期刊论文详细信息
IEEE Access
Context-Aware Trust and Reputation Model for Fog-Based IoT
Muhammad Azeem Akbar1  Izhar Ahmed Khan1  Huang Zhiqiu1  Zaheer Ullah Khan1  Yasir Hussain1  Asif Nawaz1  Ahmed Alsanad2  Abeer Abdul-Aziz Alsanad3 
[1] College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China;Department of Information Systems, Research Chair of Artificial Intelligence (RCAI), College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia;Information Systems Department, College of Computer and Information Sciences, Imam Muhammad Ibn-Saud Islamic University, Riyadh, Saudi Arabia;
关键词: Fog computing;    internet of things;    edge computing;   
DOI  :  10.1109/ACCESS.2020.2972968
来源: DOAJ
【 摘 要 】

Trust and reputation are important terms whether the communication is Humans-to-Human (H2H), Human-Machine-Interaction (HMI) or Machine-to-Machine (M2M). As Cloud computing and the internet of things (IoT) bring new innovations, they also cause various security and privacy issues. As numerous devices are continuously integrating as a core part of IoT, it is necessarily important to consider various security issues such as the trustworthiness of a user or detection of a malicious user. Moreover, fog computing also known as edge computing is revolutionizing the Cloud-based IoT by providing the Cloud services at the edge of the network, which can provide aid in overcoming security, privacy and trust issues. In this work, we propose a context-aware trust evaluation model to evaluate the trustworthiness of a user in a Fog based IoT (FIoT). The proposed approach uses a context-aware multi-source trust and reputation based evaluation system which helps in evaluating the trustworthiness of a user effectively. Further, we use context-aware feedback and feedback crawler system which helps in making trust evaluation unbiased, effective and reliable. Furthermore, we introduce monitor mode for malicious/untrustworthy users, which helps in monitoring the behavior and trustworthiness of a user. The proposed approach uses several tunable factors, which can be tuned based on the system's requirements. The simulations and results indicate that our approach is effective and reliable to evaluate the trustworthiness of a user.

【 授权许可】

Unknown   

  文献评价指标  
  下载次数:0次 浏览次数:0次