2021
DOI: 10.1002/ett.4248
|View full text |Cite
|
Sign up to set email alerts
|

DEIT: Dempster Shafer Theory‐based edge‐centric Internet of Things‐specific trust model

Abstract: The potential benefits of edge-centric Internet of Things (IoT) come with increased security threats and because the edge devices may be compromised into sending or forwarding wrong information. To negate the effect of wrong information on inference, such messages need to be identified. Identification and dropping of messages in the network as early as possible would minimize the communication overhead. Trust values of nodes help in the early identification of such messages. In this work, the Dempster Shafer T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 33 publications
0
2
0
Order By: Relevance
“…Bhargava et al [29] proposed the "Dempster Shafer Theory (DST)-based edge-centric IoT-specific trust model (DEIT)" for WSNs. The DEIT mechanism enables edge servers to compute the trustworthiness of edge devices based on their behavioral metrics such as message drop rate and message modification rate.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Bhargava et al [29] proposed the "Dempster Shafer Theory (DST)-based edge-centric IoT-specific trust model (DEIT)" for WSNs. The DEIT mechanism enables edge servers to compute the trustworthiness of edge devices based on their behavioral metrics such as message drop rate and message modification rate.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The demand for computational skills also increases. As the number of elements in the recognition framework increases [34], the calculation volume when using combination rule increases exponentially. Limited by the lack of sensor node computing, storage, and energy supply capacity [54], it is difficult to run algorithms with high computational complexity for a long time.…”
Section: B Low Complexity Computational Scheme For D-s Combination Rulementioning
confidence: 99%