A Lightweight Trust Mechanism with Attack Detection for IoT
In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang...
Uloženo v:
| Vydáno v: | Entropy (Basel, Switzerland) Ročník 25; číslo 8; s. 1198 |
|---|---|
| Hlavní autoři: | , , , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
Basel
MDPI AG
01.08.2023
MDPI |
| Témata: | |
| ISSN: | 1099-4300, 1099-4300 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang’s belief model to quantify a device’s trustworthiness, where evaluators can freely initialize and update trust data with feedback from multiple sources, avoiding the bias of a single message source. It balances the accuracy of estimations and algorithm complexity. Secondly, considering that a trust estimation should reflect a device’s latest status, we propose a forgetting algorithm to ensure that trust estimations can sensitively perceive changes in device status. Compared with conventional methods, it can automatically set its parameters to gain good performance. Finally, to prevent trust attacks from misleading evaluators, we propose a tango algorithm to curb trust attacks and a hypothesis testing-based trust attack detection mechanism. We corroborate the proposed trust mechanism’s performance with simulation, whose results indicate that even if challenged by many colluding attackers that can exploit different trust attacks in combination, it can produce relatively accurate trust estimations, gradually exclude attackers, and quickly restore trust estimations for normal devices. |
|---|---|
| AbstractList | In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang’s belief model to quantify a device’s trustworthiness, where evaluators can freely initialize and update trust data with feedback from multiple sources, avoiding the bias of a single message source. It balances the accuracy of estimations and algorithm complexity. Secondly, considering that a trust estimation should reflect a device’s latest status, we propose a forgetting algorithm to ensure that trust estimations can sensitively perceive changes in device status. Compared with conventional methods, it can automatically set its parameters to gain good performance. Finally, to prevent trust attacks from misleading evaluators, we propose a tango algorithm to curb trust attacks and a hypothesis testing-based trust attack detection mechanism. We corroborate the proposed trust mechanism’s performance with simulation, whose results indicate that even if challenged by many colluding attackers that can exploit different trust attacks in combination, it can produce relatively accurate trust estimations, gradually exclude attackers, and quickly restore trust estimations for normal devices. In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang's belief model to quantify a device's trustworthiness, where evaluators can freely initialize and update trust data with feedback from multiple sources, avoiding the bias of a single message source. It balances the accuracy of estimations and algorithm complexity. Secondly, considering that a trust estimation should reflect a device's latest status, we propose a forgetting algorithm to ensure that trust estimations can sensitively perceive changes in device status. Compared with conventional methods, it can automatically set its parameters to gain good performance. Finally, to prevent trust attacks from misleading evaluators, we propose a tango algorithm to curb trust attacks and a hypothesis testing-based trust attack detection mechanism. We corroborate the proposed trust mechanism's performance with simulation, whose results indicate that even if challenged by many colluding attackers that can exploit different trust attacks in combination, it can produce relatively accurate trust estimations, gradually exclude attackers, and quickly restore trust estimations for normal devices.In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering challenges such as limited device resources and trust attacks. Firstly, we propose a trust evaluation approach based on Bayesian statistics and Jøsang's belief model to quantify a device's trustworthiness, where evaluators can freely initialize and update trust data with feedback from multiple sources, avoiding the bias of a single message source. It balances the accuracy of estimations and algorithm complexity. Secondly, considering that a trust estimation should reflect a device's latest status, we propose a forgetting algorithm to ensure that trust estimations can sensitively perceive changes in device status. Compared with conventional methods, it can automatically set its parameters to gain good performance. Finally, to prevent trust attacks from misleading evaluators, we propose a tango algorithm to curb trust attacks and a hypothesis testing-based trust attack detection mechanism. We corroborate the proposed trust mechanism's performance with simulation, whose results indicate that even if challenged by many colluding attackers that can exploit different trust attacks in combination, it can produce relatively accurate trust estimations, gradually exclude attackers, and quickly restore trust estimations for normal devices. |
| Audience | Academic |
| Author | Tang, Jinchuan Dang, Shuping Chen, Gaojie Zhou, Xujie |
| AuthorAffiliation | 3 5G/6G Innovation Center, Institute for Communication Systems, University of Surrey, Guidford GU2 7XH, UK; gaojie.chen@surrey.ac.uk 2 Department of Electrical and Electronic Engineering, University of Bristol, Bristol BS8 1QU, UK; shuping.dang@bristol.ac.uk 1 State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China; xujiezhou@ieee.org |
| AuthorAffiliation_xml | – name: 2 Department of Electrical and Electronic Engineering, University of Bristol, Bristol BS8 1QU, UK; shuping.dang@bristol.ac.uk – name: 1 State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang 550025, China; xujiezhou@ieee.org – name: 3 5G/6G Innovation Center, Institute for Communication Systems, University of Surrey, Guidford GU2 7XH, UK; gaojie.chen@surrey.ac.uk |
| Author_xml | – sequence: 1 givenname: Xujie surname: Zhou fullname: Zhou, Xujie – sequence: 2 givenname: Jinchuan surname: Tang fullname: Tang, Jinchuan – sequence: 3 givenname: Shuping surname: Dang fullname: Dang, Shuping – sequence: 4 givenname: Gaojie orcidid: 0000-0003-2978-0365 surname: Chen fullname: Chen, Gaojie |
| BookMark | eNplkk1v1DAQhiNUJNrCgX8QiQsctvVXYkcc0Kq0sNIiLsvZmtjjXS9JXGyHin-Pt1sQLRfbGr_v4xnPnFUnU5iwql5TcsF5Ry6RNURR2qln1SklXbcQnJCTf84vqrOU9oQwzmh7Wr1f1mu_3eU7PKz1Js4p11_Q7GDyaazvfN7Vy5zBfK8_YkaTfZhqF2K9CpuX1XMHQ8JXD_t59e3menP1ebH--ml1tVwvjFBtXnCAjhDnWCNN41oAIVvREmsJgjLUSSkk5Q1llgMnfQ8ArWI9AeEcOtvw82p15NoAe30b_Qjxlw7g9X0gxK2GmL0ZUPeyN9iS3gIwAVaBk13fWgOGobHEFtaHI-t27ke0BqccYXgEfXwz-Z3ehp-aEtFwoWQhvH0gxPBjxpT16JPBYYAJw5w0U41UopGUFumbJ9J9mONU_upeRSiVnSqqi6NqC6UCP7lQHi4Zg8XRm9Je50t8KVsmpJQdL4bLo8HEkFJEp43PcOhMMfqhpKoPs6D_zkJxvHvi-FPw_9rfaG21yw |
| CitedBy_id | crossref_primary_10_1007_s10586_024_05050_w |
| Cites_doi | 10.1109/ACCESS.2020.3005541 10.1109/TVT.2014.2313865 10.1016/j.future.2019.02.004 10.1109/JIOT.2020.2981005 10.1109/INFOCOM.2008.180 10.1109/Blockchain.2019.00032 10.1515/9780691214696 10.1109/TDSC.2015.2420552 10.1007/s11276-019-02129-w 10.1109/TITS.2015.2494017 10.1109/ACCESS.2020.2968948 10.1007/s11276-019-02106-3 10.1016/j.comnet.2012.07.010 10.1109/CC.2014.6821746 10.1016/j.isatra.2022.09.035 10.1002/cpe.5109 10.1109/JIOT.2016.2584538 10.1109/CAMAD.2014.7033259 10.1145/342009.335388 10.1109/TNSM.2018.2815280 10.1109/ACCESS.2017.2733225 10.1016/j.future.2018.05.049 10.1016/j.iot.2021.100382 10.1109/MCOM.2017.1600502CM 10.1016/j.future.2023.05.008 10.1109/ACCESS.2020.2972968 10.1109/ACCESS.2019.2924045 10.1016/j.future.2019.12.045 10.1109/TETC.2019.2957394 10.1145/3360774.3360822 10.1007/s11277-019-06407-w 10.1109/ACCESS.2019.2932769 10.1016/j.jnca.2019.02.024 10.1145/1362542.1362546 |
| ContentType | Journal Article |
| Copyright | COPYRIGHT 2023 MDPI AG 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 by the authors. 2023 |
| Copyright_xml | – notice: COPYRIGHT 2023 MDPI AG – notice: 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 by the authors. 2023 |
| DBID | AAYXX CITATION 7TB 8FD 8FE 8FG ABJCF ABUWG AFKRA AZQEC BENPR BGLVJ CCPQU DWQXO FR3 HCIFZ KR7 L6V M7S PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS PTHSS 7X8 5PM DOA |
| DOI | 10.3390/e25081198 |
| DatabaseName | CrossRef Mechanical & Transportation Engineering Abstracts Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection Materials Science & Engineering Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland ProQuest Central Essentials ProQuest Central Technology Collection (via ProQuest SciTech Premium Collection) ProQuest One ProQuest Central Korea Engineering Research Database SciTech Premium Collection Civil Engineering Abstracts ProQuest Engineering Collection Engineering Database Proquest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central China Engineering collection MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef Publicly Available Content Database Technology Collection Technology Research Database ProQuest One Academic Middle East (New) Mechanical & Transportation Engineering Abstracts ProQuest Central Essentials ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Engineering Collection ProQuest Central Korea ProQuest Central (New) Engineering Collection Civil Engineering Abstracts Engineering Database ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection ProQuest One Academic UKI Edition Materials Science & Engineering Collection Engineering Research Database ProQuest One Academic ProQuest One Academic (New) MEDLINE - Academic |
| DatabaseTitleList | CrossRef MEDLINE - Academic Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| EISSN | 1099-4300 |
| ExternalDocumentID | oai_doaj_org_article_b7bce60bdaa24ad8af79b6dcac2ecd0d PMC10453487 A762477793 10_3390_e25081198 |
| GrantInformation_xml | – fundername: Guizhou University grantid: (2021) 30 |
| GroupedDBID | 29G 2WC 5GY 5VS 8FE 8FG AADQD AAFWJ AAYXX ABDBF ABJCF ACIWK ACUHS ADBBV AEGXH AENEX AFFHD AFKRA AFPKN AFZYC ALMA_UNASSIGNED_HOLDINGS BCNDV BENPR BGLVJ CCPQU CITATION CS3 DU5 E3Z ESX F5P GROUPED_DOAJ GX1 HCIFZ HH5 IAO ITC J9A KQ8 L6V M7S MODMG M~E OK1 OVT PGMZT PHGZM PHGZT PIMPY PQGLB PROAC PTHSS RNS RPM TR2 TUS XSB ~8M 7TB 8FD ABUWG AZQEC DWQXO FR3 KR7 PKEHL PQEST PQQKQ PQUKI PRINS 7X8 PUEGO 5PM |
| ID | FETCH-LOGICAL-c486t-3aa900ff257c5f6aa476460dd0ea8c1f774713512d3a30bbaaa682b0a4ffefd53 |
| IEDL.DBID | DOA |
| ISICitedReferencesCount | 1 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=001057403700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 1099-4300 |
| IngestDate | Mon Nov 10 04:23:04 EST 2025 Tue Nov 04 02:06:27 EST 2025 Fri Sep 05 08:30:13 EDT 2025 Fri Jul 25 10:32:08 EDT 2025 Tue Nov 04 18:38:31 EST 2025 Sat Nov 29 07:15:58 EST 2025 Tue Nov 18 21:27:55 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 8 |
| Language | English |
| License | Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c486t-3aa900ff257c5f6aa476460dd0ea8c1f774713512d3a30bbaaa682b0a4ffefd53 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0003-2978-0365 |
| OpenAccessLink | https://doaj.org/article/b7bce60bdaa24ad8af79b6dcac2ecd0d |
| PQID | 2857011798 |
| PQPubID | 2032401 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_b7bce60bdaa24ad8af79b6dcac2ecd0d pubmedcentral_primary_oai_pubmedcentral_nih_gov_10453487 proquest_miscellaneous_2857845711 proquest_journals_2857011798 gale_infotracacademiconefile_A762477793 crossref_citationtrail_10_3390_e25081198 crossref_primary_10_3390_e25081198 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-08-01 |
| PublicationDateYYYYMMDD | 2023-08-01 |
| PublicationDate_xml | – month: 08 year: 2023 text: 2023-08-01 day: 01 |
| PublicationDecade | 2020 |
| PublicationPlace | Basel |
| PublicationPlace_xml | – name: Basel |
| PublicationTitle | Entropy (Basel, Switzerland) |
| PublicationYear | 2023 |
| Publisher | MDPI AG MDPI |
| Publisher_xml | – name: MDPI AG – name: MDPI |
| References | Soleymani (ref_14) 2017; 5 Altaf (ref_5) 2019; 137 Wang (ref_35) 2019; 7 Jiang (ref_15) 2017; 55 Alemneh (ref_25) 2020; 106 Rathee (ref_31) 2020; 26 ref_36 ref_34 ref_33 Li (ref_11) 2015; 17 Gu (ref_2) 2014; 11 Meng (ref_12) 2018; 15 Ganeriwal (ref_8) 2008; 4 ref_18 Chiang (ref_26) 2016; 3 Haseeb (ref_22) 2023; 132 Ogundoyin (ref_23) 2021; 14 Balaji (ref_1) 2019; 108 Shala (ref_19) 2020; 8 Junejo (ref_24) 2019; 9 ref_20 Awan (ref_17) 2020; 8 Wang (ref_27) 2020; 109 Chen (ref_16) 2015; 13 ref_3 ref_29 Ullah (ref_21) 2023; 148 Anwar (ref_13) 2019; 96 ref_9 Wei (ref_10) 2014; 63 Hussain (ref_30) 2020; 8 Fang (ref_32) 2020; 26 Hassija (ref_4) 2019; 7 Atzori (ref_6) 2012; 56 ref_7 Liang (ref_28) 2020; 7 |
| References_xml | – ident: ref_3 – volume: 8 start-page: 119961 year: 2020 ident: ref_19 article-title: Blockchain and trust for secure, end-user-based and decentralized IoT service provision publication-title: IEEE Access doi: 10.1109/ACCESS.2020.3005541 – ident: ref_34 – volume: 63 start-page: 4647 year: 2014 ident: ref_10 article-title: Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2014.2313865 – volume: 96 start-page: 605 year: 2019 ident: ref_13 article-title: BTEM: Belief based trust evaluation mechanism for wireless sensor networks publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.02.004 – volume: 7 start-page: 5481 year: 2020 ident: ref_28 article-title: A reliable trust computing mechanism based on multisource feedback and fog computing in social sensor cloud publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2020.2981005 – ident: ref_9 doi: 10.1109/INFOCOM.2008.180 – ident: ref_20 doi: 10.1109/Blockchain.2019.00032 – ident: ref_7 doi: 10.1515/9780691214696 – volume: 13 start-page: 684 year: 2015 ident: ref_16 article-title: Trust-based service management for social Internet of Things systems publication-title: IEEE Trans. Dependable Secur. Comput. doi: 10.1109/TDSC.2015.2420552 – volume: 26 start-page: 3169 year: 2020 ident: ref_32 article-title: TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing publication-title: Wirel. Netw. doi: 10.1007/s11276-019-02129-w – volume: 17 start-page: 960 year: 2015 ident: ref_11 article-title: ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks publication-title: IEEE Trans. Intell. Transp. Syst. doi: 10.1109/TITS.2015.2494017 – volume: 8 start-page: 21159 year: 2020 ident: ref_17 article-title: StabTrust: A stable and centralized trust-based clustering mechanism for IoT enabled vehicular ad-hoc networks publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2968948 – volume: 26 start-page: 2339 year: 2020 ident: ref_31 article-title: A trust computed framework for IoT devices and fog computing environment publication-title: Wirel. Netw. doi: 10.1007/s11276-019-02106-3 – volume: 56 start-page: 3594 year: 2012 ident: ref_6 article-title: The social Internet of Things (SIoT)—When social networks meet the Internet of Things: Concept, architecture and network characterization publication-title: Comput. Netw. doi: 10.1016/j.comnet.2012.07.010 – volume: 11 start-page: 148 year: 2014 ident: ref_2 article-title: Trust management mechanism for Internet of Things publication-title: China Commun. doi: 10.1109/CC.2014.6821746 – volume: 132 start-page: 61 year: 2023 ident: ref_22 article-title: Efficient and trusted autonomous vehicle routing protocol for 6G networks with computational intelligence publication-title: ISA Trans. doi: 10.1016/j.isatra.2022.09.035 – ident: ref_29 doi: 10.1002/cpe.5109 – volume: 3 start-page: 854 year: 2016 ident: ref_26 article-title: Fog and IoT: An overview of research opportunities publication-title: IEEE Internet Things J. doi: 10.1109/JIOT.2016.2584538 – ident: ref_33 doi: 10.1109/CAMAD.2014.7033259 – ident: ref_36 doi: 10.1145/342009.335388 – volume: 15 start-page: 761 year: 2018 ident: ref_12 article-title: Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks publication-title: IEEE Trans. Netw. Serv. Manag. doi: 10.1109/TNSM.2018.2815280 – volume: 5 start-page: 15619 year: 2017 ident: ref_14 article-title: A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing publication-title: IEEE Access doi: 10.1109/ACCESS.2017.2733225 – volume: 109 start-page: 573 year: 2020 ident: ref_27 article-title: A novel trust mechanism based on fog computing in sensor–cloud system publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2018.05.049 – volume: 14 start-page: 100382 year: 2021 ident: ref_23 article-title: A trust management system for fog computing services publication-title: Internet Things doi: 10.1016/j.iot.2021.100382 – volume: 55 start-page: 110 year: 2017 ident: ref_15 article-title: A trust cloud model for underwater wireless sensor networks publication-title: IEEE Commun. Mag. doi: 10.1109/MCOM.2017.1600502CM – volume: 148 start-page: 326 year: 2023 ident: ref_21 article-title: HIDE-Healthcare IoT data trust managEment: Attribute centric intelligent privacy approach publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2023.05.008 – volume: 8 start-page: 31622 year: 2020 ident: ref_30 article-title: Context-aware trust and reputation model for fog-based IoT publication-title: IEEE Access doi: 10.1109/ACCESS.2020.2972968 – volume: 7 start-page: 82721 year: 2019 ident: ref_4 article-title: A survey on IoT security: Application areas, security threats, and solution architectures publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2924045 – volume: 106 start-page: 206 year: 2020 ident: ref_25 article-title: A two-way trust management system for fog computing publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2019.12.045 – volume: 9 start-page: 2030 year: 2019 ident: ref_24 article-title: Trustee: A trust management system for fog-enabled cyber physical systems publication-title: IEEE Trans. Emerg. Top. Comput. doi: 10.1109/TETC.2019.2957394 – ident: ref_18 doi: 10.1145/3360774.3360822 – volume: 108 start-page: 363 year: 2019 ident: ref_1 article-title: IoT technology, applications and challenges: A contemporary survey publication-title: Wirel. Pers. Commun. doi: 10.1007/s11277-019-06407-w – volume: 7 start-page: 107964 year: 2019 ident: ref_35 article-title: Progress in outlier detection techniques: A survey publication-title: IEEE Access doi: 10.1109/ACCESS.2019.2932769 – volume: 137 start-page: 93 year: 2019 ident: ref_5 article-title: Trust models of Internet of Smart Things: A survey, open issues, and future directions publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2019.02.024 – volume: 4 start-page: 1 year: 2008 ident: ref_8 article-title: Reputation-based framework for high integrity sensor networks publication-title: ACM Trans. Sens. Netw. doi: 10.1145/1362542.1362546 |
| SSID | ssj0023216 |
| Score | 2.3171325 |
| Snippet | In this paper, we propose a lightweight and adaptable trust mechanism for the issue of trust evaluation among Internet of Things devices, considering... |
| SourceID | doaj pubmedcentral proquest gale crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database |
| StartPage | 1198 |
| SubjectTerms | Algorithms Analysis attack detection Communication Internet of Things Lightweight Multiple trusts Sensors Social networks Trust trust attack trust mechanism Trustworthiness |
| SummonAdditionalLinks | – databaseName: Engineering Database dbid: M7S link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lb9QwELagcOBSigCRUpBBSHCJmsSO7YgDWh4VSKVCYkG9ReNXuyokZTctf5-ZJBtYQFy42qPEyXg8_sbjbxh7YnwFRuSIVCuKVsXSpLawkAp0dha3sHns66d8PtRHR-b4uPowBtxWY1rlek3sF2rfOoqR7xfExE78ZebF-beUqkbR6epYQuMqu0YsCUWfuvdxAlyiyNXAJiQQ2u8HdPcmR5S94YN6qv4_F-TfkyR_8ToHN_93vDtse9xv8tkwQW6xK6G5zZ7P-CGB8u99XJTP6d4Ffx_oEvBi9ZVTbJbPug7cGX8duj5Zq-G4u-Xv2vkd9ungzfzV23SsopA6aVSXCoAqy2JE23RlVABSK6ky77MAxuVREywV6Pe9AJFZCwDKFDYDGWOIvhR32VbTNuEe44g-nJOVhhidzLWuVBGkiaAVPjvzNmHP1v-1diPFOFW6-FIj1CAV1JMKEvZ4Ej0feDX-JvSSlDMJEBV239AuT-rRsmqrrQsqsx6gkOANRF1Z5R24Ijif-YQ9JdXWZLA4GGwf7h3gJxH1VT1DdyA1foxI2N5alfVoyav6px4T9mjqRhukgxVoQnsxyBhZ6jxPmNmYNRtD3-xpFqc9mzfi4VIgbNz999vvsxtU6X7IPdxjW93yIjxg191lt1gtH_bz_gdX6Q60 priority: 102 providerName: ProQuest |
| Title | A Lightweight Trust Mechanism with Attack Detection for IoT |
| URI | https://www.proquest.com/docview/2857011798 https://www.proquest.com/docview/2857845711 https://pubmed.ncbi.nlm.nih.gov/PMC10453487 https://doaj.org/article/b7bce60bdaa24ad8af79b6dcac2ecd0d |
| Volume | 25 |
| WOSCitedRecordID | wos001057403700001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: DOA dateStart: 20160101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: M~E dateStart: 19990101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Engineering Database customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: M7S dateStart: 19990301 isFulltext: true titleUrlDefault: http://search.proquest.com providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: BENPR dateStart: 19990301 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 1099-4300 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0023216 issn: 1099-4300 databaseCode: PIMPY dateStart: 19990301 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Nb9QwELWgcOBSgQARWlYGIcElahI7tiNOW9iKSu1qBQtaTtH4S10BWdRN4cZvZybJrrqAxIVLDrYVjWdizzxn_Iax58ZXYESOSLWi06pYmtQWFlKBzs5iCJvHrn7KxzM9nZrFoppdK_VFOWE9PXCvuCOrrQsqsx6gkOANRF1Z5R24Ijifedp9MerZgKkBaokiVz2PkEBQfxTQ0Zsc8fWO9-lI-v_cin9Pj7zmb07usv0hUOTjXsB77EZo7rNXY35GaPpHd6DJ53Rhgp8Hur27XH_ldKjKx20L7jN_E9ouy6rhGJby09X8AftwMpm_fpsO5Q9SJ41qUwFQZVmMuKhcGRWA1EqqzPssgHF51IQnBTpsL0Bk1gKAMoXNQMYYoi_FQ7bXrJrwiHGEDc7JSkOMTuZaV6oI0kTQCt-deZuwlxu11G7gBqcSFV9qxAikwXqrwYQ92w791hNi_G3QMel2O4A4rLsGtGw9WLb-l2UT9oIsU9NKQ2Gwvb8wgFMizqp6jPu41DgZkbDDjfHqYQmu64Ko-4nwDqV5uu3GxUN_RKAJq6t-jJGlzvOEmR2j74i-29MsLzoabgSypUC89_h_TPaA3aFC9n1q4SHbay-vwhN2231vl-vLEbupF2bEbh1PprN3o-5TH1GW6nt6_pxgz-z0fPbpFzrgCjU |
| linkProvider | Directory of Open Access Journals |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9QwELaqggQXHgJEoIBBILhETWJv7AghtFCqrrpdIbGg3tLxC1ZAUnZTKv4Uv5GZZLOwgLj1wNW2EicznplvPA_GHmpXgBYpItWCvFVhoGOTGYgFKjuDJmwa2v4p78ZqMtGHh8XrDfa9z4WhsMpeJraC2tWWfOTbGVVip_pl-vnxl5i6RtHtat9Co2OLff_tFCHb4tloB-n7KMt2X01f7sXLrgKxlTpvYgFQJEkIyKt2EHIAqXKZJ84lHrRNgyKYJlAPOgEiMQYAcp2ZBGQIPjjqEoEi_5wk6d-GCr5ZATyRpXlXvUiIItn2aF7oFFH9ms5rWwP8qQB-D8r8RcvtXv7f_s8VdmlpT_NhdwCusg1fXWNPh3xMTofT1u_Lp5RXwg88JTnPFp85-Z75sGnAfuQ7vmmD0SqO1jsf1dPr7O2Z7PcG26zqyt9kHNGVtbJQEIKVqVJFnnmpA6gcn504E7EnPR1LuyyhTp08PpUIpYjk5YrkEXuwWnrc1Q3526IXxAyrBVTqux2o5-_LpeQojTLW54lxAJkEpyGowuTOgs28dYmL2GNipZIEEm4Gx7u8CvwkKu1VDlHdSYUfIyK21bNOuZRUi_In30Ts_moaZQxdHEHl65NujZYDlaYR02tcurb19Zlq9qGtVo54fyAQFt_699vvsQt704NxOR5N9m-zixmepi7OcottNvMTf4edt1-b2WJ-tz1znB2dNRP_AFGKbUY |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lj9MwELZWXYS48BAgAgsYBIJL1CR2Y0cIoUKpqLZb9VDQcgp-stVCsrRZVvw1fh0zeRQKiNseuNqjxIk_z_gbj2cIeSRtpiSLgalm6K3yAxnqRKuQgbHTsIWNfV0_5d1UzGby8DCb75Dv3V0YDKvsdGKtqG1p0EfeTzATO-Yvk33fhkXMR-MXJ19CrCCFJ61dOY0GIvvu2xnQt_XzyQjm-nGSjF8vXr0J2woDoeEyrUKmVBZF3gNuzcCnSnGR8jSyNnJKmtgLpGwMbKJlikVaK6VSmehIce-dt1gxAtT_Lkhx3iO788nB_P2G7rEkTptcRoxlUd_BZkPGwPG3LGBdKOBPc_B7iOYvNm985X_-W1fJ5XanTYfN0rhGdlxxnTwb0im6I85qjzBd4I0TeuDw-vNy_ZmiV5oOq0qZYzpyVR2mVlDY19NJubhB3p7LeG-SXlEW7hahwLuM4ZlQ3hseC5GliePSK5HCsyOrA_K0m9PctMnVscbHpxxIFk5_vpn-gDzciJ40GUX-JvQSgbERwCTgdUO5-pi3OiXXQhuXRtoqlXBlpfIi06k1yiTO2MgG5AnCKkdVBYOB9ubGBXwSJv3Kh2AIuYCPYQHZ62CUtzpsnf_EUEAebLpB--CRkipcedrISD4QcRwQuYXYraFv9xTLozqPeQx0ggFhvv3vt98nFwG7-XQy279DLiWwsJoAzD3Sq1an7i65YL5Wy_XqXrsAKflw3ij-ATCdd4Y |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+Lightweight+Trust+Mechanism+with+Attack+Detection+for+IoT&rft.jtitle=Entropy+%28Basel%2C+Switzerland%29&rft.au=Zhou%2C+Xujie&rft.au=Tang%2C+Jinchuan&rft.au=Dang%2C+Shuping&rft.au=Chen%2C+Gaojie&rft.date=2023-08-01&rft.issn=1099-4300&rft.eissn=1099-4300&rft.volume=25&rft.issue=8&rft.spage=1198&rft_id=info:doi/10.3390%2Fe25081198&rft.externalDBID=n%2Fa&rft.externalDocID=10_3390_e25081198 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1099-4300&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1099-4300&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1099-4300&client=summon |