21,967 research outputs found
Quality of Information in Mobile Crowdsensing: Survey and Research Challenges
Smartphones have become the most pervasive devices in people's lives, and are
clearly transforming the way we live and perceive technology. Today's
smartphones benefit from almost ubiquitous Internet connectivity and come
equipped with a plethora of inexpensive yet powerful embedded sensors, such as
accelerometer, gyroscope, microphone, and camera. This unique combination has
enabled revolutionary applications based on the mobile crowdsensing paradigm,
such as real-time road traffic monitoring, air and noise pollution, crime
control, and wildlife monitoring, just to name a few. Differently from prior
sensing paradigms, humans are now the primary actors of the sensing process,
since they become fundamental in retrieving reliable and up-to-date information
about the event being monitored. As humans may behave unreliably or
maliciously, assessing and guaranteeing Quality of Information (QoI) becomes
more important than ever. In this paper, we provide a new framework for
defining and enforcing the QoI in mobile crowdsensing, and analyze in depth the
current state-of-the-art on the topic. We also outline novel research
challenges, along with possible directions of future work.Comment: To appear in ACM Transactions on Sensor Networks (TOSN
IoT trust and reputation: a survey and taxonomy
IoT is one of the fastest-growing technologies and it is estimated that more
than a billion devices would be utilized across the globe by the end of 2030.
To maximize the capability of these connected entities, trust and reputation
among IoT entities is essential. Several trust management models have been
proposed in the IoT environment; however, these schemes have not fully
addressed the IoT devices features, such as devices role, device type and its
dynamic behavior in a smart environment. As a result, traditional trust and
reputation models are insufficient to tackle these characteristics and
uncertainty risks while connecting nodes to the network. Whilst continuous
study has been carried out and various articles suggest promising solutions in
constrained environments, research on trust and reputation is still at its
infancy. In this paper, we carry out a comprehensive literature review on
state-of-the-art research on the trust and reputation of IoT devices and
systems. Specifically, we first propose a new structure, namely a new taxonomy,
to organize the trust and reputation models based on the ways trust is managed.
The proposed taxonomy comprises of traditional trust management-based systems
and artificial intelligence-based systems, and combine both the classes which
encourage the existing schemes to adapt these emerging concepts. This
collaboration between the conventional mathematical and the advanced ML models
result in design schemes that are more robust and efficient. Then we drill down
to compare and analyse the methods and applications of these systems based on
community-accepted performance metrics, e.g. scalability, delay,
cooperativeness and efficiency. Finally, built upon the findings of the
analysis, we identify and discuss open research issues and challenges, and
further speculate and point out future research directions.Comment: 20 pages, 5 Figures, 3 tables, Journal of cloud computin
Flow-based reputation: more than just ranking
The last years have seen a growing interest in collaborative systems like
electronic marketplaces and P2P file sharing systems where people are intended
to interact with other people. Those systems, however, are subject to security
and operational risks because of their open and distributed nature. Reputation
systems provide a mechanism to reduce such risks by building trust
relationships among entities and identifying malicious entities. A popular
reputation model is the so called flow-based model. Most existing reputation
systems based on such a model provide only a ranking, without absolute
reputation values; this makes it difficult to determine whether entities are
actually trustworthy or untrustworthy. In addition, those systems ignore a
significant part of the available information; as a consequence, reputation
values may not be accurate. In this paper, we present a flow-based reputation
metric that gives absolute values instead of merely a ranking. Our metric makes
use of all the available information. We study, both analytically and
numerically, the properties of the proposed metric and the effect of attacks on
reputation values
Recommended from our members
Generating citizen trust in e-government using a trust verification agent: A research note
Generating Citizen Trust in e-Government using a Trust Verification AgentThis is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizenâs take-up of online public sector services or engagement with public decision and
policy making. A citizenâs decision to use online systems is influenced by their willingness to trust the environment and agency involved. This project addresses one aspect of individual âtrustâ decisions by
providing support for citizens trying to evaluate the implications of the security infrastructure provided by the agency. Based on studies of the way both groups (citizens and agencies) express their concerns and concepts in the security area, the project will develop a software tool â a trust
verification agent (TVA) - that can take an agencyâs security statements (or security audit) and infer how effectively this meets the security concerns of a particular citizen. This will enable citizens to state
their concerns and obtain an evaluation of the agencyâs provision in appropriate âcitizen friendlyâ language. Further, by employing rule-based expert systems techniques the TVA will also be able to explain its evaluation.Engineering and Physical Sciences Research Council, UK (grant GR/T27020/01
IoT trust and reputation: a survey and taxonomy
IoT is one of the fastest-growing technologies and it is estimated that more
than a billion devices would be utilized across the globe by the end of 2030.
To maximize the capability of these connected entities, trust and reputation
among IoT entities is essential. Several trust management models have been
proposed in the IoT environment; however, these schemes have not fully
addressed the IoT devices features, such as devices role, device type and its
dynamic behavior in a smart environment. As a result, traditional trust and
reputation models are insufficient to tackle these characteristics and
uncertainty risks while connecting nodes to the network. Whilst continuous
study has been carried out and various articles suggest promising solutions in
constrained environments, research on trust and reputation is still at its
infancy. In this paper, we carry out a comprehensive literature review on
state-of-the-art research on the trust and reputation of IoT devices and
systems. Specifically, we first propose a new structure, namely a new taxonomy,
to organize the trust and reputation models based on the ways trust is managed.
The proposed taxonomy comprises of traditional trust management-based systems
and artificial intelligence-based systems, and combine both the classes which
encourage the existing schemes to adapt these emerging concepts. This
collaboration between the conventional mathematical and the advanced ML models
result in design schemes that are more robust and efficient. Then we drill down
to compare and analyse the methods and applications of these systems based on
community-accepted performance metrics, e.g. scalability, delay,
cooperativeness and efficiency. Finally, built upon the findings of the
analysis, we identify and discuss open research issues and challenges, and
further speculate and point out future research directions.Comment: 20 pages, 5 Figures, 3 tables, Journal of cloud computin
Trust beyond reputation: A computational trust model based on stereotypes
Models of computational trust support users in taking decisions. They are
commonly used to guide users' judgements in online auction sites; or to
determine quality of contributions in Web 2.0 sites. However, most existing
systems require historical information about the past behavior of the specific
agent being judged. In contrast, in real life, to anticipate and to predict a
stranger's actions in absence of the knowledge of such behavioral history, we
often use our "instinct"- essentially stereotypes developed from our past
interactions with other "similar" persons. In this paper, we propose
StereoTrust, a computational trust model inspired by stereotypes as used in
real-life. A stereotype contains certain features of agents and an expected
outcome of the transaction. When facing a stranger, an agent derives its trust
by aggregating stereotypes matching the stranger's profile. Since stereotypes
are formed locally, recommendations stem from the trustor's own personal
experiences and perspective. Historical behavioral information, when available,
can be used to refine the analysis. According to our experiments using
Epinions.com dataset, StereoTrust compares favorably with existing trust models
that use different kinds of information and more complete historical
information
Recommended from our members
Generating citizen trust in e-government using a trust verification agent: A research note
Generating Citizen Trust in e-Government using a Trust Verification AgentThis is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizenâs take-up of online public sector services or engagement with public decision and policy making. A citizenâs decision to use online systems is influenced by their willingness to trust the environment and agency involved. This project addresses one aspect of individual âtrustâ decisions by
providing support for citizens trying to evaluate the implications of the security infrastructure provided by the agency. Based on studies of the way both groups (citizens and agencies) express their concerns and concepts in the security area, the project will develop a software tool â a trust
verification agent (TVA) - that can take an agencyâs security statements (or security audit) and infer how effectively this meets the security concerns of a particular citizen. This will enable citizens to state
their concerns and obtain an evaluation of the agencyâs provision in appropriate âcitizen friendlyâ
language. Further, by employing rule-based expert systems techniques the TVA will also be able to explain its evaluation.Engineering and Physical Sciences Research Council-UK (grant GR/T27020/01
A framework for assessing trust in e-government services under uncertain environment
In this study, a novel framework was proposed to assess the trust in e-government (e-Gov) services under an uncertain environment. The proposed framework was applied in Iranian
municipality websites of e-Gov services to evaluate the readiness score of trust in e-Gov services. A unique hybrid research methodology was proposed. In the first phase, a comprehensive set of indices were determined from an extensive literature review and finalized by employing the fuzzy Delphi method. In the second phase, Interval-Valued
Intuitionistic Fuzzy Sets (IVIFS) was utilized to model the problemâs uncertainty with Analytic called IVIFS- Hierarchy Process (AHP) to determine the importance of indices and indicators by assigning the weights. In the third phase, the Fuzzy Evaluation Method (FEM) is followed for assessing the readiness score of indices in case studies. The findings indicated that âTrust in governmentâ is the most significant index affecting citizenâs trust in e-Gov services while âMaintenance and supportâ has the least impact on userâs
intention to use eâGov services. The study is one of the few to indicate significant indices of trust in e-Gov services
in developing countries. The study shows the importance of indicators and indices by assigning a weight. Additionally, the framework can assess the readiness score of various case studies. Research Implications: The study contributes by introducing a unique research methodology that integrates three phases, including Fuzzy Delphi, IVIFS AHP and Fuzzy Evaluation method. Moreover, the Fuzzy sets theory helps to reach a more accurate result by modeling the inherent
ambiguity of indicators and indices. Interval-Valued Intuitionistic Fuzzy models the ambiguity of expertsâ judgments in an interval. The study helps policy makers to monitor wider aspects of trust in e-Gov services as well as understanding their importance. The study enables policy makers to apply the framework to any potential case studies to evaluate the readiness score of indices and recognizing
strengths and weakness of trust dimensions as well as recommending advice for improving the situation
- âŠ