2018
DOI: 10.1007/978-3-030-03596-9_9
|View full text |Cite
|
Sign up to set email alerts
|

Context-Aware Trustworthy Service Evaluation in Social Internet of Things

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0
2

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(27 citation statements)
references
References 24 publications
0
25
0
2
Order By: Relevance
“…It is commonly used in the security field to quantify errors depending on the problem. In particular, it is used in trust management to determine the threshold or ground value, as defined in [42,43]. In this paper, the MAE is used for DT, as defined in Equation ( 14):…”
Section: Trust Value Calculationmentioning
confidence: 99%
“…It is commonly used in the security field to quantify errors depending on the problem. In particular, it is used in trust management to determine the threshold or ground value, as defined in [42,43]. In this paper, the MAE is used for DT, as defined in Equation ( 14):…”
Section: Trust Value Calculationmentioning
confidence: 99%
“…Khani et al [11] proposed a contextual SIoT trust model including independent and dependent metrics. Independent metrics include advertised and expected QoS while dependent metrics include social similarity friendship, social similarity relations, social similarity community, and contextual feedback of trust.…”
Section: Internet-of-things Trust Modelsmentioning
confidence: 99%
“…Studies such as [93] apply a system-of-systems engineering process to obtain integrated architectures of information fusion systems. Distributed trust management systems have also been explored by many researchers [11,88,94]. A future direction is to apply a system-of-systems engineering process to obtain integrated architectures of trust-based information fusion systems.…”
Section: Future Directionsmentioning
confidence: 99%
See 1 more Smart Citation
“…For example, a digitally signed certificate does not convey if the issuer is an industrial spy, and a digitally signed code does not convey if the code is written by malicious programmers. Behavior issues deal with a wider notion of device’s trustworthiness [ 19 , 20 ] and these issues for IoT devices have just recently started to get attention from the research community [ 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 ]. Building trusted IoT environments is of great importance to achieve the full benefits of IoS.…”
Section: Introductionmentioning
confidence: 99%