2020
DOI: 10.1016/j.comcom.2020.06.030
|View full text |Cite
|
Sign up to set email alerts
|

Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0
2

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 103 publications
(59 citation statements)
references
References 44 publications
0
57
0
2
Order By: Relevance
“…All four methods are evaluated according to Table 3 under three scenarios [33][34][35][36][37][38][39]. Table 9 displays the significant parameters used in the simulation.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…All four methods are evaluated according to Table 3 under three scenarios [33][34][35][36][37][38][39]. Table 9 displays the significant parameters used in the simulation.…”
Section: Simulation Resultsmentioning
confidence: 99%
“…Regarding studies that present definitions on dependability and trustworthiness, some papers explore the state of the art and definitions [9], [42], [43], [56][57][58][59][60][61][62][63]. We also found surveys on trustworthiness [64][65][66][67][68] and dependability [69] and a systematic literature review (SLR) on dependability [70].…”
Section: ) Conceptualmentioning
confidence: 99%
“…In addition, they only selected 131 articles for review. Most of the review studies not listed in Table 2 focused on specific areas of IoT security, such as layer protocols [33], intrusion detection [34], device security [35,36], trust [37], and security of specific IoT applications [38]. us, a systematic mapping study is still required to determine research topics and trends in IoT security and gain insights on this field.…”
Section: Comparison With Related Reviewsmentioning
confidence: 99%