Javascript must be enabled to continue!
Blockchain-Based Trust and Reputation Management in SIoT
View through CrossRef
In the Social Internet of Things (SIoT), trust refers to the decision-making process used by the trustor (Service Requesters (SRs) or Service Consumers (SCs)) to decide whether or not to entrust the trustee (Service Providers (SPs)) with specific services. Trust is the key factor in SIoT domain. The designing of a two-way, two-stage parameterized feedback-based, service-driven, attacks-resistant trust and reputation system for SIoT accompanied by a penalty mechanism for dishonest SPs and SRs is our main contribution that mitigates the trust-related issues occurring during service provisioning and service acquisition amongst various entities (SPs or SRs) and enhances trust amongst them. Our proposed methodology examines a SP’s local trust, global trust, and reputation by taking into account “Social Trust” and “Quality of Service (QoS)” factors”. Two—Stage Parameterized feedback” is incorporated in our proposed strategy to better manage “intention” and “ability” of SRs and provides early identification of suspicious SRs. This feature compels SRs to act honestly and rate the corresponding SPs in a more accurate way. Our recommended paradigm sorts SPs into three SP status lists (White List, Grey List, and Black List) based on reputation values where each list has a threshold with respect to the maximum service fee that can be charged. SPs in White List charge the most per service. SPs in other lists have a lower selection probability. Every feedback updates the SP’s trust and reputation value. Sorting SPs increases resistance against On Off Attack, Discriminatory Attack, Opportunistic Service Attack, and Selective Behavior Attacks. SPs must operate honestly and offer the complete scope of stated services since their reputation value relies on all their global trust values (Tglobal) for various services. Service requests may be accepted or denied by SPs. “Temporarily banned” SRs can only request unblocked services. SRs lose all privileges once on a “permanently banned” list. If local and global trust values differ by more than the threshold, the SR is banned. Our method also provides resistance against Bad Mouthing Attack, Ballot Stuffing Attack. Good Mouthing Attack/Self—Propagating Attack. Experiments indicate our trust and reputation management system recognizes and bans fraudulent SRs. “Dishonest SPs” are “blacklisted,” which affects their reputation, trust, and service charges.
Title: Blockchain-Based Trust and Reputation Management in SIoT
Description:
In the Social Internet of Things (SIoT), trust refers to the decision-making process used by the trustor (Service Requesters (SRs) or Service Consumers (SCs)) to decide whether or not to entrust the trustee (Service Providers (SPs)) with specific services.
Trust is the key factor in SIoT domain.
The designing of a two-way, two-stage parameterized feedback-based, service-driven, attacks-resistant trust and reputation system for SIoT accompanied by a penalty mechanism for dishonest SPs and SRs is our main contribution that mitigates the trust-related issues occurring during service provisioning and service acquisition amongst various entities (SPs or SRs) and enhances trust amongst them.
Our proposed methodology examines a SP’s local trust, global trust, and reputation by taking into account “Social Trust” and “Quality of Service (QoS)” factors”.
Two—Stage Parameterized feedback” is incorporated in our proposed strategy to better manage “intention” and “ability” of SRs and provides early identification of suspicious SRs.
This feature compels SRs to act honestly and rate the corresponding SPs in a more accurate way.
Our recommended paradigm sorts SPs into three SP status lists (White List, Grey List, and Black List) based on reputation values where each list has a threshold with respect to the maximum service fee that can be charged.
SPs in White List charge the most per service.
SPs in other lists have a lower selection probability.
Every feedback updates the SP’s trust and reputation value.
Sorting SPs increases resistance against On Off Attack, Discriminatory Attack, Opportunistic Service Attack, and Selective Behavior Attacks.
SPs must operate honestly and offer the complete scope of stated services since their reputation value relies on all their global trust values (Tglobal) for various services.
Service requests may be accepted or denied by SPs.
“Temporarily banned” SRs can only request unblocked services.
SRs lose all privileges once on a “permanently banned” list.
If local and global trust values differ by more than the threshold, the SR is banned.
Our method also provides resistance against Bad Mouthing Attack, Ballot Stuffing Attack.
Good Mouthing Attack/Self—Propagating Attack.
Experiments indicate our trust and reputation management system recognizes and bans fraudulent SRs.
“Dishonest SPs” are “blacklisted,” which affects their reputation, trust, and service charges.
Related Results
Applying synthetic radiography to intraoral tomosynthesis: a step towards achieving 3D imaging in the dental clinic
Applying synthetic radiography to intraoral tomosynthesis: a step towards achieving 3D imaging in the dental clinic
Objectives: A practical approach to three-dimensional (3D) intraoral imaging would have many potential applications in clinical dentistry. Stationary intraoral tomosynthesis (sIOT)...
Convergence and representation of blockchain and smart contracts using the semantic web
Convergence and representation of blockchain and smart contracts using the semantic web
The Internet and the World Wide Web were designed with the intention of being decentralised and interoperable, and therefore more democratic, where users have power over their data...
La qualification de la blockchain
La qualification de la blockchain
La création de la blockchain a remis en question les notions traditionnelles de collaboration et d'échange. Cette thèse vise à démontrer que cette innovation n'est pas seulement te...
Social Internet of Things
Social Internet of Things
Internet of things has gathered significance within the latest technology domain and trends. As a result, it offers greater ways of accessing data and utilizing intelligent systems...
Anomaly Detection in Blockchain Using Machine Learning
Anomaly Detection in Blockchain Using Machine Learning
Blockchain technology has gained significant attention as a secure and decentralized platform for various applications. However, the immutable and distributed nature of blockchain ...
Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash
Abstract
This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
ANALYSIS OF BUSINESS REPUTATION’S COMPONENTS OF UKRAINIAN BUSINESS
ANALYSIS OF BUSINESS REPUTATION’S COMPONENTS OF UKRAINIAN BUSINESS
The article analyzes the components of the business reputation of Ukrainian business. The set tasks of the research were as follows: on the basis of the indicated relevance and nee...
ON EDGE CACHING IN SATELLITE — IOT NETWORKS
ON EDGE CACHING IN SATELLITE — IOT NETWORKS
<div>The implementation of the Internet of Things (IoT) is mostly done through cellular networks which do not cover the whole world. In addition, the explosive growth of glob...

