multi-layer architecture including input, hidden, pattern, and output layers [20].…”
Section: Related Workmentioning
confidence: 99%