A Lightweight Trust Mechanism with Attack Detection for IoT

In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Entropy (Basel, Switzerland) Ročník 25; číslo 8; s. 1198
Hlavní autoři: Zhou, Xujie, Tang, Jinchuan, Dang, Shuping, Chen, Gaojie
Médium: Journal Article
Jazyk:angličtina
Vydáno: Basel MDPI AG 01.08.2023
MDPI
Témata:
ISSN:1099-4300, 1099-4300
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang’s belief model to quantify a device’s trustworthiness, where evaluators can freely initialize and update trust data with feedback from multiple sources, avoiding the bias of a single message source. It balances the accuracy of estimations and algorithm complexity. Secondly, considering that a trust estimation should reflect a device’s latest status, we propose a forgetting algorithm to ensure that trust estimations can sensitively perceive changes in device status. Compared with conventional methods, it can automatically set its parameters to gain good performance. Finally, to prevent trust attacks from misleading evaluators, we propose a tango algorithm to curb trust attacks and a hypothesis testing-based trust attack detection mechanism. We corroborate the proposed trust mechanism’s performance with simulation, whose results indicate that even if challenged by many colluding attackers that can exploit different trust attacks in combination, it can produce relatively accurate trust estimations, gradually exclude attackers, and quickly restore trust estimations for normal devices.
AbstractList In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang’s belief model to quantify a device’s trustworthiness, where evaluators can freely initialize and update trust data with feedback from multiple sources, avoiding the bias of a single message source. It balances the accuracy of estimations and algorithm complexity. Secondly, considering that a trust estimation should reflect a device’s latest status, we propose a forgetting algorithm to ensure that trust estimations can sensitively perceive changes in device status. Compared with conventional methods, it can automatically set its parameters to gain good performance. Finally, to prevent trust attacks from misleading evaluators, we propose a tango algorithm to curb trust attacks and a hypothesis testing-based trust attack detection mechanism. We corroborate the proposed trust mechanism’s performance with simulation, whose results indicate that even if challenged by many colluding attackers that can exploit different trust attacks in combination, it can produce relatively accurate trust estimations, gradually exclude attackers, and quickly restore trust estimations for normal devices.
In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang's belief model to quantify a device's trustworthiness, where evaluators can freely initialize and update trust data with feedback from multiple sources, avoiding the bias of a single message source. It balances the accuracy of estimations and algorithm complexity. Secondly, considering that a trust estimation should reflect a device's latest status, we propose a forgetting algorithm to ensure that trust estimations can sensitively perceive changes in device status. Compared with conventional methods, it can automatically set its parameters to gain good performance. Finally, to prevent trust attacks from misleading evaluators, we propose a tango algorithm to curb trust attacks and a hypothesis testing-based trust attack detection mechanism. We corroborate the proposed trust mechanism's performance with simulation, whose results indicate that even if challenged by many colluding attackers that can exploit different trust attacks in combination, it can produce relatively accurate trust estimations, gradually exclude attackers, and quickly restore trust estimations for normal devices.In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang's belief model to quantify a device's trustworthiness, where evaluators can freely initialize and update trust data with feedback from multiple sources, avoiding the bias of a single message source. It balances the accuracy of estimations and algorithm complexity. Secondly, considering that a trust estimation should reflect a device's latest status, we propose a forgetting algorithm to ensure that trust estimations can sensitively perceive changes in device status. Compared with conventional methods, it can automatically set its parameters to gain good performance. Finally, to prevent trust attacks from misleading evaluators, we propose a tango algorithm to curb trust attacks and a hypothesis testing-based trust attack detection mechanism. We corroborate the proposed trust mechanism's performance with simulation, whose results indicate that even if challenged by many colluding attackers that can exploit different trust attacks in combination, it can produce relatively accurate trust estimations, gradually exclude attackers, and quickly restore trust estimations for normal devices.
Audience Academic
Author Tang, Jinchuan
Dang, Shuping
Chen, Gaojie
Zhou, Xujie
AuthorAffiliation 3 5G/6G Innovation Center, Institute for Communication Systems, University of Surrey, Guidford GU2 7XH, UK; gaojie.chen@surrey.ac.uk
2 Department of Electrical and Electronic Engineering, University of Bristol, Bristol BS8 1QU, UK; shuping.dang@bristol.ac.uk
1 State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China; xujiezhou@ieee.org
AuthorAffiliation_xml – name: 2 Department of Electrical and Electronic Engineering, University of Bristol, Bristol BS8 1QU, UK; shuping.dang@bristol.ac.uk
– name: 1 State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China; xujiezhou@ieee.org
– name: 3 5G/6G Innovation Center, Institute for Communication Systems, University of Surrey, Guidford GU2 7XH, UK; gaojie.chen@surrey.ac.uk
Author_xml – sequence: 1
  givenname: Xujie
  surname: Zhou
  fullname: Zhou, Xujie
– sequence: 2
  givenname: Jinchuan
  surname: Tang
  fullname: Tang, Jinchuan
– sequence: 3
  givenname: Shuping
  surname: Dang
  fullname: Dang, Shuping
– sequence: 4
  givenname: Gaojie
  orcidid: 0000-0003-2978-0365
  surname: Chen
  fullname: Chen, Gaojie
BookMark eNplkk1v1DAQhiNUJNrCgX8QiQsctvVXYkcc0Kq0sNIiLsvZmtjjXS9JXGyHin-Pt1sQLRfbGr_v4xnPnFUnU5iwql5TcsF5Ry6RNURR2qln1SklXbcQnJCTf84vqrOU9oQwzmh7Wr1f1mu_3eU7PKz1Js4p11_Q7GDyaazvfN7Vy5zBfK8_YkaTfZhqF2K9CpuX1XMHQ8JXD_t59e3menP1ebH--ml1tVwvjFBtXnCAjhDnWCNN41oAIVvREmsJgjLUSSkk5Q1llgMnfQ8ArWI9AeEcOtvw82p15NoAe30b_Qjxlw7g9X0gxK2GmL0ZUPeyN9iS3gIwAVaBk13fWgOGobHEFtaHI-t27ke0BqccYXgEfXwz-Z3ehp-aEtFwoWQhvH0gxPBjxpT16JPBYYAJw5w0U41UopGUFumbJ9J9mONU_upeRSiVnSqqi6NqC6UCP7lQHi4Zg8XRm9Je50t8KVsmpJQdL4bLo8HEkFJEp43PcOhMMfqhpKoPs6D_zkJxvHvi-FPw_9rfaG21yw
CitedBy_id crossref_primary_10_1007_s10586_024_05050_w
Cites_doi 10.1109/ACCESS.2020.3005541
10.1109/TVT.2014.2313865
10.1016/j.future.2019.02.004
10.1109/JIOT.2020.2981005
10.1109/INFOCOM.2008.180
10.1109/Blockchain.2019.00032
10.1515/9780691214696
10.1109/TDSC.2015.2420552
10.1007/s11276-019-02129-w
10.1109/TITS.2015.2494017
10.1109/ACCESS.2020.2968948
10.1007/s11276-019-02106-3
10.1016/j.comnet.2012.07.010
10.1109/CC.2014.6821746
10.1016/j.isatra.2022.09.035
10.1002/cpe.5109
10.1109/JIOT.2016.2584538
10.1109/CAMAD.2014.7033259
10.1145/342009.335388
10.1109/TNSM.2018.2815280
10.1109/ACCESS.2017.2733225
10.1016/j.future.2018.05.049
10.1016/j.iot.2021.100382
10.1109/MCOM.2017.1600502CM
10.1016/j.future.2023.05.008
10.1109/ACCESS.2020.2972968
10.1109/ACCESS.2019.2924045
10.1016/j.future.2019.12.045
10.1109/TETC.2019.2957394
10.1145/3360774.3360822
10.1007/s11277-019-06407-w
10.1109/ACCESS.2019.2932769
10.1016/j.jnca.2019.02.024
10.1145/1362542.1362546
ContentType Journal Article
Copyright COPYRIGHT 2023 MDPI AG
2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
2023 by the authors. 2023
Copyright_xml – notice: COPYRIGHT 2023 MDPI AG
– notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
– notice: 2023 by the authors. 2023
DBID AAYXX
CITATION
7TB
8FD
8FE
8FG
ABJCF
ABUWG
AFKRA
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
FR3
HCIFZ
KR7
L6V
M7S
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PTHSS
7X8
5PM
DOA
DOI 10.3390/e25081198
DatabaseName CrossRef
Mechanical & Transportation Engineering Abstracts
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
Materials Science & Engineering Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
ProQuest Central Essentials
ProQuest Central
Technology Collection (via ProQuest SciTech Premium Collection)
ProQuest One
ProQuest Central Korea
Engineering Research Database
SciTech Premium Collection
Civil Engineering Abstracts
ProQuest Engineering Collection
Engineering Database
Proquest Central Premium
ProQuest One Academic (New)
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
Engineering collection
MEDLINE - Academic
PubMed Central (Full Participant titles)
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Technology Collection
Technology Research Database
ProQuest One Academic Middle East (New)
Mechanical & Transportation Engineering Abstracts
ProQuest Central Essentials
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Central China
ProQuest Central
ProQuest One Applied & Life Sciences
ProQuest Engineering Collection
ProQuest Central Korea
ProQuest Central (New)
Engineering Collection
Civil Engineering Abstracts
Engineering Database
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest One Academic UKI Edition
Materials Science & Engineering Collection
Engineering Research Database
ProQuest One Academic
ProQuest One Academic (New)
MEDLINE - Academic
DatabaseTitleList
CrossRef


MEDLINE - Academic
Publicly Available Content Database
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: PIMPY
  name: Publicly Available Content Database
  url: http://search.proquest.com/publiccontent
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
EISSN 1099-4300
ExternalDocumentID oai_doaj_org_article_b7bce60bdaa24ad8af79b6dcac2ecd0d
PMC10453487
A762477793
10_3390_e25081198
GrantInformation_xml – fundername: Guizhou University
  grantid: (2021) 30
GroupedDBID 29G
2WC
5GY
5VS
8FE
8FG
AADQD
AAFWJ
AAYXX
ABDBF
ABJCF
ACIWK
ACUHS
ADBBV
AEGXH
AENEX
AFFHD
AFKRA
AFPKN
AFZYC
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
CS3
DU5
E3Z
ESX
F5P
GROUPED_DOAJ
GX1
HCIFZ
HH5
IAO
ITC
J9A
KQ8
L6V
M7S
MODMG
M~E
OK1
OVT
PGMZT
PHGZM
PHGZT
PIMPY
PQGLB
PROAC
PTHSS
RNS
RPM
TR2
TUS
XSB
~8M
7TB
8FD
ABUWG
AZQEC
DWQXO
FR3
KR7
PKEHL
PQEST
PQQKQ
PQUKI
PRINS
7X8
PUEGO
5PM
ID FETCH-LOGICAL-c486t-3aa900ff257c5f6aa476460dd0ea8c1f774713512d3a30bbaaa682b0a4ffefd53
IEDL.DBID DOA
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001057403700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1099-4300
IngestDate Mon Nov 10 04:23:04 EST 2025
Tue Nov 04 02:06:27 EST 2025
Fri Sep 05 08:30:13 EDT 2025
Fri Jul 25 10:32:08 EDT 2025
Tue Nov 04 18:38:31 EST 2025
Sat Nov 29 07:15:58 EST 2025
Tue Nov 18 21:27:55 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 8
Language English
License Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c486t-3aa900ff257c5f6aa476460dd0ea8c1f774713512d3a30bbaaa682b0a4ffefd53
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ORCID 0000-0003-2978-0365
OpenAccessLink https://doaj.org/article/b7bce60bdaa24ad8af79b6dcac2ecd0d
PQID 2857011798
PQPubID 2032401
ParticipantIDs doaj_primary_oai_doaj_org_article_b7bce60bdaa24ad8af79b6dcac2ecd0d
pubmedcentral_primary_oai_pubmedcentral_nih_gov_10453487
proquest_miscellaneous_2857845711
proquest_journals_2857011798
gale_infotracacademiconefile_A762477793
crossref_citationtrail_10_3390_e25081198
crossref_primary_10_3390_e25081198
PublicationCentury 2000
PublicationDate 2023-08-01
PublicationDateYYYYMMDD 2023-08-01
PublicationDate_xml – month: 08
  year: 2023
  text: 2023-08-01
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Entropy (Basel, Switzerland)
PublicationYear 2023
Publisher MDPI AG
MDPI
Publisher_xml – name: MDPI AG
– name: MDPI
References Soleymani (ref_14) 2017; 5
Altaf (ref_5) 2019; 137
Wang (ref_35) 2019; 7
Jiang (ref_15) 2017; 55
Alemneh (ref_25) 2020; 106
Rathee (ref_31) 2020; 26
ref_36
ref_34
ref_33
Li (ref_11) 2015; 17
Gu (ref_2) 2014; 11
Meng (ref_12) 2018; 15
Ganeriwal (ref_8) 2008; 4
ref_18
Chiang (ref_26) 2016; 3
Haseeb (ref_22) 2023; 132
Ogundoyin (ref_23) 2021; 14
Balaji (ref_1) 2019; 108
Shala (ref_19) 2020; 8
Junejo (ref_24) 2019; 9
ref_20
Awan (ref_17) 2020; 8
Wang (ref_27) 2020; 109
Chen (ref_16) 2015; 13
ref_3
ref_29
Ullah (ref_21) 2023; 148
Anwar (ref_13) 2019; 96
ref_9
Wei (ref_10) 2014; 63
Hussain (ref_30) 2020; 8
Fang (ref_32) 2020; 26
Hassija (ref_4) 2019; 7
Atzori (ref_6) 2012; 56
ref_7
Liang (ref_28) 2020; 7
References_xml – ident: ref_3
– volume: 8
  start-page: 119961
  year: 2020
  ident: ref_19
  article-title: Blockchain and trust for secure, end-user-based and decentralized IoT service provision
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.3005541
– ident: ref_34
– volume: 63
  start-page: 4647
  year: 2014
  ident: ref_10
  article-title: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2014.2313865
– volume: 96
  start-page: 605
  year: 2019
  ident: ref_13
  article-title: BTEM: Belief based trust evaluation mechanism for wireless sensor networks
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.02.004
– volume: 7
  start-page: 5481
  year: 2020
  ident: ref_28
  article-title: A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2020.2981005
– ident: ref_9
  doi: 10.1109/INFOCOM.2008.180
– ident: ref_20
  doi: 10.1109/Blockchain.2019.00032
– ident: ref_7
  doi: 10.1515/9780691214696
– volume: 13
  start-page: 684
  year: 2015
  ident: ref_16
  article-title: Trust-based service management for social Internet of Things systems
  publication-title: IEEE Trans. Dependable Secur. Comput.
  doi: 10.1109/TDSC.2015.2420552
– volume: 26
  start-page: 3169
  year: 2020
  ident: ref_32
  article-title: TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-019-02129-w
– volume: 17
  start-page: 960
  year: 2015
  ident: ref_11
  article-title: ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks
  publication-title: IEEE Trans. Intell. Transp. Syst.
  doi: 10.1109/TITS.2015.2494017
– volume: 8
  start-page: 21159
  year: 2020
  ident: ref_17
  article-title: StabTrust: A stable and centralized trust-based clustering mechanism for IoT enabled vehicular ad-hoc networks
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2968948
– volume: 26
  start-page: 2339
  year: 2020
  ident: ref_31
  article-title: A trust computed framework for IoT devices and fog computing environment
  publication-title: Wirel. Netw.
  doi: 10.1007/s11276-019-02106-3
– volume: 56
  start-page: 3594
  year: 2012
  ident: ref_6
  article-title: The social Internet of Things (SIoT)—When social networks meet the Internet of Things: Concept, architecture and network characterization
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2012.07.010
– volume: 11
  start-page: 148
  year: 2014
  ident: ref_2
  article-title: Trust management mechanism for Internet of Things
  publication-title: China Commun.
  doi: 10.1109/CC.2014.6821746
– volume: 132
  start-page: 61
  year: 2023
  ident: ref_22
  article-title: Efficient and trusted autonomous vehicle routing protocol for 6G networks with computational intelligence
  publication-title: ISA Trans.
  doi: 10.1016/j.isatra.2022.09.035
– ident: ref_29
  doi: 10.1002/cpe.5109
– volume: 3
  start-page: 854
  year: 2016
  ident: ref_26
  article-title: Fog and IoT: An overview of research opportunities
  publication-title: IEEE Internet Things J.
  doi: 10.1109/JIOT.2016.2584538
– ident: ref_33
  doi: 10.1109/CAMAD.2014.7033259
– ident: ref_36
  doi: 10.1145/342009.335388
– volume: 15
  start-page: 761
  year: 2018
  ident: ref_12
  article-title: Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks
  publication-title: IEEE Trans. Netw. Serv. Manag.
  doi: 10.1109/TNSM.2018.2815280
– volume: 5
  start-page: 15619
  year: 2017
  ident: ref_14
  article-title: A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2017.2733225
– volume: 109
  start-page: 573
  year: 2020
  ident: ref_27
  article-title: A novel trust mechanism based on fog computing in sensor–cloud system
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2018.05.049
– volume: 14
  start-page: 100382
  year: 2021
  ident: ref_23
  article-title: A trust management system for fog computing services
  publication-title: Internet Things
  doi: 10.1016/j.iot.2021.100382
– volume: 55
  start-page: 110
  year: 2017
  ident: ref_15
  article-title: A trust cloud model for underwater wireless sensor networks
  publication-title: IEEE Commun. Mag.
  doi: 10.1109/MCOM.2017.1600502CM
– volume: 148
  start-page: 326
  year: 2023
  ident: ref_21
  article-title: HIDE-Healthcare IoT data trust managEment: Attribute centric intelligent privacy approach
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2023.05.008
– volume: 8
  start-page: 31622
  year: 2020
  ident: ref_30
  article-title: Context-aware trust and reputation model for fog-based IoT
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2020.2972968
– volume: 7
  start-page: 82721
  year: 2019
  ident: ref_4
  article-title: A survey on IoT security: Application areas, security threats, and solution architectures
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2924045
– volume: 106
  start-page: 206
  year: 2020
  ident: ref_25
  article-title: A two-way trust management system for fog computing
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2019.12.045
– volume: 9
  start-page: 2030
  year: 2019
  ident: ref_24
  article-title: Trustee: A trust management system for fog-enabled cyber physical systems
  publication-title: IEEE Trans. Emerg. Top. Comput.
  doi: 10.1109/TETC.2019.2957394
– ident: ref_18
  doi: 10.1145/3360774.3360822
– volume: 108
  start-page: 363
  year: 2019
  ident: ref_1
  article-title: IoT technology, applications and challenges: A contemporary survey
  publication-title: Wirel. Pers. Commun.
  doi: 10.1007/s11277-019-06407-w
– volume: 7
  start-page: 107964
  year: 2019
  ident: ref_35
  article-title: Progress in outlier detection techniques: A survey
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2019.2932769
– volume: 137
  start-page: 93
  year: 2019
  ident: ref_5
  article-title: Trust models of Internet of Smart Things: A survey, open issues, and future directions
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2019.02.024
– volume: 4
  start-page: 1
  year: 2008
  ident: ref_8
  article-title: Reputation-based framework for high integrity sensor networks
  publication-title: ACM Trans. Sens. Netw.
  doi: 10.1145/1362542.1362546
SSID ssj0023216
Score 2.3171325
Snippet In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering...
SourceID doaj
pubmedcentral
proquest
gale
crossref
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
StartPage 1198
SubjectTerms Algorithms
Analysis
attack detection
Communication
Internet of Things
Lightweight
Multiple trusts
Sensors
Social networks
Trust
trust attack
trust mechanism
Trustworthiness
SummonAdditionalLinks – databaseName: Engineering Database
  dbid: M7S
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwELagcOBSigCRUpBBSHCJmsSO7YgDWh4VSKVCYkG9ReNXuyokZTctf5-ZJBtYQFy42qPEyXg8_sbjbxh7YnwFRuSIVCuKVsXSpLawkAp0dha3sHns66d8PtRHR-b4uPowBtxWY1rlek3sF2rfOoqR7xfExE78ZebF-beUqkbR6epYQuMqu0YsCUWfuvdxAlyiyNXAJiQQ2u8HdPcmR5S94YN6qv4_F-TfkyR_8ToHN_93vDtse9xv8tkwQW6xK6G5zZ7P-CGB8u99XJTP6d4Ffx_oEvBi9ZVTbJbPug7cGX8duj5Zq-G4u-Xv2vkd9ungzfzV23SsopA6aVSXCoAqy2JE23RlVABSK6ky77MAxuVREywV6Pe9AJFZCwDKFDYDGWOIvhR32VbTNuEe44g-nJOVhhidzLWuVBGkiaAVPjvzNmHP1v-1diPFOFW6-FIj1CAV1JMKEvZ4Ej0feDX-JvSSlDMJEBV239AuT-rRsmqrrQsqsx6gkOANRF1Z5R24Ijif-YQ9JdXWZLA4GGwf7h3gJxH1VT1DdyA1foxI2N5alfVoyav6px4T9mjqRhukgxVoQnsxyBhZ6jxPmNmYNRtD3-xpFqc9mzfi4VIgbNz999vvsxtU6X7IPdxjW93yIjxg191lt1gtH_bz_gdX6Q60
  priority: 102
  providerName: ProQuest
Title A Lightweight Trust Mechanism with Attack Detection for IoT
URI https://www.proquest.com/docview/2857011798
https://www.proquest.com/docview/2857845711
https://pubmed.ncbi.nlm.nih.gov/PMC10453487
https://doaj.org/article/b7bce60bdaa24ad8af79b6dcac2ecd0d
Volume 25
WOSCitedRecordID wos001057403700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAON
  databaseName: DOAJ Directory of Open Access Journals
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: DOA
  dateStart: 20160101
  isFulltext: true
  titleUrlDefault: https://www.doaj.org/
  providerName: Directory of Open Access Journals
– providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: M~E
  dateStart: 19990101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
– providerCode: PRVPQU
  databaseName: Engineering Database
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: M7S
  dateStart: 19990301
  isFulltext: true
  titleUrlDefault: http://search.proquest.com
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: ProQuest Central
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: BENPR
  dateStart: 19990301
  isFulltext: true
  titleUrlDefault: https://www.proquest.com/central
  providerName: ProQuest
– providerCode: PRVPQU
  databaseName: Publicly Available Content Database
  customDbUrl:
  eissn: 1099-4300
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0023216
  issn: 1099-4300
  databaseCode: PIMPY
  dateStart: 19990301
  isFulltext: true
  titleUrlDefault: http://search.proquest.com/publiccontent
  providerName: ProQuest
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwELWgcOBSgQARWlYGIcElahI7tiNOW9iKSu1qBQtaTtH4S10BWdRN4cZvZybJrrqAxIVLDrYVjWdizzxn_Iax58ZXYESOSLWi06pYmtQWFlKBzs5iCJvHrn7KxzM9nZrFoppdK_VFOWE9PXCvuCOrrQsqsx6gkOANRF1Z5R24Ijifedp9MerZgKkBaokiVz2PkEBQfxTQ0Zsc8fWO9-lI-v_cin9Pj7zmb07usv0hUOTjXsB77EZo7rNXY35GaPpHd6DJ53Rhgp8Hur27XH_ldKjKx20L7jN_E9ouy6rhGJby09X8AftwMpm_fpsO5Q9SJ41qUwFQZVmMuKhcGRWA1EqqzPssgHF51IQnBTpsL0Bk1gKAMoXNQMYYoi_FQ7bXrJrwiHGEDc7JSkOMTuZaV6oI0kTQCt-deZuwlxu11G7gBqcSFV9qxAikwXqrwYQ92w791hNi_G3QMel2O4A4rLsGtGw9WLb-l2UT9oIsU9NKQ2Gwvb8wgFMizqp6jPu41DgZkbDDjfHqYQmu64Ko-4nwDqV5uu3GxUN_RKAJq6t-jJGlzvOEmR2j74i-29MsLzoabgSypUC89_h_TPaA3aFC9n1q4SHbay-vwhN2231vl-vLEbupF2bEbh1PprN3o-5TH1GW6nt6_pxgz-z0fPbpFzrgCjU
linkProvider Directory of Open Access Journals
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELaqggQXHgJEoIBBILhETWJv7AghtFCqrrpdIbGg3tLxC1ZAUnZTKv4Uv5GZZLOwgLj1wNW2EicznplvPA_GHmpXgBYpItWCvFVhoGOTGYgFKjuDJmwa2v4p78ZqMtGHh8XrDfa9z4WhsMpeJraC2tWWfOTbGVVip_pl-vnxl5i6RtHtat9Co2OLff_tFCHb4tloB-n7KMt2X01f7sXLrgKxlTpvYgFQJEkIyKt2EHIAqXKZJ84lHrRNgyKYJlAPOgEiMQYAcp2ZBGQIPjjqEoEi_5wk6d-GCr5ZATyRpXlXvUiIItn2aF7oFFH9ms5rWwP8qQB-D8r8RcvtXv7f_s8VdmlpT_NhdwCusg1fXWNPh3xMTofT1u_Lp5RXwg88JTnPFp85-Z75sGnAfuQ7vmmD0SqO1jsf1dPr7O2Z7PcG26zqyt9kHNGVtbJQEIKVqVJFnnmpA6gcn504E7EnPR1LuyyhTp08PpUIpYjk5YrkEXuwWnrc1Q3526IXxAyrBVTqux2o5-_LpeQojTLW54lxAJkEpyGowuTOgs28dYmL2GNipZIEEm4Gx7u8CvwkKu1VDlHdSYUfIyK21bNOuZRUi_In30Ts_moaZQxdHEHl65NujZYDlaYR02tcurb19Zlq9qGtVo54fyAQFt_699vvsQt704NxOR5N9m-zixmepi7OcottNvMTf4edt1-b2WJ-tz1znB2dNRP_AFGKbUY
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lj9MwELZWXYS48BAgAgsYBIJL1CR2Y0cIoUKpqLZb9VDQcgp-stVCsrRZVvw1fh0zeRQKiNseuNqjxIk_z_gbj2cIeSRtpiSLgalm6K3yAxnqRKuQgbHTsIWNfV0_5d1UzGby8DCb75Dv3V0YDKvsdGKtqG1p0EfeTzATO-Yvk33fhkXMR-MXJ19CrCCFJ61dOY0GIvvu2xnQt_XzyQjm-nGSjF8vXr0J2woDoeEyrUKmVBZF3gNuzcCnSnGR8jSyNnJKmtgLpGwMbKJlikVaK6VSmehIce-dt1gxAtT_Lkhx3iO788nB_P2G7rEkTptcRoxlUd_BZkPGwPG3LGBdKOBPc_B7iOYvNm985X_-W1fJ5XanTYfN0rhGdlxxnTwb0im6I85qjzBd4I0TeuDw-vNy_ZmiV5oOq0qZYzpyVR2mVlDY19NJubhB3p7LeG-SXlEW7hahwLuM4ZlQ3hseC5GliePSK5HCsyOrA_K0m9PctMnVscbHpxxIFk5_vpn-gDzciJ40GUX-JvQSgbERwCTgdUO5-pi3OiXXQhuXRtoqlXBlpfIi06k1yiTO2MgG5AnCKkdVBYOB9ubGBXwSJv3Kh2AIuYCPYQHZ62CUtzpsnf_EUEAebLpB--CRkipcedrISD4QcRwQuYXYraFv9xTLozqPeQx0ggFhvv3vt98nFwG7-XQy279DLiWwsJoAzD3Sq1an7i65YL5Wy_XqXrsAKflw3ij-ATCdd4Y
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Lightweight+Trust+Mechanism+with+Attack+Detection+for+IoT&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Zhou%2C+Xujie&rft.au=Tang%2C+Jinchuan&rft.au=Dang%2C+Shuping&rft.au=Chen%2C+Gaojie&rft.date=2023-08-01&rft.issn=1099-4300&rft.eissn=1099-4300&rft.volume=25&rft.issue=8&rft.spage=1198&rft_id=info:doi/10.3390%2Fe25081198&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_e25081198
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon