Please use this identifier to cite or link to this item:
https://hdl.handle.net/11499/47333
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Uğur, Alper | - |
dc.date.accessioned | 2023-01-09T21:23:59Z | - |
dc.date.available | 2023-01-09T21:23:59Z | - |
dc.date.issued | 2021 | - |
dc.identifier.isbn | 9783030774417 | - |
dc.identifier.issn | 2367-3370 | - |
dc.identifier.uri | https://doi.org/10.1007/978-3-030-77442-4_49 | - |
dc.identifier.uri | https://hdl.handle.net/11499/47333 | - |
dc.description | 10th Computer Science Online Conference, CSOC 2021 -- 1 April 2021 through 1 April 2021 -- 262879 | en_US |
dc.description.abstract | Billions of smart devices communicate with each other in the era of IoT. They share data, contribute to make decisions and sense to cooperatively perform business operations. The IoT devices implement social networking paradigms to overcome uncertainty and achieve better results. This enhances Social IoT (SIoT), a relatively new subset of IoT where smart entities form a social network of their own to provide better quality of service. Trust is what holds this social togetherness. There are various trust management protocols for managing trust between IoT entities. They were verified with known trust-related attacks such as self-promoting, bad-mouthing, ballot-stuffing etc. In this work a new trust-related attack called manipulator is introduced. It is based on historical trust consideration mechanism in trust management systems established as a safeguard for known attacks. Manipulator attack takes advantage of systems proactive interception on lack of trust and transform it to a friendly fire by deceiving that non-malicious entities were also in collusion all along. The vulnerable trust management schemes in literature against manipulator attack were discussed as well. © 2021, The Author(s), under exclusive license to Springer Nature Switzerland AG. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Springer Science and Business Media Deutschland GmbH | en_US |
dc.relation.ispartof | Lecture Notes in Networks and Systems | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Manipulator | en_US |
dc.subject | Social IoT | en_US |
dc.subject | Trust | en_US |
dc.subject | Trust management | en_US |
dc.subject | Vulnerability | en_US |
dc.title | Manipulator: A Novel Collusion Attack on Trust Management Systems in Social IoT | en_US |
dc.type | Conference Object | en_US |
dc.identifier.volume | 230 | en_US |
dc.identifier.startpage | 578 | en_US |
dc.identifier.endpage | 592 | en_US |
dc.identifier.doi | 10.1007/978-3-030-77442-4_49 | - |
dc.relation.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
dc.authorscopusid | 35759637400 | - |
dc.identifier.scopus | 2-s2.0-85113361353 | en_US |
dc.identifier.scopusquality | Q4 | - |
item.grantfulltext | none | - |
item.fulltext | No Fulltext | - |
item.cerifentitytype | Publications | - |
item.openairetype | Conference Object | - |
item.openairecristype | http://purl.org/coar/resource_type/c_18cf | - |
item.languageiso639-1 | en | - |
crisitem.author.dept | 10.10. Computer Engineering | - |
Appears in Collections: | Mühendislik Fakültesi Koleksiyonu Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
CORE Recommender
SCOPUSTM
Citations
5
checked on Nov 16, 2024
Page view(s)
88
checked on Aug 24, 2024
Google ScholarTM
Check
Altmetric
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.