2019
DOI: 10.1109/access.2018.2880838
|View full text |Cite
|
Sign up to set email alerts
|

Trust Management Techniques for the Internet of Things: A Survey

Abstract: A vision of the future Internet is introduced in such a fashion that various computing devices are connected together to form a network called Internet of Things (IoT). This network will generate massive data that may be leveraged for entertainment, security, and most importantly user trust. Yet, trust is an imperative obstruction that may hinder the IoT growth and even delay the substantial squeeze of a number of applications. In this survey, an extensive analysis of trust management techniques along with the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
34
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7
2
1

Relationship

1
9

Authors

Journals

citations
Cited by 170 publications
(34 citation statements)
references
References 102 publications
(128 reference statements)
0
34
0
Order By: Relevance
“…IoT devices may also be intermittently disconnected from the rest of the network, because of varying network conditions or duty-cycling of devices for power saving. Security and privacy [12,13]. Data collected by IoT devices is often sensitive as it can expose personal information about the user or people nearby.…”
Section: Iot and Its Characteristicsmentioning
confidence: 99%
“…IoT devices may also be intermittently disconnected from the rest of the network, because of varying network conditions or duty-cycling of devices for power saving. Security and privacy [12,13]. Data collected by IoT devices is often sensitive as it can expose personal information about the user or people nearby.…”
Section: Iot and Its Characteristicsmentioning
confidence: 99%
“…In an environment, there may be a variety of independent and cooperating devices to perform different tasks [37]. The environment that the user accesses, or is part of, is controlled and defines parameters and privilege criteria for user profiles.…”
Section: Environmentmentioning
confidence: 99%
“…All sensed information is further forwarded to the base station (BS) via the appropriate forwarding node called the cluster head. As the network size and nodes' density increases, the network scalability with data security is most of the challenging tasks for WSNs [5][6][7][8][9]. In recent years, many solutions have been presented to improve the routing and energy efficiency for limited constraints networks, however, most of them overlooked data authentication and security in the presence of malicious nodes.…”
Section: Introductionmentioning
confidence: 99%