4.7 Article

Trust management for service migration in Multi-access Edge Computing environments

Related references

Note: Only part of the references are listed.
Article Chemistry, Analytical

A Trust Management Model for IoT Devices and Services Based on the Multi-Criteria Decision-Making Approach and Deep Long Short-Term Memory Technique

Yara Alghofaili et al.

Summary: Internet of Things (IoT) technology has become prevalent in various aspects of life, but it also brings security challenges, with trust management being one of them. This paper proposes a trust management model for IoT devices and services based on SMART and LSTM algorithms, and validates its effectiveness through experiments.

SENSORS (2022)

Article Computer Science, Information Systems

Trust Management for Internet of Things: A Comprehensive Study

Lijun Wei et al.

Summary: The rapid development of IoT technology has brought about a growing focus on trust issues, which include not only security and efficiency, but also aspects such as reliability, attack resistance, fairness, flexibility, and incentive. Research in trust management has made significant progress from framework development to quantification methods.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Computer Science, Information Systems

The convergence and interplay of edge, fog, and cloud in the AI-driven Internet of Things (IoT)

Farshad Firouzi et al.

Summary: The convergence of IoT and Cloud Computing has led to the emergence of cloud IoT, which provides advanced services for aggregating, storing, and processing data generated by IoT. Edge and Fog Computing have addressed the limitations of bandwidth, latency, and connectivity by supporting interaction between cloud and IoT. The hierarchical edge-fog-cloud architecture enables the distribution of intelligence and computation to achieve optimal solutions.

INFORMATION SYSTEMS (2022)

Article Computer Science, Artificial Intelligence

Probabilistic analysis of trust based decision making in hostile environments

Amir Jalaly Bidgoly

Summary: Trust and reputation systems play a crucial role in decision making, but their effectiveness can be compromised in hostile environments with malicious attackers. Most efforts have focused on trust computation models rather than trust-based decision making. This paper discusses the impact of decision-making on the robustness of trust systems and proposes a new trust-based decision-making approach.

KNOWLEDGE-BASED SYSTEMS (2021)

Article Computer Science, Information Systems

A trust evaluation system based on reputation data in Mobile edge computing network

Xiaoheng Deng et al.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2020)

Article Computer Science, Theory & Methods

A Survey on Mobility-Induced Service Migration in the Fog, Edge, and Related Computing Paradigms

Zeineb Rejiba et al.

ACM COMPUTING SURVEYS (2019)

Article Computer Science, Information Systems

Energy-Efficient Fair Cooperation Fog Computing in Mobile Edge Networks for Smart City

Yifan Dong et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain

Mazin Debe et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

A Survey on Service Migration in Mobile Edge Computing

Shangguang Wang et al.

IEEE ACCESS (2018)

Article Computer Science, Artificial Intelligence

IoT-based collaborative reputation system for associating visitors and artworks in a cultural scenario

Salvatore Cuomo et al.

EXPERT SYSTEMS WITH APPLICATIONS (2017)

Article Computer Science, Information Systems

Trust Management for Vehicular Networks : An Adversary-Oriented Overview

Chaker Abdelaziz Kerrache et al.

IEEE ACCESS (2016)

Article Computer Science, Information Systems

AuthenticPeer: A Reputation Management System for Peer-to-Peer Wireless Sensor Networks

Heba Kurdi et al.

INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS (2015)

Proceedings Paper Computer Science, Artificial Intelligence

Smart City Architecture and its Applications based on IoT

Aditya Gaur et al.

6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015) (2015)

Article Computer Science, Theory & Methods

Identification of Malicious Nodes in Peer-to-Peer Streaming: A Belief Propagation-Based Technique

Rossano Gaeta et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Theory & Methods

A Survey of Attack and Defense Techniques for Reputation Systems

Kevin Hoffman et al.

ACM COMPUTING SURVEYS (2009)

Article Computer Science, Hardware & Architecture

Analysis of a reputation system for Mobile Ad-Hoc Networks with liars

Jochen Mundinger et al.

PERFORMANCE EVALUATION (2008)

Article Computer Science, Theory & Methods

A fine-grained reputation system for reliable service selection in peer-to-peer networks

Yanchao Zhang et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2007)

Article Computer Science, Artificial Intelligence

A survey of trust and reputation systems for online service provision

Audun Josang et al.

DECISION SUPPORT SYSTEMS (2007)

Article Computer Science, Hardware & Architecture

Reputation systems

P Resnick et al.

COMMUNICATIONS OF THE ACM (2000)