4.7 Article

Privacy-preserving trust management method based on blockchain for cross-domain industrial IoT

Related references

Note: Only part of the references are listed.
Article Computer Science, Artificial Intelligence

Blockchain based holistic trust management protocol for ubiquitous and pervasive IoT network

Anup Patnaik et al.

Summary: The integration of BC technology and IoT has revolutionized the IoT world, addressing access control issues and enhancing privacy, reliability, and availability.

JOURNAL OF EXPERIMENTAL & THEORETICAL ARTIFICIAL INTELLIGENCE (2023)

Article Automation & Control Systems

Fast Markov Clustering Algorithm Based on Belief Dynamics

Huijia Li et al.

Summary: This paper proposes a new Markov clustering algorithm based on the limit state of the belief dynamics model, which aims to accurately and efficiently detect graph cluster configurations. The algorithm guarantees ideal cluster configuration and has a fast convergence speed, as demonstrated in experiments.

IEEE TRANSACTIONS ON CYBERNETICS (2023)

Article Automation & Control Systems

TRUTH: Trust and Authentication Scheme in 5G-IIoT

Seyed Ahmad Soleymani et al.

Summary: This article presents a cloud-integrated 5G-IIoT network architecture that ensures data security and privacy protection through a three-party authenticated key exchange protocol. It also establishes a trust model based on the Dempster-Shafer theory to verify the trustworthiness of collected data. Security analysis and performance evaluation demonstrate the effectiveness of the proposed scheme.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Automation & Control Systems

TrustBlkSys: A Trusted and Blockchained Cybersecure System for IIoT

Geetanjali Rathee et al.

Summary: Industrial Internet of Things (IIoT) is a new paradigm in the era of smart systems, where interactions and message transmission among entities in an industrial ecosystem are done autonomously. However, the involvement of cybersecurity threats poses a significant risk to organizations. This article proposes an efficient cybersecurity communication mechanism using trust evaluation and blockchain-based monitoring to address the security issues in IIoT applications during data exchange. The proposed approach is validated against an existing scheme using various security metrics.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Article Multidisciplinary Sciences

An efficient sharding consensus algorithm for consortium chains

Xiaoxiong Wu et al.

Summary: This paper proposes a new clustering-based sharding consensus algorithm (KBFT) to ensure that the consortium chain takes into account decentralization, security, and scalability. The KBFT algorithm shards the network nodes using the K-prototype clustering algorithm and reaches consensus in parallel in different shards using disjoint transactions. It also introduces supervision and node credit mechanisms to improve security.

SCIENTIFIC REPORTS (2023)

Article Computer Science, Information Systems

LightTrust: Lightweight Trust Management for Edge Devices in Industrial Internet of Things

Ikram Ud Din et al.

Summary: The increasing usage of the Internet has improved the quality of trust in the Internet of Things (IoT). Trust plays a crucial role in providing a secure environment for users to share private information and enable easy and trustworthy data exchange among IoT devices. Trust management is essential for secure data transmission in a large-scale IoT network, and a lightweight approach called LightTrust is proposed to address security issues in Industrial IoT nodes. LightTrust utilizes a centralized trust agent to generate and manage trust certificates, and direct observations and recommendations are used to develop trust between nodes. Comparative simulations demonstrate the effectiveness and resilience of the proposed approach.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Trust2Vec: Large-Scale IoT Trust Management System Based on Signed Network Embeddings

Sahraoui Dhelim et al.

Summary: Trust Management System (TMS) is crucial in IoT networks to ensure network security, data integrity, and promote legitimate devices while punishing malicious activities. Trust scores assigned by TMSs reflect devices' reputations, which help predict future behaviors and assess reliability in IoT networks. This article proposes Trust2Vec, a TMS for large-scale IoT systems that leverages a random-walk network exploration algorithm and network embeddings community detection algorithm to manage trust relationships and mitigate large-scale trust attacks by malicious devices.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

ST-PBFT: An Optimized PBFT Consensus Algorithm for Intellectual Property Transaction Scenarios

Wang Zhong et al.

Summary: This paper proposes a secure and efficient blockchain-distributed consensus algorithm, ST-PBFT (Shard Transaction Practical Byzantine Fault Tolerance), applied to the IP transaction scenario. It solves the problem of low consensus efficiency in IP transactions caused by consensus nodes simultaneously consensus transactions of the same transaction type.

ELECTRONICS (2023)

Article Computer Science, Information Systems

Multi-Use Trust in Crowdsourced IoT Services

Mohammed Bahutair et al.

Summary: This paper introduces the concept of adaptive trust in crowdsourced IoT services, which is a customized fine-grained trust tailored for specific IoT consumers. Usage patterns of IoT consumers are exploited to provide an accurate trust value for service providers. A novel adaptive trust management framework is proposed to assess the dynamic trust of IoT services. The framework leverages a novel detection algorithm to obtain trust indicators that are likely to influence the trust level of a specific IoT service type.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2023)

Article Computer Science, Information Systems

A Parallel Consensus Mechanism Using PBFT Based on DAG-Lattice Structure in the Internet of Vehicles

Xiaodong Zhang et al.

Summary: This article proposes a parallel consensus mechanism based on the DAG-lattice structure in the Internet of Vehicles (IoV). By using practical Byzantine fault tolerance (PBFT) as the consensus algorithm, this mechanism solves the low efficiency and mobility issues of PBFT by adopting network sharding, while ensuring parallel consensus on transactions. Additionally, the article introduces a primary node selection method based on verifiable random function (VRF) and a transaction selection method based on weighted round robin (WRR) scheduling to motivate nodes and maintain a high reputation score. Experimental results show that the proposed mechanism outperforms comparable schemes in terms of blockchain time, transaction per second (TPS), consensus success rate, and transaction retrieval time, with less dependence on roadside units (RSUs).

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Hardware & Architecture

BLAST-IoT: BLockchain Assisted Scalable Trust in Internet of Things

Avani Sharma et al.

Summary: The Internet of Things enables connectivity between different physical devices, requiring a secure and reliable network system for data interchange and information flow. A trust management system can be embedded to compute and maintain trust values, which are exchanged between devices to assess reputation and facilitate decision-making. This paper presents a blockchain-assisted scalable trust model for secure dissemination and storage of trust information in heterogeneous IoT systems.

COMPUTERS & ELECTRICAL ENGINEERING (2023)

Article Computer Science, Information Systems

Blockchain-based trust management for verifiable time synchronization service in IoT

Kai Fan et al.

Summary: With the rapid development of IoT, time synchronization in IoT systems has become crucial. This paper proposes a distributed and verifiable time synchronization scheme based on NTP, trust management, and blockchain. It utilizes a public and verifiable blockchain to identify incorrect time synchronization and employs a consensus mechanism based on trust management to resist Byzantine nodes.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2022)

Article Computer Science, Information Systems

Multi-Perspective Trust Management Framework for Crowdsourced IoT Services

Mohammed Bahutair et al.

Summary: This study proposes a novel generic trust management framework for crowdsourced IoT services, which uses a multi-perspective trust model to capture their inherent characteristics and generates a trust model through a machine learning algorithm.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2022)

Article Computer Science, Information Systems

Dynamic Access Control and Trust Management for Blockchain-Empowered IoT

Peng Wang et al.

Summary: This article proposes a dynamic and lightweight attribute-based access control framework for blockchain-empowered IoT, which achieves secure and fine-grained authorization. The access policy is executed through smart contract in blockchain, and a decentralized application-based framework is designed to adapt to delay-intolerant applications.

IEEE INTERNET OF THINGS JOURNAL (2022)

Article Mathematics, Interdisciplinary Applications

Evolutionary prisoner’s dilemma game on signed networks based on structural balance theory

Shenpeng Song et al.

CHAOS SOLITONS & FRACTALS (2022)

Article Automation & Control Systems

An Edge Intelligent Blockchain-Based Reputation System for IIoT Data Ecosystem

Seyednima Khezr et al.

Summary: Industrial Internet of Things (IIoT) devices generate massive amounts of data, and there is a need for an edge intelligent blockchain-based reputation system to enable data trading. Existing systems have a single point of failure and lack performance evaluation. This article proposes a blockchain-based reputation system that enhances the consensus mechanism to avoid failures and provides extensive security analysis and simulation experiments to evaluate its performance.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2022)

Article Computer Science, Artificial Intelligence

Characterizing the fuzzy community structure in link graph via the likelihood optimization

Hui-Jia Li et al.

Summary: This paper introduces a new fuzzy community detection method that maps the link community structure to the optimal state by maximizing the likelihood function. By defining a posteriori probability likelihood function for the link graph and analyzing the stability of community structures through spectral analysis, the optimal number of network communities is identified. Extensive experiments show that the algorithm consistently achieves higher accuracy than classical methods.

NEUROCOMPUTING (2022)

Article Chemistry, Analytical

A Blockchain-Based Trust Model for the Internet of Things Supply Chain Management

Mabrook S. Al-Rakhami et al.

Summary: Accurate data and strategic business processes are crucial in a supply chain system, but lack of mutual trust can be a barrier. Blockchain technology can enhance trust among parties and improve security and efficiency of data sharing. Additionally, IoT-optimized blockchain can reduce delays and computational requirements.

SENSORS (2021)

Article Computer Science, Information Systems

A hybrid trust management framework for a multi-service social IoT network

Nishit Narang et al.

Summary: Social IoT (SIoT) is an alternative architectural pattern for IoT that utilizes social collaboration for low-latency services, with trust management being a key challenge. The proposed hybrid trust management framework uses Probabilistic Neighbourhood Overlap method, combining human intelligence and device artificial intelligence to handle various attack scenarios effectively.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Hardware & Architecture

An Integrated Framework for Privacy-Preserving Based Anomaly Detection for Cyber-Physical Systems

Marwa Keshk et al.

Summary: The paper introduces a new privacy-preserving anomaly detection framework called PPAD-CPS, which protects confidential information and detects malicious observations in power systems and their network traffic. Experimental results show that the framework is more effective than four recent techniques and outperforms seven peer anomaly detection techniques in terms of detection rate, false positive rate, and computational time.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2021)

Article Computer Science, Artificial Intelligence

Dynamic distributed trust management scheme for the Internet of Things

Syed Wasif Abbas Hamdani et al.

Summary: The Internet of Things is vulnerable to various attacks, with static trust management techniques struggling to identify malicious nodes. A proposed dynamic trust management scheme shows improved performance in detecting and isolating compromised nodes.

TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES (2021)

Article Automation & Control Systems

Blockchain Meets Edge Computing: A Distributed and Trusted Authentication System

Shaoyong Guo et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Engineering, Electrical & Electronic

Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT

Meng Shen et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Differential Privacy Techniques for Cyber Physical Systems: A Survey

Muneeb Ul Hassan et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2020)

Article Computer Science, Theory & Methods

Federated Learning With Differential Privacy: Algorithms and Performance Analysis

Kang Wei et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2020)

Article Computer Science, Hardware & Architecture

Trust models of internet of smart things: A survey, open issues, and future directions

Ayesha Altaf et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2019)

Article Telecommunications

Trust Management Mechanism for Internet of Things

Gu Lize et al.

CHINA COMMUNICATIONS (2014)