2020
DOI: 10.3390/s20143945
|View full text |Cite
|
Sign up to set email alerts
|

TrustWalker: An Efficient Trust Assessment in Vehicular Internet of Things (VIoT) with Security Consideration

Abstract: The Internet of Things (IoT) is a world of connected networks and modern technology devices, among them vehicular networks considered more challenging due to high speed and network dynamics. Future trends in IoT allow these inter networks to share information. Also, the previous security solutions to vehicular IoT (VIoT) much emphasize on privacy protection and security related issues using public keys infrastructure. However, the primary concern about efficient trust assessment, authorized users malfunctionin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 38 publications
0
5
0
Order By: Relevance
“…[37,38] As IoT is decentralized, assessing its trustworthiness is very challenging. Therefore, minimizing the ambiguity of the service mode of IoV systems, clarifying the intention of information use, legally binding suppliers, and adopting the concept of privacy by design can improve the privacy security of users and promote establishment of the trust in IoV [39].…”
Section: Trust Management-based Iov Securitymentioning
confidence: 99%
“…[37,38] As IoT is decentralized, assessing its trustworthiness is very challenging. Therefore, minimizing the ambiguity of the service mode of IoV systems, clarifying the intention of information use, legally binding suppliers, and adopting the concept of privacy by design can improve the privacy security of users and promote establishment of the trust in IoV [39].…”
Section: Trust Management-based Iov Securitymentioning
confidence: 99%
“…Previous security solutions to vehicular Internet of ings (VIoT) focus more on privacy protection and security-related challenges using PKI. Sohail et al [91] proposed a new scheme, trust enhanced on-demand routing (TER). is scheme overcomes the security challenges in VIoT, such as efficient trust assessment, certified user nonfunctioning, and secure information diffusion.…”
Section: Issac and Marymentioning
confidence: 99%
“…Topic 5 is related to risk assessment and prioritization of IoT security threats. For a secure IoT environment, various Mobile Information Systems studies have prioritized security threats by applying approaches such as product-development life cycle, decisionmaking trial-and-evaluation laboratory, analytic network processing, and graph theory to develop risk assessment and management frameworks [200][201][202][203][204][205][206][207].…”
Section: Identification Of Topics In Iot Securitymentioning
confidence: 99%