References
- W. Abdelghani, C.A. Zayani, and I. Amous,F. Sedes, "Trust management in social Internet of Things: A Survey, " in Proc. of 15th IFIP Conference on e-Business, e-Services and e-Society, pp. 1-12, 2016.
- N.B. Truong, G.M. Lee, "A reputation and knowledge based trust service platform for trustworthy social Internet of Things," in Proc. of 19th International Conference on Innovations in Clouds, Internet and Networks, pp. 104-111, 2016.
- L. Atzori, A. Iera, G. Morabito, and M. Nitti, "The Social Internet of Things (SIoT) -When social networks meet the Internet of Things: Concept, architecture and network characterization," Computer Networks, vol. 56, no. 16, pp. 3594-3608, November, 2012. https://doi.org/10.1016/j.comnet.2012.07.010
- Ray, B.R., Abawajy, J., Chowdhury, M., "Scalable RFID security framework and protocol supporting Internet of Things," Computer Networks, vol. 67, no. 10, pp. 89-103, 2014. https://doi.org/10.1016/j.comnet.2014.03.023
- C. V. L. Mendoza, J.H..Kleinschmidt, "Mitigating on-off attacks in the Internet of Things using a distributed trust management scheme," International Journal of Distributed Sensor Networks, vol. 11, no. 11, pp. 1-8, 2015.
- Z. Yan, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things," Journal of Network and Computer Applications, vol. 42, pp. 120-134, 2014. https://doi.org/10.1016/j.jnca.2014.01.014
- Guo, J., Chen, R., "A classification of trust computation models for service-oriented internet of things systems," in Proc. of 2015 IEEE International Conference on Services Computing (SCC), pp. 324-331, 2015.
- Xiao, H., Sidhu, N., Christianson, B, "Guarantor and reputation based trust model for social internet of things," in Proc. of International Wireless Communications and Mobile Computing Conference, pp. 600-605, 2015.
- M. D. Alshehri, F. K. Hussain, "A comparative analysis of scalable and context-aware trust management approaches for Internet of Things," in Proc. of 22nd International Conference on Neural Information Processing, pp. 596-605, 2015.
- F. Bao and I.-R. Chen, "Dynamic trust management for internet of things applications," in Proc. of 1st International Workshop on Self-Aware Internet of Things, pp. 1-6, 2012.
- F. Bao and I.-R. Chen, "Trust management for the internet of things and its application to service composition," in Proc. of 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, pp.1-6, 2012.
- N. Labraoui, M. Gueroui, and L. Sekhri, "On-off attacks mitigation against trust systems in wireless sensor networks," in Proc. of 5th IFIP International Conference on Computer Science and Its Applications, vol. 456, pp. 406-415, 2015.
- Y. Chae, L. C. DiPippo, and Y. L. Sun, "Trust management for defending on-off attacks," IEEE Transactions on Parallel and Distributed Systems, vol. 26, no. 4, pp. 1178-1191, 2015. https://doi.org/10.1109/TPDS.2014.2317719
- Y. B. Saied, A. Olivereau, D.Zeghlache and M. Laurent, "Trust management system design for the Internet of Things: A context-aware and multiservice Approach," Computers & Security, Volume 39, Part B, pp.351-365, 2013. https://doi.org/10.1016/j.cose.2013.09.001
- I.R. Chen, F. Bao, and J.Guo, "Trust-based service management for social Internet of Things Systems," IEEE Transactions on Dependable and Secure Computing, vol.13, pp. 684-696, 2016. https://doi.org/10.1109/TDSC.2015.2420552
- F. Ishmanov, S. W. Kim and S. Y. Nam, "A robust trust establishment scheme for Wireless Sensor Networks," Sensors,vol.15, pp. 7040-7061, 2015. https://doi.org/10.3390/s150307040
- M. Jo, V. Odelu, A.K. Das and K.K.R. Choo, "Expressive CP-ABE scheme for mobile devices in IoT satisfying Constant-size Keys and Ciphertexts," IEEE Access, Vol.5, No.1, pp.3273-3283, 2017. https://doi.org/10.1109/ACCESS.2017.2669940
- S. Roy, S. Chatterjee, A.K. Das, S. Chattopadhyay and S. Kumari, "Chaotic map-based anonymous user authentication scheme with user biometrics and fuzzy extractor for crowdsourcing Internet of Things," IEEE Internet of Things Journal, 2017.
- M.Wazid, A.K. Das, M.K. Khan, A.D. Al-Ghaiheb, N. Kumar, "Secure authentication scheme for medicine anti-counterfeiting system in IoT environment," IEEE Internet of Things Journal, Vol. 4, No. 5, pp. 1634-1646, 2017. https://doi.org/10.1109/JIOT.2017.2706752
- S. Challa, M.Wazid, A.K. Das, N. Kumar, A.G. Reddy, "Secure signature-based authenticated key establishment scheme for future IoT applications," IEEE Access, Vol. 5, pp. 3028-3043, 2017. https://doi.org/10.1109/ACCESS.2017.2676119
- S. Kumari, M. Karuppiah, A.K. Das, X. Li, F. Wu, "A secure authentication scheme based on elliptic curve cryptography for IoT andcloud servers," The Journal of Supercomputing, 2017.
- ns3. Available from: Article (CrossRef Link)