2021
DOI: 10.1007/s11277-021-08401-7
|View full text |Cite
|
Sign up to set email alerts
|

Trust Model for IoT Using Cluster Analysis: A Centralized Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(16 citation statements)
references
References 32 publications
0
16
0
Order By: Relevance
“…The simulation experiments of the proposed BFPSMTM and the comparative CATEM, 13 ONDM, 14 MPTPM, 11 and GTMF 12 schemes are conducted using IoT Simulator. In specific, NET‐based Distributed Trust Management Simulator 19 is utilized for facilitating the option of implementing the proposed dynamic trust management model that aids in calculating the trust value of a node.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The simulation experiments of the proposed BFPSMTM and the comparative CATEM, 13 ONDM, 14 MPTPM, 11 and GTMF 12 schemes are conducted using IoT Simulator. In specific, NET‐based Distributed Trust Management Simulator 19 is utilized for facilitating the option of implementing the proposed dynamic trust management model that aids in calculating the trust value of a node.…”
Section: Simulation Results and Discussionmentioning
confidence: 99%
“…Mon et al 13 proposed a Cluster Analysis‐based Trust Estimation and Management (CATEM) scheme was proposed for handling the issues and challenges inherent with IoT scenario. It was proposed with significant trust evaluation strategy that aids in assessing and planning solutions for attaining solutions in IoT environment.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this architecture, the main node calculates and analyzes the trust value to determine whether to transfer the packet to the next node or drop the packet [15]. The model considers packet forwarding capacity, repetition rate, consistency of the packet content, delay and integrity into consideration as trust factors [25,26]. The model utilizes the information entropy theory to determine each decision factor's weight.…”
Section: Related Workmentioning
confidence: 99%
“…Its architecture consists of three layers, which are the perception, network, and application layers [4], as shown in Figure 1. At the perception layer, the actuator/sensor node performs sensing, processing, storage and transmission of data to the network layer.…”
mentioning
confidence: 99%