{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T10:20:18Z","timestamp":1776075618722,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T00:00:00Z","timestamp":1631577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2022,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Edge computing is a distributed architecture that features decentralized processing of data near the source\/devices, where data are being generated. These devices are known as Internet of Things (IoT) devices or edge devices. As we continue to rely on IoT devices, the amount of data generated by the IoT devices have increased significantly due to which it has become infeasible to transfer all the data over to the Cloud for processing. Since these devices contain insufficient storage and processing power, it gives rise to the edge computing paradigm. In edge computing data are processed by edge devices and only the required data are sent to the Cloud to increase robustness and decrease overall network overhead. IoT edge devices are inherently suffering from various security risks and attacks causing a lack of trust between devices. To reduce this malicious behavior, a lightweight trust management model is proposed that maintains the trust of a device and manages the service level trust along with quality of service (QoS). The model calculates the overall trust of the devices by using QoS parameters to evaluate the trust of devices through assigned weights. Trust management models using QoS parameters show improved results that can be helpful in identifying malicious edge nodes in edge computing networks and can be used for industrial purposes.<\/jats:p>","DOI":"10.1007\/s40747-021-00518-3","type":"journal-article","created":{"date-parts":[[2021,9,14]],"date-time":"2021-09-14T05:02:46Z","timestamp":1631595766000},"page":"3747-3763","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A novel trust management model for edge computing"],"prefix":"10.1007","volume":"8","author":[{"given":"Rabia","family":"Latif","sequence":"first","affiliation":[]},{"given":"Malik Uzair","family":"Ahmed","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4737-0191","authenticated-orcid":false,"given":"Shahzaib","family":"Tahir","sequence":"additional","affiliation":[]},{"given":"Seemab","family":"Latif","sequence":"additional","affiliation":[]},{"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[]},{"given":"Awais","family":"Ahmad","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,14]]},"reference":[{"issue":"1","key":"518_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.2018.8270624","volume":"32","author":"J Ren","year":"2018","unstructured":"Ren J, Pan, Goscinski A, Beyah RA (2018) Edge computing for the Internet of Things. IEEE Netw 32(1):6\u20137","journal-title":"IEEE Netw"},{"issue":"5","key":"518_CR2","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","volume":"3","author":"W Shi","year":"2016","unstructured":"Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637\u2013646","journal-title":"IEEE Internet Things J"},{"key":"518_CR3","doi-asserted-by":"crossref","unstructured":"Armbrust M, Armando F, Rean G, Anthony DJ, Randy K, Andy K, Gunho L, David P, Ariel, Ion S, Mate z. \u201cA view of cloud computing.\u201d Communications of the ACM 53,no. 4 (2010): 50\u201358","DOI":"10.1145\/1721654.1721672"},{"issue":"1","key":"518_CR4","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2017.9","volume":"50","author":"M Satyanarayanan","year":"2017","unstructured":"Satyanarayanan M (2017) The emergence of edge computing. IEEE Comput Soc 50(1):30\u201339","journal-title":"IEEE Comput Soc"},{"key":"518_CR5","doi-asserted-by":"publisher","first-page":"18209","DOI":"10.1109\/ACCESS.2018.2820162","volume":"6","author":"J Zhang","year":"2018","unstructured":"Zhang J, Chen B, Zhao Y, Cheng X, Hu F (2018) Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6:18209\u201318237","journal-title":"IEEE Access"},{"key":"518_CR6","doi-asserted-by":"publisher","unstructured":"Varghese B, Wang N, Barbhuiya S, Kilpatrick P, Nikolopoulos DS (2016) Challenges and opportunities in edge computing. In: IEEE international conference on smart cloud (SmartCloud), pp 20\u201326. https:\/\/doi.org\/10.1109\/SmartCloud.2016.18","DOI":"10.1109\/SmartCloud.2016.18"},{"key":"518_CR7","doi-asserted-by":"publisher","first-page":"6900","DOI":"10.1109\/ACCESS.2017.2778504","volume":"6","author":"W Yu","year":"2017","unstructured":"Yu W, Liang F, He X, Hatcher WG, Lu C, Lin J, Yang X (2017) A survey on the edge computing for the Internet of Things. IEEE Access 6:6900\u20136919","journal-title":"IEEE Access"},{"issue":"4","key":"518_CR8","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1016\/j.future.2012.06.006","volume":"29","author":"SK Garg","year":"2013","unstructured":"Garg SK, Versteeg S, Buyya R (2013) A framework for ranking of cloud computing services. Future Gener Comput Syst 29(4):1012\u20131023","journal-title":"Future Gener Comput Syst"},{"key":"518_CR9","unstructured":"Beck MT, Maier M (2014) Mobile edge computing: challenges for future virtual network embedding algorithms. In: The eighth international conference on advanced engineering computing and applications in sciences (ADVCOMP), pp 65\u201370"},{"key":"518_CR10","doi-asserted-by":"publisher","unstructured":"Ruan Y, Durresi A, Uslu S (2018) Trust assessment for Internet of Things in multi-access edge computing. In: IEEE 32nd international conference on advanced information networking and applications (AINA), pp 1155\u20131161. https:\/\/doi.org\/10.1109\/AINA.2018.00165","DOI":"10.1109\/AINA.2018.00165"},{"key":"518_CR11","doi-asserted-by":"publisher","unstructured":"Yuan J, Li X (2018) A multi-source feedback based trust calculation mechanism for edge computing. In: IEEE conference on computer communications workshops (INFOCOM WKSHPS), pp 819\u2013824. https:\/\/doi.org\/10.1109\/INFCOMW.2018.8406900","DOI":"10.1109\/INFCOMW.2018.8406900"},{"key":"518_CR12","doi-asserted-by":"publisher","unstructured":"Alsenani Y, Crosby G, Velasco T (2018) Sara: a stochastic model to estimate reliability of edge resources in volunteer cloud. In: IEEE international conference on edge computing (EDGE), pp 121\u2013124. https:\/\/doi.org\/10.1109\/EDGE.2018.00024","DOI":"10.1109\/EDGE.2018.00024"},{"issue":"2","key":"518_CR13","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618\u2013644","journal-title":"Decis Support Syst"},{"issue":"1","key":"518_CR14","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MIC.2017.17","volume":"21","author":"S Pinto","year":"2017","unstructured":"Pinto S, Gomes T, Pereira J, Cabral J, Tavares A (2017) IIoTEED: an enhanced, trusted execution environment for industrial IoT edge devices. IEEE Internet Comput 21(1):40\u201347","journal-title":"IEEE Internet Comput"},{"key":"518_CR15","doi-asserted-by":"publisher","unstructured":"Rehiman KR, Veni S (2017) A trust management model for sensor enabled mobile devices in IoT. In: International conference on I-SMAC (IoT in social, mobile, analytics and cloud)(I-SMAC), pp 807\u2013810. https:\/\/doi.org\/10.1109\/I-SMAC.2017.8058290","DOI":"10.1109\/I-SMAC.2017.8058290"},{"key":"518_CR16","doi-asserted-by":"publisher","unstructured":"Alshehri M.D., Hussain F.K. (2018) A Centralized Trust Management Mechanism for the Internet of Things (CTM-IoT). In: Barolli L., Xhafa F., Conesa J. (eds) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 12. Springer, Cham.pp 533\u2013543. https:\/\/doi.org\/10.1007\/978-3-319-69811-3_48","DOI":"10.1007\/978-3-319-69811-3_48"},{"key":"518_CR17","doi-asserted-by":"publisher","unstructured":"Kim E, Keum C (2017) Trustworthy gateway system providing IoT trust domain of smart home. In: IEEE ninth international conference on ubiquitous and future networks (ICUFN), pp 551\u2013553. https:\/\/doi.org\/10.1109\/ICUFN.2017.7993848","DOI":"10.1109\/ICUFN.2017.7993848"},{"key":"518_CR18","doi-asserted-by":"publisher","unstructured":"Asiri S, Miri A, (2016) An IoT trust and reputation model based on recommender systems. In: 14th Annual conference on privacy, security and trust (PST), pp 561\u2013568. https:\/\/doi.org\/10.1109\/PST.2016.7907017","DOI":"10.1109\/PST.2016.7907017"},{"key":"518_CR19","doi-asserted-by":"publisher","unstructured":"Mendoza CV, Kleinschmidt JH (2016) Defense for selective attacks in the IoT with a distributed trust management scheme. In: IEEE international symposium on consumer electronics (ISCE), pp 53\u201354. https:\/\/doi.org\/10.1109\/ISCE.2016.7797367","DOI":"10.1109\/ISCE.2016.7797367"},{"key":"518_CR20","doi-asserted-by":"publisher","unstructured":"Echeverr\u00eda S, Klinedinst D, Williams K, Lewis GA (2016) Establishing trusted identities in disconnected edge environments. In: IEEE\/ACM symposium on edge computing (SEC), pp 51\u201363. https:\/\/doi.org\/10.1109\/SEC.2016.27","DOI":"10.1109\/SEC.2016.27"},{"key":"518_CR21","doi-asserted-by":"publisher","unstructured":"Sharma A, Pilli ES, Mazumdar AP, Govil MC (2016) A framework to manage trust in internet of things. In: International conference on emerging trends in communication technologies (ETCT), pp 1\u20135. https:\/\/doi.org\/10.1109\/ETCT.2016.7882970","DOI":"10.1109\/ETCT.2016.7882970"},{"key":"518_CR22","doi-asserted-by":"publisher","first-page":"2463","DOI":"10.1109\/ETCT.2016.7882970","volume":"347","author":"JP Wang","year":"2013","unstructured":"Wang JP, Bin S, Yu Y, Niu XX (2013) Distributed trust management mechanism for the internet of things. Trans Tech Publ Appl Mech Mater 347:2463\u20132467. https:\/\/doi.org\/10.1109\/ETCT.2016.7882970","journal-title":"Trans Tech Publ Appl Mech Mater"},{"key":"518_CR23","unstructured":"Kagal L, Finin T, Cost RS, Peng Y (2001) A framework for distributed trust management. In: Second workshop on norms and institutions in multi-agent systems"},{"key":"518_CR24","doi-asserted-by":"publisher","first-page":"012028","DOI":"10.1088\/1742-6596\/1193\/1\/012028","volume":"1193","author":"E Oktavianti","year":"2019","unstructured":"Oktavianti E, Komala N, Nugrahani F (2019) Simple multi attribute rating technique (SMART) method on employee promotions. J Phys Conf Ser 1193:012028. https:\/\/doi.org\/10.1088\/1742-6596\/1193\/1\/012028","journal-title":"J Phys Conf Ser"},{"key":"518_CR25","first-page":"491","volume":"2","author":"Risawandi","year":"2016","unstructured":"Risawandi, Rahim R (2016) Study of the simple multi-attribute rating technique for decision support. Int J Sci Res Sci Technol 2:491\u2013494","journal-title":"Int J Sci Res Sci Technol"},{"key":"518_CR26","unstructured":"Sarwar B, Karypis G, Konstan J, Riedl J (2002) Incremental singular value decomposition algorithms for highly scalable recommender systems. In: Proceedings of the 5th international conference in computers and information technology"},{"key":"518_CR27","doi-asserted-by":"crossref","unstructured":"Mirkovic J, Reiher P, Fahmy S,Thomas R, Hussain A, Schwab S, Ko C (2006) Measuring denial of service, conference on computer and communications security. In: Proceedings of the 2nd ACM workshop on quality of protection, pp 53\u201358","DOI":"10.1145\/1179494.1179506"},{"key":"518_CR28","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s00607-018-0685-7","volume":"101","author":"MD Alshehri","year":"2019","unstructured":"Alshehri MD, Hussain FK (2019) A fuzzy security protocol for trust management in the internet of things (fuzzy-IoT). Computing 101:791\u2013818. https:\/\/doi.org\/10.1007\/s00607-018-0685-7","journal-title":"Computing"},{"key":"518_CR29","doi-asserted-by":"publisher","unstructured":"Alshehri MD, Hussain F, Elkhodr M, Alsinglawi BS (2019) A distributed trust management model for the Internet of Things (DTM-IoT). In: Jan M, Khan F, Alam M (eds) Recent trends and advances in wireless and IoT-enabled networks. EAI\/Springer innovations in communication and computing. Springer, Cham. https:\/\/doi.org\/10.1007\/978-3-319-99966-1","DOI":"10.1007\/978-3-319-99966-1"},{"key":"518_CR30","doi-asserted-by":"publisher","unstructured":"Phemius K, Bouet M (2013) Monitoring latency with OpenFlow. In: Proceedings of the 9th international conference on network and service management (CNSM 2013), 2013, pp 122\u2013125. https:\/\/doi.org\/10.1109\/CNSM.2013.6727820","DOI":"10.1109\/CNSM.2013.6727820"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00518-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00518-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00518-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,27]],"date-time":"2022-09-27T13:43:15Z","timestamp":1664286195000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00518-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,14]]},"references-count":30,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["518"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00518-3","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,14]]},"assertion":[{"value":"31 March 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"On behalf of all authors, the corresponding author states that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}