Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

Comparative study of trust and reputation systems for wireless sensor networks

O Khalid, SU Khan, SA Madani, K Hayat… - Security and …, 2013 - Wiley Online Library
Wireless sensor networks (WSNs) are emerging as useful technology for information
extraction from the surrounding environment by using numerous small‐sized sensor nodes …

A survey of multi-agent trust management systems

H Yu, Z Shen, C Leung, C Miao, VR Lesser - IEEE Access, 2013 - ieeexplore.ieee.org
In open and dynamic multiagent systems (MASs), agents often need to rely on resources or
services provided by other agents to accomplish their goals. During this process, agents are …

A survey of trust and reputation management systems in wireless communications

H Yu, Z Shen, C Miao, C Leung… - Proceedings of the …, 2010 - ieeexplore.ieee.org
Trust is an important concept in human interactions which facilitates the formation and
continued existence of functional human societies. In the first decade of the 21st century …

A reputation-based trust evaluation model in group decision-making framework

X You, F Hou, F Chiclana - Information Fusion, 2024 - Elsevier
In group decision-making (GDM) problems, experts need to communicate and adjust their
opinions in order to achieve consensus on the final decision-making output. Since experts …

Security of online reputation systems: The evolution of attacks and defenses

Y Sun, Y Liu - IEEE Signal Processing Magazine, 2012 - ieeexplore.ieee.org
The Internet has created vast opportunities to interact with strangers. The interactions can be
fun, informative, and even profitable [1]. However, there is also risk involved. Will an eBay …

A trust computed framework for IoT devices and fog computing environment

G Rathee, R Sandhu, H Saini, M Sivaram… - Wireless …, 2020 - Springer
In this paper, we have demoralized the transmission processing concerns of fog nodes and
IoT device layer attack during the handoff (mobility) of IoT devices in the fog environment. A …

[PDF][PDF] A fuzzy logic based reputation model against unfair ratings

S Liu, H Yu, C Miao, AC Kot - Proceedings of the 2013 …, 2013 - aamas.csc.liv.ac.uk
Reputation systems have become more and more important in facilitating transactions in
online systems. However, the accuracy of reputation systems has always been a concern for …

A risk-aware reputation-based trust management in wireless sensor networks

N Labraoui, M Gueroui, L Sekhri - Wireless Personal Communications, 2016 - Springer
Wireless sensor networks (WSNs) are susceptible to many security threats and are
specifically prone to physical node capture in which the adversary can easily launch the so …

Filtering trust opinions through reinforcement learning

H Yu, Z Shen, C Miao, B An, C Leung - Decision Support Systems, 2014 - Elsevier
In open online communities such as e-commerce, participants need to rely on services
provided by others in order to thrive. Accurately estimating the trustworthiness of a potential …