Please use this identifier to cite or link to this item: https://hdl.handle.net/11499/47333
Full metadata record
DC FieldValueLanguage
dc.contributor.authorUğur, Alper-
dc.date.accessioned2023-01-09T21:23:59Z-
dc.date.available2023-01-09T21:23:59Z-
dc.date.issued2021-
dc.identifier.isbn9783030774417-
dc.identifier.issn2367-3370-
dc.identifier.urihttps://doi.org/10.1007/978-3-030-77442-4_49-
dc.identifier.urihttps://hdl.handle.net/11499/47333-
dc.description10th Computer Science Online Conference, CSOC 2021 -- 1 April 2021 through 1 April 2021 -- 262879en_US
dc.description.abstractBillions of smart devices communicate with each other in the era of IoT. They share data, contribute to make decisions and sense to cooperatively perform business operations. The IoT devices implement social networking paradigms to overcome uncertainty and achieve better results. This enhances Social IoT (SIoT), a relatively new subset of IoT where smart entities form a social network of their own to provide better quality of service. Trust is what holds this social togetherness. There are various trust management protocols for managing trust between IoT entities. They were verified with known trust-related attacks such as self-promoting, bad-mouthing, ballot-stuffing etc. In this work a new trust-related attack called manipulator is introduced. It is based on historical trust consideration mechanism in trust management systems established as a safeguard for known attacks. Manipulator attack takes advantage of systems proactive interception on lack of trust and transform it to a friendly fire by deceiving that non-malicious entities were also in collusion all along. The vulnerable trust management schemes in literature against manipulator attack were discussed as well. © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG.en_US
dc.language.isoenen_US
dc.publisherSpringer Science and Business Media Deutschland GmbHen_US
dc.relation.ispartofLecture Notes in Networks and Systemsen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectManipulatoren_US
dc.subjectSocial IoTen_US
dc.subjectTrusten_US
dc.subjectTrust managementen_US
dc.subjectVulnerabilityen_US
dc.titleManipulator: A Novel Collusion Attack on Trust Management Systems in Social IoTen_US
dc.typeConference Objecten_US
dc.identifier.volume230en_US
dc.identifier.startpage578en_US
dc.identifier.endpage592en_US
dc.identifier.doi10.1007/978-3-030-77442-4_49-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.authorscopusid35759637400-
dc.identifier.scopus2-s2.0-85113361353en_US
dc.identifier.scopusqualityQ4-
item.grantfulltextnone-
item.fulltextNo Fulltext-
item.cerifentitytypePublications-
item.openairetypeConference Object-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.languageiso639-1en-
crisitem.author.dept10.10. Computer Engineering-
Appears in Collections:Mühendislik Fakültesi Koleksiyonu
Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Show simple item record



CORE Recommender

SCOPUSTM   
Citations

5
checked on Nov 16, 2024

Page view(s)

88
checked on Aug 24, 2024

Google ScholarTM

Check




Altmetric


Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.