2020
DOI: 10.1109/access.2020.2972968
|View full text |Cite
|
Sign up to set email alerts
|

Context-Aware Trust and Reputation Model for Fog-Based IoT

Abstract: Trust and reputation are important terms whether the communication is Humans-to-Human (H2H), Human-Machine-Interaction (HMI) or Machine-to-Machine (M2M). As Cloud computing and the internet of things (IoT) bring new innovations, they also cause various security and privacy issues. As numerous devices are continuously integrating as a core part of IoT, it is necessarily important to consider various security issues such as the trustworthiness of a user or detection of a malicious user. Moreover, fog computing a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 45 publications
(14 citation statements)
references
References 48 publications
0
14
0
Order By: Relevance
“…Despite these advantages, the requirement of logically linking each device in the IoT system to a central point that cannot be fully controlled by the IoT system' administrator, using cloud as the single third-layer component may not always be the best direction. To this end, a context-aware multi-source trust evaluation model interleaved with a reputation system evaluates the trustworthiness of a user in a Fog based IoT (FIoT) [21]. A monitor assistance module keeps track of untrusted users' behavior in order to identify malicious users before they start a communication.…”
Section: Related Workmentioning
confidence: 99%
“…Despite these advantages, the requirement of logically linking each device in the IoT system to a central point that cannot be fully controlled by the IoT system' administrator, using cloud as the single third-layer component may not always be the best direction. To this end, a context-aware multi-source trust evaluation model interleaved with a reputation system evaluates the trustworthiness of a user in a Fog based IoT (FIoT) [21]. A monitor assistance module keeps track of untrusted users' behavior in order to identify malicious users before they start a communication.…”
Section: Related Workmentioning
confidence: 99%
“…Trust indicators may contain two notions, the subjective one (focused on the individual interests of user's interactions), and the objective one (depending on individual interaction experiences) [76]. The former is obtained from the feedback obtained out of multiple sources; whereas, the latter is done based on the quality of services, where an overall trust value determines the trustworthiness of each node, resulting in the establishment of a trusted environment [77].…”
Section: Fog Computing and Iotmentioning
confidence: 99%
“…This risk is exacerbated by the trend to separate the sensor network infrastructure and applications. Therefore, a security solution must be provided to achieve an appropriate level of security for the IoT [5]. Due to the lower cost and the time of marketing, IoT manufacturers did not give the security issue a priority to be part of their IoT devices.…”
Section: Introductionmentioning
confidence: 99%
“…Figure 1. Definition of IoT [5] Network security and data encryption are currently a very important topic in the modern communications network research areas. When we send some confidential matters from one customer to another customer that data should not be intercepted by an unauthorized person.…”
Section: Introductionmentioning
confidence: 99%