{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:19:59Z","timestamp":1750220399875,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T00:00:00Z","timestamp":1637884800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,26]]},"DOI":"10.1145\/3503047.3503076","type":"proceedings-article","created":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T23:32:51Z","timestamp":1642635171000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Survey of Trust Management on Mission-oriented Internet of Things"],"prefix":"10.1145","author":[{"given":"Youna","family":"Jung","sequence":"first","affiliation":[{"name":"Computer and Information Sciences, Virginia Military Institute, US"}]},{"given":"Noah","family":"Goldsmith","sequence":"additional","affiliation":[{"name":"Computer and Information Sciences, Virginia Military Institute, US"}]},{"given":"John","family":"Barker","sequence":"additional","affiliation":[{"name":"Computer and Information Sciences, Virginia Military Institute, US"}]}],"member":"320","published-online":{"date-parts":[[2022,1,19]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"45 Fascinating IoT Statistics for 2021: The State of the Industry. Retrieved","author":"Jovanovi\u0107 Bojan","year":"2021","unstructured":"Bojan Jovanovi\u0107 . 2021. 45 Fascinating IoT Statistics for 2021: The State of the Industry. Retrieved April 2021 from https:\/\/dataprot.net\/statistics\/iot-statistics\/ Bojan Jovanovi\u0107. 2021. 45 Fascinating IoT Statistics for 2021: The State of the Industry. Retrieved April 2021 from https:\/\/dataprot.net\/statistics\/iot-statistics\/"},{"key":"e_1_3_2_1_2_1","volume-title":"Bio-inspired Collaboration Schemes and Cyber Security. Nature-inspired Cyber Security and Resilience: Fundamentals, Technology and Applications. (April","author":"Jung Youna","year":"2019","unstructured":"Youna Jung . 2019. Chapter 3. Bio-inspired Collaboration Schemes and Cyber Security. Nature-inspired Cyber Security and Resilience: Fundamentals, Technology and Applications. (April 2019 ), 51-74. https:\/\/doi.org\/10.1049\/PBSE010E 10.1049\/PBSE010E Youna Jung. 2019. Chapter 3. Bio-inspired Collaboration Schemes and Cyber Security. Nature-inspired Cyber Security and Resilience: Fundamentals, Technology and Applications. (April 2019), 51-74. https:\/\/doi.org\/10.1049\/PBSE010E"},{"key":"e_1_3_2_1_3_1","first-page":"603","volume-title":"21st International Conference on Information Integration and Web-based Applications and Services. ACM, (December","author":"Jung Youna","year":"2019","unstructured":"Youna Jung and Aaron Causey . 2019 . HyDRS-WoT: Community-oriented Hybrid Disaster Response System using Web of Things . 21st International Conference on Information Integration and Web-based Applications and Services. ACM, (December 2019), 603 - 606 Youna Jung and Aaron Causey. 2019. HyDRS-WoT: Community-oriented Hybrid Disaster Response System using Web of Things. 21st International Conference on Information Integration and Web-based Applications and Services. ACM, (December 2019), 603-606"},{"key":"e_1_3_2_1_4_1","article-title":"IoT Middleware: A Survey on Issues and Enabling Technologies","volume":"4","author":"Ngu Anne H.","year":"2016","unstructured":"Anne H. Ngu , Mario Gutierrez , Vangelis Metsis , Surya Nepal , and Quan Z. Sheng . 2016 . IoT Middleware: A Survey on Issues and Enabling Technologies . IEEE Internet of Things Journal , 4 , 1, (February 2017), 1-20. https:\/\/doi.org\/10.1109\/JIOT.2016.2615180 10.1109\/JIOT.2016.2615180 Anne H. Ngu, Mario Gutierrez, Vangelis Metsis, Surya Nepal, and Quan Z. Sheng. 2016. IoT Middleware: A Survey on Issues and Enabling Technologies. IEEE Internet of Things Journal, 4, 1, (February 2017), 1-20. https:\/\/doi.org\/10.1109\/JIOT.2016.2615180","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_1_5_1","volume-title":"Trust Management Techniques for the Internet of Things: A Survey","author":"Din Ikram Ud","year":"2018","unstructured":"Ikram Ud Din , Mohsen Guizani , Byung-Seo Kim , Suhaidi Hassan , and Muhammad Khurram Khan . 2018. Trust Management Techniques for the Internet of Things: A Survey . IEEE Access , 7, ( November 2018 ), 29763-29787. https:\/\/doi.org\/10.1109\/ACCESS.2018.2880838 10.1109\/ACCESS.2018.2880838 Ikram Ud Din, Mohsen Guizani, Byung-Seo Kim, Suhaidi Hassan, and Muhammad Khurram Khan. 2018. Trust Management Techniques for the Internet of Things: A Survey. IEEE Access, 7, (November 2018), 29763-29787. https:\/\/doi.org\/10.1109\/ACCESS.2018.2880838"},{"volume-title":"Fixed: Trust Relationship Between Workstation & Domain Failed","year":"2020","key":"e_1_3_2_1_6_1","unstructured":"Amanda. Fixed: Trust Relationship Between Workstation & Domain Failed . 2020 . MiniTool. Retrieved April 2021 from www.partitionwizard.com\/partitionmanager\/trust-relationship-failed.html. Amanda. Fixed: Trust Relationship Between Workstation & Domain Failed. 2020. MiniTool. Retrieved April 2021 from www.partitionwizard.com\/partitionmanager\/trust-relationship-failed.html."},{"key":"e_1_3_2_1_7_1","volume-title":"Danna Gabel O'Rourke, and Karen Scarfone","author":"Boeckl Kaitlin","year":"2019","unstructured":"Kaitlin Boeckl , Michael Fagan , William Fisher , Naomi Lefkovitz , Katerina Megas , Ellen Nadeau , Ben Piccarreta , Danna Gabel O'Rourke, and Karen Scarfone . 2019 . Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks. National Institute of Standards and Technology Interagency or Internal Report 8228. (June 2019), 1-34. https:\/\/doi.org\/10.6028\/NIST.IR.8228. 10.6028\/NIST.IR.8228 Kaitlin Boeckl, Michael Fagan, William Fisher, Naomi Lefkovitz, Katerina Megas, Ellen Nadeau, Ben Piccarreta, Danna Gabel O'Rourke, and Karen Scarfone. 2019. Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks. National Institute of Standards and Technology Interagency or Internal Report 8228. (June 2019), 1-34. https:\/\/doi.org\/10.6028\/NIST.IR.8228."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2378023.2378025"},{"key":"e_1_3_2_1_10_1","volume-title":"Trust Management for SOA-Based IoT and Its Application to Service Composition","author":"Ray-Chen Ing","year":"2016","unstructured":"Ing Ray-Chen , Jia Guo , and Fenye Bao . Trust Management for SOA-Based IoT and Its Application to Service Composition . IEEE Transactions of Service Computing 9, 3, (May-June 2016 ), 482-495. https:\/\/doi.org\/10.1109\/TSC.2014.2365797. 10.1109\/TSC.2014.2365797 Ing Ray-Chen, Jia Guo, and Fenye Bao. Trust Management for SOA-Based IoT and Its Application to Service Composition. IEEE Transactions of Service Computing 9, 3, (May-June 2016), 482-495. https:\/\/doi.org\/10.1109\/TSC.2014.2365797."},{"key":"e_1_3_2_1_11_1","first-page":"1","volume-title":"Computer Communications 97","author":"Guo Jia","year":"2017","unstructured":"Jia Guo , Ing-Ray Chen , Jeffrey, and J.P. Tsai . 2017. A survey of trust computation models for service management in internet of things systems . Computer Communications 97 , ( January 2017 ), 1 - 14 . https:\/\/doi.org\/10.1016\/j.comcom.2016.10.012. 10.1016\/j.comcom.2016.10.012 Jia Guo, Ing-Ray Chen, Jeffrey, and J.P. Tsai. 2017. A survey of trust computation models for service management in internet of things systems. Computer Communications 97, (January 2017), 1-14. https:\/\/doi.org\/10.1016\/j.comcom.2016.10.012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.02.005"},{"key":"e_1_3_2_1_13_1","first-page":"444","volume-title":"Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE","author":"Chen Ing-Ray","unstructured":"Ing-Ray Chen , Jia Guo , and F. Bao . 2014. Trust management for service composition in SOA-based IoT systems . In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE , Istanbul, Turkey , 444 - 3449 . Ing-Ray Chen, Jia Guo, and F. Bao. 2014. Trust management for service composition in SOA-based IoT systems. In Proceedings of the 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, Istanbul, Turkey, 444-3449."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247581"},{"key":"e_1_3_2_1_15_1","first-page":"552","article-title":"Lightweight Trust Design for IoT Routing. In Proceedings of 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress. IEEE, Auckland","author":"Airehrour David","year":"2016","unstructured":"David Airehrour , Jairo Gutierrez , and Sayan Kumar Ray . 2016 . Lightweight Trust Design for IoT Routing. In Proceedings of 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress. IEEE, Auckland , New Zealand , 552 - 557 . David Airehrour, Jairo Gutierrez, and Sayan Kumar Ray. 2016. Lightweight Trust Design for IoT Routing. In Proceedings of 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress. IEEE, Auckland, New Zealand, 552-557.","journal-title":"New Zealand"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.07.207"},{"key":"e_1_3_2_1_17_1","article-title":"A Prospect Theoretic Approach for Trust Management in IoT Networks under Manipulation Attacks","volume":"16","author":"Salimitari Mehrdad","year":"2020","unstructured":"Mehrdad Salimitari , Shameek Bhattacharjee , Mainak Chatterjee , Yaser P. Fallah . 2020 . A Prospect Theoretic Approach for Trust Management in IoT Networks under Manipulation Attacks . ACM Transactions on Senor Networks 16 , 3, (August 2020), 1-26. Mehrdad Salimitari, Shameek Bhattacharjee, Mainak Chatterjee, Yaser P. Fallah. 2020. A Prospect Theoretic Approach for Trust Management in IoT Networks under Manipulation Attacks. ACM Transactions on Senor Networks 16, 3, (August 2020), 1-26.","journal-title":"ACM Transactions on Senor Networks"},{"key":"e_1_3_2_1_18_1","first-page":"183","volume-title":"Proceedings of 2017 International Workshop on Electromagnetics: Applications and Student Innovation Competition. IEEE","author":"Liu Yu","year":"2017","unstructured":"Yu Liu , Kin-Fai Tong , Xiandong Qiu , Ying Liu , and Xuyang Ding . 2017 . Wireless Mesh Networks in IoT Networks . In Proceedings of 2017 International Workshop on Electromagnetics: Applications and Student Innovation Competition. IEEE , London, UK , 183 - 185 . Yu Liu, Kin-Fai Tong, Xiandong Qiu, Ying Liu, and Xuyang Ding. 2017. Wireless Mesh Networks in IoT Networks. In Proceedings of 2017 International Workshop on Electromagnetics: Applications and Student Innovation Competition. IEEE, London, UK, 183-185."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831898"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3011141.3011148"},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"IEEE Journals & Magazine, (June","author":"Moinet Axel","year":"2017","unstructured":"Axel Moinet , Benoit Darties , and Jean-Luc Baril . 2017 . Blockchain Based Trust & Authentication for Decentralized Sensor Networks . IEEE Journals & Magazine, (June 2017), 1 - 6 . Axel Moinet, Benoit Darties, and Jean-Luc Baril. 2017. Blockchain Based Trust & Authentication for Decentralized Sensor Networks. IEEE Journals & Magazine, (June 2017), 1-6."},{"key":"e_1_3_2_1_23_1","volume-title":"Habib","author":"Alexopoulos Nikolaos","year":"2017","unstructured":"Nikolaos Alexopoulos , J\u00f6rg Daubert , Max M\u00fchlh\u00e4user , and Sheikh M . Habib . 2017 . Beyond the Hype : On Using Blockchains in Trust Management for Authentication. In Proceedings of 2017 IEEE Trustcom\/BigDataSE\/ICESS. IEEE Sydney, Australia , 546-553. Nikolaos Alexopoulos, J\u00f6rg Daubert, Max M\u00fchlh\u00e4user, and Sheikh M. Habib. 2017. Beyond the Hype: On Using Blockchains in Trust Management for Authentication. In Proceedings of 2017 IEEE Trustcom\/BigDataSE\/ICESS. IEEE Sydney, Australia, 546-553."},{"key":"e_1_3_2_1_24_1","volume-title":"Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context. Wireless Personal Communications 61, 3, (December","author":"K\u00f8ien Geir M.","year":"2011","unstructured":"Geir M. K\u00f8ien . 2011. Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context. Wireless Personal Communications 61, 3, (December 2011 ), 495\u2013510. http:\/\/dx.doi.org\/10.1007\/s11277-011-0386-4. 10.1007\/s11277-011-0386-4 Geir M. K\u00f8ien. 2011. Reflections on Trust in Devices: An Informal Survey of Human Trust in an Internet-of-Things Context. Wireless Personal Communications 61, 3, (December 2011), 495\u2013510. http:\/\/dx.doi.org\/10.1007\/s11277-011-0386-4."}],"event":{"name":"AISS 2021: 2021 3rd International Conference on Advanced Information Science and System","acronym":"AISS 2021","location":"Sanya China"},"container-title":["Proceedings of the 3rd International Conference on Advanced Information Science and System"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503047.3503076","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3503047.3503076","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:49Z","timestamp":1750191529000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3503047.3503076"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,26]]},"references-count":24,"alternative-id":["10.1145\/3503047.3503076","10.1145\/3503047"],"URL":"https:\/\/doi.org\/10.1145\/3503047.3503076","relation":{},"subject":[],"published":{"date-parts":[[2021,11,26]]},"assertion":[{"value":"2022-01-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}