1 |
JENSEN C D. The role of trust in computer security[C]// Proceedings of the 10th Annual International Conference on Privacy, Security and Trust. Piscataway: IEEE, 2012: 236-236. 10.1109/pst.2012.6297950
|
2 |
XU X L, LIU X H, XU Z Y, et al. Trust-oriented IoT service placement for smart cities in edge computing [J]. IEEE Internet of Things Journal, 2020, 7(5): 4084-4091. 10.1109/jiot.2019.2959124
|
3 |
邓晓衡,关培源,万志文,等. 基于综合信任的边缘计算资源协同研究[J]. 计算机研究与发展, 2018, 55(3): 449-477. 10.7544/issn1000-1239.2018.20170800
|
|
DENG X H, GUAN P Y, WAN Z W, et al. Integrated trust based resource cooperation in edge computing [J]. Journal of Computer Research and Development, 2018, 55(3): 449-477. 10.7544/issn1000-1239.2018.20170800
|
4 |
CHEN I R, GUO J, WANG D C, et al. Trust-based service management for mobile cloud IoT systems [J]. IEEE Transactions on Network and Service Management, 2019, 16(1): 246-263. 10.1109/tnsm.2018.2886379
|
5 |
任彦冰,李兴华,刘海,等. 基于区块链的分布式物联网信任管理方法研究[J]. 计算机研究与发展, 2018, 55(7): 1462-1478. 10.7544/issn1000-1239.2018.20180073
|
|
REN Y B, LI X H, LIU H, et al. Blockchain-based trust management framework for distributed Internet of Things[J]. Journal of Computer Research and Development, 2018, 55(7): 1462-1478. 10.7544/issn1000-1239.2018.20180073
|
6 |
魏新艳,张琳. 物联网中基于信任的频谱资源分配机制[J]. 计算机工程, 2020, 46(4): 26-32, 39.
|
|
WEI X Y, ZHANG L. Trust-based spectrum resource allocation mechanism in Internet of Things[J]. Computer Engineering, 2020, 46(4): 26-32, 39.
|
7 |
刘文懋,殷丽华,方滨兴,等. 物联网环境下的信任机制研究[J]. 计算机学报, 2012, 35(5): 846-855. 10.3724/sp.j.1016.2012.00846
|
|
LIU W M, YIN L H, FANG B X, et al. A hierarchical trust model for the Internet of Things[J]. Chinese Journal of Computers, 2012, 35(5): 846-855. 10.3724/sp.j.1016.2012.00846
|
8 |
RIAHI SFAR A, NATALIZIO E, CHALLAL Y, et al. A roadmap for security challenges in the Internet of Things[J]. Digital Communications and Networks, 2018, 4(2): 118-137. 10.1016/j.dcan.2017.04.003
|
9 |
CHEN D, CHANG G R, SUN D W, et al. TRM-IoT: a trust management model based on fuzzy reputation for Internet of Things[J]. Computer Science and Information Systems, 2011, 8(4): 1207-1228. 10.2298/csis110303056c
|
10 |
SAIED Y BEN, OLIVEREAU A, ZEGHLACHE D, et al. Trust management system design for the Internet of Things: a context-aware and multi-service approach [J]. Computers and Security, 2013, 39(Pt B): 351-365. 10.1016/j.cose.2013.09.001
|
11 |
KANG K, PANG Z B, XU L D, et al. An interactive trust model for application market of the Internet of Things[J]. IEEE Transactions on Industrial Informatics, 2014, 10(2): 1516-1526. 10.1109/tii.2014.2306799
|
12 |
张光华,杨耀红,张冬雯,等. 物联网中基于信任抗丢包攻击的安全路由机制[J]. 计算机科学, 2019, 46(6): 153-161. 10.11896/j.issn.1002-137X.2019.06.023
|
|
ZHANG G H, YANG Y H, ZHANG D W, et al. Secure routing mechanism based on trust against packet dropping attack in Internet of Things[J]. Computer Science, 2019, 46(6): 153-161. 10.11896/j.issn.1002-137X.2019.06.023
|
13 |
CHEN I R, GUO J, BAO F Y. Trust management for SOA-based IoT and its application to service composition[J]. IEEE Transactions on Services Computing, 2016, 9(3): 482-495. 10.1109/tsc.2014.2365797
|
14 |
CHEN I R, BAO F Y, GUO J. Trust-based service management for social Internet of Things systems [J]. IEEE Transactions on Dependable and Secure Computing, 2016, 13(6): 684-696. 10.1109/tdsc.2015.2420552
|
15 |
刘宴兵,龚雪红,冯艳芬. 基于物联网节点行为检测的信任评估方法[J]. 通信学报, 2014, 35(5): 8-15. 10.3969/j.issn.1000-436x.2014.05.002
|
|
LIU Y B, GONG X H, FENG Y F. Trust system based on node behavior detection in internet of things [J]. Journal on Communications, 2014, 35(5): 8-15. 10.3969/j.issn.1000-436x.2014.05.002
|
16 |
AL-HAMADI H, CHEN I R. Trust-based decision making for health IoT systems [J]. IEEE Internet of Things Journal, 2017, 4(5): 1408-1419. 10.1109/jiot.2017.2736446
|
17 |
张琳,魏新艳,刘茜萍,等. 基于协作信誉和设备反馈的物联网边缘服务器信任评估算法[J]. 通信学报, 2022, 43(2): 118-130. 10.11959/j.issn.1000-436x.2022024
|
|
ZHANG L, WEI X Y, LIU X P, et al. Trust evaluation algorithm of IoT edge server based on cooperation reputation and device feedback [J]. Journal on Communications, 2022, 43(2): 118-130. 10.11959/j.issn.1000-436x.2022024
|
18 |
谢丽霞,魏瑞炘. 物联网节点动态信任度评估方法[J]. 计算机应用, 2019, 39(9): 2597-2603. 10.11772/j.issn.1001-9081.2019020315
|
|
XIE L X, WEI R X. Dynamic trust evaluation method for IoT nodes [J]. Journal of Computer Applications, 2019, 39(9): 2597-2603. 10.11772/j.issn.1001-9081.2019020315
|
19 |
ElSALAMOUNY E, KRUKOW K T, SASSONE V. An analysis of the exponential decay principle in probabilistic trust models [J]. Theoretical Computer Science, 2009, 410(41): 4067-4084. 10.1016/j.tcs.2009.06.011
|
20 |
ADEWUYI A A, CHENG H, SHI Q, et al. CTRUST: a dynamic trust model for collaborative applications in the Internet of Things[J]. IEEE Internet of Things Journal, 2019, 6(3): 5432-5445. 10.1109/jiot.2019.2902022
|
21 |
REDDY V B, NEGI A, VENKATARAMAN S, et al. A similarity based trust model to mitigate badmouthing attacks in Internet of Things (IoT)[C]// Proceedings of IEEE 5th World Forum on Internet of Things. Piscataway: IEEE, 2019:278-282. 10.1109/wf-iot.2019.8767170
|
22 |
GARCIA S, PARMISANO A, ERQUIAGA M J. IoT-23: a labeled dataset with malicious and benign IoT network traffic [DS/OL] . [2022-07-15] ..
|