Skip to main content

2023 | OriginalPaper | Buchkapitel

Detecting Collusive Agents by Trust Measures in Social IoT Environments: A Novel Reputation Model

verfasst von : Mariantonia Cotronei, Sofia Giuffrè, Attilio Marcianò, Domenico Rosaci, Giuseppe M. L. Sarnè

Erschienen in: Security, Trust and Privacy Models, and Architectures in IoT Environments

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the Internet of Things, smart objects can build multidimensional and context-sensitive network infrastructures potentially rich of social interactions. Smart objects can be associated with software agents to boost social interactions and realizing complex and sophisticated forms of collaboration of objects with both other objects and people. In such a scenario, there exists the possibility to interact with unreliable partners exposing agents to the risks deriving by malicious behaviors. To mitigate these risks, Trust and Reputation Systems can be adopted to provide each agent with appropriate trustworthiness measures about the potential counterparts in order to select the best ones. In this context, our contribution consists of (i) a method to preliminarily identify the best candidates as malicious in order to consider them as pre-untrusted entities and (ii) a novel effective reputation model able to detect collusive malicious agents without introducing collateral effects with respect to the reputation scores of honest agents.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous, and Florence Sèdes. Trust management in social internet of things: a survey. In Conference on e-Business, e-Services and e-Society, pages 430–441. Springer, 2016. Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous, and Florence Sèdes. Trust management in social internet of things: a survey. In Conference on e-Business, e-Services and e-Society, pages 430–441. Springer, 2016.
2.
Zurück zum Zitat Anna A Adamopoulou and Andreas L Symeonidis. A simulation testbed for analyzing trust and reputation mechanisms in unreliable online markets. Electronic Commerce Research and Applications, 13(5):368–386, 2014. Anna A Adamopoulou and Andreas L Symeonidis. A simulation testbed for analyzing trust and reputation mechanisms in unreliable online markets. Electronic Commerce Research and Applications, 13(5):368–386, 2014.
3.
Zurück zum Zitat Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, and Abdul Waheed Khan. A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Frontiers of Computer Science, 9(2):280–296, 2015. Adnan Ahmed, Kamalrulnizam Abu Bakar, Muhammad Ibrahim Channa, Khalid Haseeb, and Abdul Waheed Khan. A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks. Frontiers of Computer Science, 9(2):280–296, 2015.
4.
Zurück zum Zitat Ayesha Altaf, Haider Abbas, Faiza Iqbal, and Abdelouahid Derhab. Trust models of internet of smart things: A survey, open issues, and future directions. Journal of Network and Computer Applications, 137:93–111, 2019.CrossRef Ayesha Altaf, Haider Abbas, Faiza Iqbal, and Abdelouahid Derhab. Trust models of internet of smart things: A survey, open issues, and future directions. Journal of Network and Computer Applications, 137:93–111, 2019.CrossRef
5.
Zurück zum Zitat Parvaneh Asghari, Amir Masoud Rahmani, and Hamid Haj Seyyed Javadi. Service composition approaches in iot: A systematic review. Journal of Network and Computer Applications, 120:61–77, 2018. Parvaneh Asghari, Amir Masoud Rahmani, and Hamid Haj Seyyed Javadi. Service composition approaches in iot: A systematic review. Journal of Network and Computer Applications, 120:61–77, 2018.
6.
Zurück zum Zitat Kevin Ashton. That’ internet of things’ thing. rfid journal, 22 june 2009, 2009. Kevin Ashton. That’ internet of things’ thing. rfid journal, 22 june 2009, 2009.
7.
Zurück zum Zitat Luigi Atzori, Antonio Iera, Giacomo Morabito, and Michele Nitti. The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization. Computer networks, 56(16):3594–3608, 2012.CrossRef Luigi Atzori, Antonio Iera, Giacomo Morabito, and Michele Nitti. The social internet of things (siot)–when social networks meet the internet of things: Concept, architecture and network characterization. Computer networks, 56(16):3594–3608, 2012.CrossRef
8.
Zurück zum Zitat Amir Jalaly Bidgoly and Behrouz Tork Ladani. Modelling and quantitative verification of reputation systems against malicious attackers. The Computer Journal, 58(10):2567–2582, 2015. Amir Jalaly Bidgoly and Behrouz Tork Ladani. Modelling and quantitative verification of reputation systems against malicious attackers. The Computer Journal, 58(10):2567–2582, 2015.
9.
Zurück zum Zitat Amir Jalaly Bidgoly and Behrouz Tork Ladani. Benchmarking reputation systems: A quantitative verification approach. Computers in Human Behavior, 57:274–291, 2016. Amir Jalaly Bidgoly and Behrouz Tork Ladani. Benchmarking reputation systems: A quantitative verification approach. Computers in Human Behavior, 57:274–291, 2016.
10.
Zurück zum Zitat Luis Cabral and Ali Hortacsu. The dynamics of seller reputation: Evidence from ebay. The Journal of Industrial Economics, 58(1):54–78, 2010.CrossRef Luis Cabral and Ali Hortacsu. The dynamics of seller reputation: Evidence from ebay. The Journal of Industrial Economics, 58(1):54–78, 2010.CrossRef
11.
Zurück zum Zitat Jin-Hee Cho, Kevin Chan, and Sibel Adali. A survey on trust modeling. ACM Computing Surveys (CSUR), 48(2):1–40, 2015.CrossRef Jin-Hee Cho, Kevin Chan, and Sibel Adali. A survey on trust modeling. ACM Computing Surveys (CSUR), 48(2):1–40, 2015.CrossRef
12.
Zurück zum Zitat Pasquale De Meo, Lidia Fotia, Fabrizio Messina, Domenico Rosaci, and Giuseppe M. L. Sarné. Providing recommendations in social networks by integrating local and global reputation. Information Systems, 78:58–67, 2018. Pasquale De Meo, Lidia Fotia, Fabrizio Messina, Domenico Rosaci, and Giuseppe M. L. Sarné. Providing recommendations in social networks by integrating local and global reputation. Information Systems, 78:58–67, 2018.
13.
Zurück zum Zitat Pasquale De Meo, Fabrizio Messina, Maria Nadia Postorino, Domenico Rosaci, and Giuseppe M. L. Sarné. A reputation framework to share resources into iot-based environments. In IEEE 14th Int. Conf. on Networking, Sensing and Control, pages 513–518. IEEE, 2017. Pasquale De Meo, Fabrizio Messina, Maria Nadia Postorino, Domenico Rosaci, and Giuseppe M. L. Sarné. A reputation framework to share resources into iot-based environments. In IEEE 14th Int. Conf. on Networking, Sensing and Control, pages 513–518. IEEE, 2017.
14.
Zurück zum Zitat Ikram Ud Din, Mohsen Guizani, Byung-Seo Kim, Suhaidi Hassan, and Muhammad Khurram Khan. Trust management techniques for the internet of things: A survey. IEEE Access, 7:29763–29787, 2018. Ikram Ud Din, Mohsen Guizani, Byung-Seo Kim, Suhaidi Hassan, and Muhammad Khurram Khan. Trust management techniques for the internet of things: A survey. IEEE Access, 7:29763–29787, 2018.
15.
Zurück zum Zitat Weidong Fang, Wuxiong Zhang, Wei Chen, Tao Pan, Yepeng Ni, and Yinxuan Yang. Trust-based attack and defense in wireless sensor networks: a survey. Wireless Communications and Mobile Computing, 2020, 2020. Weidong Fang, Wuxiong Zhang, Wei Chen, Tao Pan, Yepeng Ni, and Yinxuan Yang. Trust-based attack and defense in wireless sensor networks: a survey. Wireless Communications and Mobile Computing, 2020, 2020.
16.
Zurück zum Zitat Giancarlo Fortino, Lidia Fotia, Fabrizio Messina, Domenico Rosaci, and Giuseppe M. L. Sarné. Trust and reputation in the internet of things: state-of-the-art and research challenges. IEEE Access, 8:60117–60125, 2020. Giancarlo Fortino, Lidia Fotia, Fabrizio Messina, Domenico Rosaci, and Giuseppe M. L. Sarné. Trust and reputation in the internet of things: state-of-the-art and research challenges. IEEE Access, 8:60117–60125, 2020.
17.
Zurück zum Zitat Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci, and Giuseppe M. L. Sarné. Using blockchain in a reputation-based model for grouping agents in the internet of things. IEEE Transactions on Engineering Management, 67(4):1231–1243, 2019. Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci, and Giuseppe M. L. Sarné. Using blockchain in a reputation-based model for grouping agents in the internet of things. IEEE Transactions on Engineering Management, 67(4):1231–1243, 2019.
18.
Zurück zum Zitat Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci, and Giuseppe M. L. Sarné. Resiot: An iot social framework resilient to malicious activities. IEEE/CAA Journal of Automatica Sinica, 7(5):1263–1278, 2020. Giancarlo Fortino, Fabrizio Messina, Domenico Rosaci, and Giuseppe M. L. Sarné. Resiot: An iot social framework resilient to malicious activities. IEEE/CAA Journal of Automatica Sinica, 7(5):1263–1278, 2020.
19.
Zurück zum Zitat Karen K Fullam, Tomas B Klos, Guillaume Muller, Jordi Sabater, Andreas Schlosser, Zvi Topol, K Suzanne Barber, Jeffrey S Rosenschein, Laurent Vercouter, and Marco Voss. A specification of the agent reputation and trust (art) testbed: experimentation and competition for trust in agent societies. In Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, pages 512–518, 2005. Karen K Fullam, Tomas B Klos, Guillaume Muller, Jordi Sabater, Andreas Schlosser, Zvi Topol, K Suzanne Barber, Jeffrey S Rosenschein, Laurent Vercouter, and Marco Voss. A specification of the agent reputation and trust (art) testbed: experimentation and competition for trust in agent societies. In Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems, pages 512–518, 2005.
20.
Zurück zum Zitat Diego Gambetta et al. Can we trust trust. Trust: Making and breaking cooperative relations, 13:213–237, 2000. Diego Gambetta et al. Can we trust trust. Trust: Making and breaking cooperative relations, 13:213–237, 2000.
21.
Zurück zum Zitat Seyed Asgary Ghasempouri and Behrouz Tork Ladani. Modeling trust and reputation systems in hostile environments. Future Generation Computer Systems, 99:571–592, 2019. Seyed Asgary Ghasempouri and Behrouz Tork Ladani. Modeling trust and reputation systems in hostile environments. Future Generation Computer Systems, 99:571–592, 2019.
22.
Zurück zum Zitat Stephen C Hayne, Haonan Wang, and Lu Wang. Modeling reputation as a time-series: Evaluating the risk of purchase decisions on ebay. Decision Sciences, 46(6):1077–1107, 2015. Stephen C Hayne, Haonan Wang, and Lu Wang. Modeling reputation as a time-series: Evaluating the risk of purchase decisions on ebay. Decision Sciences, 46(6):1077–1107, 2015.
23.
Zurück zum Zitat Ferry Hendrikx, Kris Bubendorfer, and Ryan Chard. Reputation systems: A survey and taxonomy. Journal of Parallel and Distributed Computing, 75:184–197, 2015.CrossRef Ferry Hendrikx, Kris Bubendorfer, and Ryan Chard. Reputation systems: A survey and taxonomy. Journal of Parallel and Distributed Computing, 75:184–197, 2015.CrossRef
24.
Zurück zum Zitat Kevin Hoffman, David Zage, and Cristina Nita-Rotaru. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR), 42(1):1–31, 2009.CrossRef Kevin Hoffman, David Zage, and Cristina Nita-Rotaru. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR), 42(1):1–31, 2009.CrossRef
25.
Zurück zum Zitat T.D. Huynh, N.R. Jennings, and N.R. Shadbolt. An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems, 13(2):119–154, 2006.CrossRef T.D. Huynh, N.R. Jennings, and N.R. Shadbolt. An integrated trust and reputation model for open multi-agent systems. Autonomous Agents and Multi-Agent Systems, 13(2):119–154, 2006.CrossRef
26.
Zurück zum Zitat HK Jnanamurthy and Sanjay Singh. Detection and filtering of collaborative malicious users in reputation system using quality repository approach. In 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pages 466–471. IEEE, 2013. HK Jnanamurthy and Sanjay Singh. Detection and filtering of collaborative malicious users in reputation system using quality repository approach. In 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pages 466–471. IEEE, 2013.
27.
Zurück zum Zitat Audun Jøsang. Robustness of trust and reputation systems: Does it matter? In IFIP International Conference on Trust Management, pages 253–262. Springer, 2012. Audun Jøsang. Robustness of trust and reputation systems: Does it matter? In IFIP International Conference on Trust Management, pages 253–262. Springer, 2012.
28.
Zurück zum Zitat Audun Jøsang and Jennifer Golbeck. Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo, France, volume 5. Citeseer, 2009. Audun Jøsang and Jennifer Golbeck. Challenges for robust trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo, France, volume 5. Citeseer, 2009.
29.
Zurück zum Zitat Audun Jøsang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision. Decision support systems, 43(2):618–644, 2007.CrossRef Audun Jøsang, Roslan Ismail, and Colin Boyd. A survey of trust and reputation systems for online service provision. Decision support systems, 43(2):618–644, 2007.CrossRef
30.
Zurück zum Zitat S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. In Proc. of World Wide Web, 12th International Conference on, pages 640–651. ACM, 2003. S.D. Kamvar, M.T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. In Proc. of World Wide Web, 12th International Conference on, pages 640–651. ACM, 2003.
31.
Zurück zum Zitat Sepandar D Kamvar, Mario T Schlosser, and Hector Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In Proc. of the 12th international conference on World Wide Web, pages 640–651. ACM, 2003. Sepandar D Kamvar, Mario T Schlosser, and Hector Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In Proc. of the 12th international conference on World Wide Web, pages 640–651. ACM, 2003.
32.
Zurück zum Zitat Reid Kerr and Robin Cohen. Treet: The trust and reputation experimentation and evaluation testbed. Electronic Commerce Research, 10(3):271–290, 2010.CrossRef Reid Kerr and Robin Cohen. Treet: The trust and reputation experimentation and evaluation testbed. Electronic Commerce Research, 10(3):271–290, 2010.CrossRef
33.
Zurück zum Zitat Gerd Kortuem, Fahim Kawsar, Vasughi Sundramoorthy, and Daniel Fitton. Smart objects as building blocks for the internet of things. IEEE Internet Computing, 14(1):44–51, 2009.CrossRef Gerd Kortuem, Fahim Kawsar, Vasughi Sundramoorthy, and Daniel Fitton. Smart objects as building blocks for the internet of things. IEEE Internet Computing, 14(1):44–51, 2009.CrossRef
34.
Zurück zum Zitat Gianluca Lax and Giuseppe M. L. Sarné. CellTrust: a reputation model for C2C commerce. Electronic Commerce Research, 8(4):193–216, 2006. Gianluca Lax and Giuseppe M. L. Sarné. CellTrust: a reputation model for C2C commerce. Electronic Commerce Research, 8(4):193–216, 2006.
35.
Zurück zum Zitat Seppo Leminen, Mika Westerlund, Mervi Rajahonka, and Riikka Siuruainen. Towards iot ecosystems and business models. In Internet of things, smart spaces, and next generation networking, pages 15–26. Springer, 2012. Seppo Leminen, Mika Westerlund, Mervi Rajahonka, and Riikka Siuruainen. Towards iot ecosystems and business models. In Internet of things, smart spaces, and next generation networking, pages 15–26. Springer, 2012.
36.
Zurück zum Zitat Liang Liu, Zuchao Ma, and Weizhi Meng. Detection of multiple-mix-attack malicious nodes using perceptron-based trust in iot networks. Future generation computer systems, 101:865–879, 2019.CrossRef Liang Liu, Zuchao Ma, and Weizhi Meng. Detection of multiple-mix-attack malicious nodes using perceptron-based trust in iot networks. Future generation computer systems, 101:865–879, 2019.CrossRef
37.
Zurück zum Zitat Somayya Madakam, Vihar Lake, Vihar Lake, Vihar Lake, et al. Internet of things (IoT): A literature review. Journal of Computer and Communications, 3(05):164, 2015. Somayya Madakam, Vihar Lake, Vihar Lake, Vihar Lake, et al. Internet of things (IoT): A literature review. Journal of Computer and Communications, 3(05):164, 2015.
38.
Zurück zum Zitat C Marche and M Nitti. Trust-related attacks and their detection: a trust management model for the social IoT. IEEE Transactions on Network and Service Management, 2020. C Marche and M Nitti. Trust-related attacks and their detection: a trust management model for the social IoT. IEEE Transactions on Network and Service Management, 2020.
39.
Zurück zum Zitat Félix Gómez Mármol and Gregorio Martínez Pérez. Security threats scenarios in trust and reputation models for distributed systems. computers & security, 28(7):545–556, 2009. Félix Gómez Mármol and Gregorio Martínez Pérez. Security threats scenarios in trust and reputation models for distributed systems. computers & security, 28(7):545–556, 2009.
40.
Zurück zum Zitat Félix Gómez Mármol and Gregorio Martínez Pérez. TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In 2009 IEEE International Conference on Communications, pages 1–5. IEEE, 2009. Félix Gómez Mármol and Gregorio Martínez Pérez. TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In 2009 IEEE International Conference on Communications, pages 1–5. IEEE, 2009.
41.
Zurück zum Zitat D Harrison McKnight and Norman L Chervany. The meanings of trust. 1996. D Harrison McKnight and Norman L Chervany. The meanings of trust. 1996.
42.
Zurück zum Zitat Fabrizio Messina, Giuseppe Pappalardo, Domenico Rosaci, Corrado Santoro, and Giuseppe M. L. Sarné. A trust-aware, self-organizing system for large-scale federations of utility computing infrastructures. Future Generation Computer Systems, 2015. Fabrizio Messina, Giuseppe Pappalardo, Domenico Rosaci, Corrado Santoro, and Giuseppe M. L. Sarné. A trust-aware, self-organizing system for large-scale federations of utility computing infrastructures. Future Generation Computer Systems, 2015.
43.
Zurück zum Zitat Behrouz Pourghebleh, Karzan Wakil, and Nima Jafari Navimipour. A comprehensive study on the trust management techniques in the internet of things. IEEE Internet of Things Journal, 6(6):9326–9337, 2019. Behrouz Pourghebleh, Karzan Wakil, and Nima Jafari Navimipour. A comprehensive study on the trust management techniques in the internet of things. IEEE Internet of Things Journal, 6(6):9326–9337, 2019.
44.
Zurück zum Zitat P. Resnick, R. Zeckhauser, Friedman E., and K. Kuwabara. Reputation systems. Communication of ACM, 43(12):45–48, 2000. P. Resnick, R. Zeckhauser, Friedman E., and K. Kuwabara. Reputation systems. Communication of ACM, 43(12):45–48, 2000.
45.
Zurück zum Zitat Paul Resnick and Richard Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. In The Economics of the Internet and E-commerce. Emerald Group Publishing Limited, 2002. Paul Resnick and Richard Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. In The Economics of the Internet and E-commerce. Emerald Group Publishing Limited, 2002.
46.
Zurück zum Zitat Domenico Rosaci, Giuseppe M. L. Sarnè, and Salvatore Garruzzo. Integrating trust measures in multiagent systems. International Journal of Intelligent Systems, 27(1):1–15, 2012. Domenico Rosaci, Giuseppe M. L. Sarnè, and Salvatore Garruzzo. Integrating trust measures in multiagent systems. International Journal of Intelligent Systems, 27(1):1–15, 2012.
47.
Zurück zum Zitat Syed Muhammad Sajjad, Safdar Hussain Bouk, and Muhammad Yousaf. Neighbor node trust based intrusion detection system for WSN. Procedia Computer Science, 63:183–188, 2015. Syed Muhammad Sajjad, Safdar Hussain Bouk, and Muhammad Yousaf. Neighbor node trust based intrusion detection system for WSN. Procedia Computer Science, 63:183–188, 2015.
48.
Zurück zum Zitat Amirali Salehi-Abari and Tony White. Dart: A distributed analysis of reputation and trust framework. Computational Intelligence, 28(4):642–682, 2012.MathSciNetCrossRef Amirali Salehi-Abari and Tony White. Dart: A distributed analysis of reputation and trust framework. Computational Intelligence, 28(4):642–682, 2012.MathSciNetCrossRef
49.
Zurück zum Zitat Claudio Savaglio, Giancarlo Fortino, and Mengchu Zhou. Towards interoperable, cognitive and autonomic iot systems: An agent-based approach. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pages 58–63. IEEE, 2016. Claudio Savaglio, Giancarlo Fortino, and Mengchu Zhou. Towards interoperable, cognitive and autonomic iot systems: An agent-based approach. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), pages 58–63. IEEE, 2016.
50.
Zurück zum Zitat Avani Sharma, Emmanuel S Pilli, Arka P Mazumdar, and Poonam Gera. Towards trustworthy internet of things: A survey on trust management applications and schemes. Computer Communications, 2020. Avani Sharma, Emmanuel S Pilli, Arka P Mazumdar, and Poonam Gera. Towards trustworthy internet of things: A survey on trust management applications and schemes. Computer Communications, 2020.
51.
Zurück zum Zitat Wei She, Qi Liu, Zhao Tian, Jian-Sen Chen, Bo Wang, and Wei Liu. Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access, 7:38947–38956, 2019.CrossRef Wei She, Qi Liu, Zhao Tian, Jian-Sen Chen, Bo Wang, and Wei Liu. Blockchain trust model for malicious node detection in wireless sensor networks. IEEE Access, 7:38947–38956, 2019.CrossRef
52.
Zurück zum Zitat Sokratis Vavilis, Milan Petković, and Nicola Zannone. A reference model for reputation systems. Decision Support Systems, 61:147–154, 2014.CrossRef Sokratis Vavilis, Milan Petković, and Nicola Zannone. A reference model for reputation systems. Decision Support Systems, 61:147–154, 2014.CrossRef
53.
Zurück zum Zitat Tian Wang, Pan Wang, Shaobin Cai, Xi Zheng, Ying Ma, Weijia Jia, and Guojun Wang. Mobile edge-enabled trust evaluation for the internet of things. Information Fusion, 75:90–100, 2021.CrossRef Tian Wang, Pan Wang, Shaobin Cai, Xi Zheng, Ying Ma, Weijia Jia, and Guojun Wang. Mobile edge-enabled trust evaluation for the internet of things. Information Fusion, 75:90–100, 2021.CrossRef
54.
Zurück zum Zitat Yu-Feng Wang, Yoshiaki Hori, and Kouichi Sakurai. Characterizing economic and social properties of trust and reputation systems in p2p environment. Journal of Computer Science and Technology, 23(1):129–140, 2008.CrossRef Yu-Feng Wang, Yoshiaki Hori, and Kouichi Sakurai. Characterizing economic and social properties of trust and reputation systems in p2p environment. Journal of Computer Science and Technology, 23(1):129–140, 2008.CrossRef
55.
Zurück zum Zitat Li Xiong and Ling Liu. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE transactions on Knowledge and Data Engineering, 16(7):843–857, 2004.CrossRef Li Xiong and Ling Liu. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE transactions on Knowledge and Data Engineering, 16(7):843–857, 2004.CrossRef
56.
Zurück zum Zitat Zheng Yan, Peng Zhang, and Athanasios V Vasilakos. A survey on trust management for internet of things. Journal of network and computer applications, 42:120–134, 2014. Zheng Yan, Peng Zhang, and Athanasios V Vasilakos. A survey on trust management for internet of things. Journal of network and computer applications, 42:120–134, 2014.
Metadaten
Titel
Detecting Collusive Agents by Trust Measures in Social IoT Environments: A Novel Reputation Model
verfasst von
Mariantonia Cotronei
Sofia Giuffrè
Attilio Marcianò
Domenico Rosaci
Giuseppe M. L. Sarnè
Copyright-Jahr
2023
DOI
https://doi.org/10.1007/978-3-031-21940-5_3