Security in IoT Mesh Networks Based on Trust Similarity.
Kavitha AthotaVijender Busi ReddyNinni SinghVinit Kumar GunjanKuruva LakshmannaArfat Ahmad KhanChitapong WechtaisongPublished in: IEEE Access (2022)
Keyphrases
- security problems
- trust management
- trusted computing
- similarity measure
- security services
- key management
- management system
- trust evaluation
- trust negotiation
- public key infrastructure
- trust relationships
- information security
- security requirements
- policy enforcement
- security issues
- access control
- trust model
- internet banking
- network security
- statistical databases
- security mechanisms
- cloud computing
- security threats
- security policies
- intrusion detection
- euclidean distance
- rfid systems
- virtual communities
- computer security
- similarity function
- security management
- location information
- distance measure
- recommender systems