SOULA, Meriem, Bacem MBAREK, Aref MEDDEB and Tomáš PITNER. A Survey of Intrusion Detection-based Trust Management Approaches in IoT Networks. Online. In Leonard Barolli. International Conference on Advanced Information Networking and Applications (AINA-2023). 37th ed. Brazil: Springer, 2023, p. 504-517. ISBN 978-3-031-28693-3. Available from: https://dx.doi.org/10.1007/978-3-031-28694-0_48.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name A Survey of Intrusion Detection-based Trust Management Approaches in IoT Networks
Authors SOULA, Meriem, Bacem MBAREK (788 Tunisia, belonging to the institution), Aref MEDDEB and Tomáš PITNER (203 Czech Republic, belonging to the institution).
Edition 37. vyd. Brazil, International Conference on Advanced Information Networking and Applications (AINA-2023), p. 504-517, 14 pp. 2023.
Publisher Springer
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Switzerland
Confidentiality degree is not subject to a state or trade secret
Publication form electronic version available online
RIV identification code RIV/00216224:14330/23:00130148
Organization unit Faculty of Informatics
ISBN 978-3-031-28693-3
ISSN 2367-3370
Doi http://dx.doi.org/10.1007/978-3-031-28694-0_48
Keywords in English IoT; Intrusion Detection; Security; Trust
Tags International impact, Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 8/4/2024 16:00.
Abstract
Trust is a primary concern, particularly for the Internet of Things (IoT) applications, where constrained devices should be able to effectively detect attacks based on their trust models. The main purpose of this survey is to summarize outstanding research activities on trust-based Intrusion Detection Systems (IDS) in IoT networks. We first summarize the state-of-the-art of trust approaches in IoT according to the trust assessment method, i.e., behavior analysis and recommendation systems. We then discuss major external and internal threats and enumerate the most likely and potentially dangerous attacks on IoT networks to stimulate research efforts in designing and developing effective and efficient IDS systems. Further, we present the state of the art and new insights into trust-based collaborative IDS systems.
PrintDisplayed: 21/7/2024 09:20