{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T00:50:03Z","timestamp":1777683003717,"version":"3.51.4"},"reference-count":30,"publisher":"SAGE Publications","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JHS"],"published-print":{"date-parts":[[2024,10,15]]},"abstract":"<jats:p>The Internet of Things (IoT) necessitates secure communication and high availability among objects at the network edge to ensure reliable object-to-object transactions. In the IoT networks, despite resource limitations, especially at the edge of the network, the potential for error is high. Therefore, a mechanism to increase the reliability, lifetime, and stability of the network is necessary. In this paper, we introduce a trust evaluation framework based on a reliability-based friendly relationship method in IoT networks. We present a conceptual trust model that captures the overall performance of the IoT social network based on parameters such as nodes\u2019 communication history experiences. Trust in the IoT network is built upon a harmonious communication environment that aligns with the trustworthiness of each object and its ability to maintain continuous interactions. We propose an empirical Trust Indicator (TI) that captures individual agents\u2019 experiences in IoT groups, considering the results of system executions, current experience values, and timestamps of interactions. Mathematical models are developed to analyze the dynamics of trust, including trust increase through increased reliability and collaborative interactions and trust decay due to non-cooperative interactions and lack of communication. The model parameters in IoT groups through simulation show that in this system based on the level of reliability and its increase or decrease, its direct effect can be evaluated by quantitative measurement of mean time to failure (MTTF), which is a measure of devices trust and the network itself.<\/jats:p>","DOI":"10.3233\/jhs-240037","type":"journal-article","created":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T11:29:41Z","timestamp":1724412581000},"page":"639-655","source":"Crossref","is-referenced-by-count":1,"title":["A trust-aware model based on reliability-based friendly relationship method in IoT networks"],"prefix":"10.1177","volume":"30","author":[{"given":"Jinsong","family":"Yang","sequence":"first","affiliation":[{"name":"Zhongshan Power Supply Bureau of Guangdong Power Grid Co., Ltd, Zhongshan, 528400, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Yuanchao","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Electrical and Electronic Engineering, Shandong University of Technology, Zibo, 255000, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xing","family":"Xiao","sequence":"additional","affiliation":[{"name":"Zhongshan Power Supply Bureau of Guangdong Power Grid Co., Ltd, Zhongshan, 528400, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chenxu","family":"Meng","sequence":"additional","affiliation":[{"name":"Zhongshan Power Supply Bureau of Guangdong Power Grid Co., Ltd, Zhongshan, 528400, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lingcheng","family":"Zeng","sequence":"additional","affiliation":[{"name":"Zhongshan Power Supply Bureau of Guangdong Power Grid Co., Ltd, Zhongshan, 528400, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xinhai","family":"Li","sequence":"additional","affiliation":[{"name":"Zhongshan Power Supply Bureau of Guangdong Power Grid Co., Ltd, Zhongshan, 528400, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"179","reference":[{"key":"10.3233\/JHS-240037_ref1","unstructured":"M.\u00a0Abadi et al., TensorFlow: A system for large-scale machine learning, in: Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, USENIX Association, Savannah, GA, USA, 2016, pp.\u00a0265\u2013283."},{"key":"10.3233\/JHS-240037_ref3","unstructured":"B.\u00a0Alcalde et al., Towards a decision model based on trust and security risk management, in: Proceedings of the Seventh Australasian Conference on Information Security, Vol.\u00a098, Australian Computer Society, Inc., Wellington, New Zealand, 2009, pp.\u00a061\u201370."},{"issue":"2","key":"10.3233\/JHS-240037_ref4","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11633-019-1214-7","article-title":"Hidden Markov model approach for software reliability estimation with logic error","volume":"17","author":"Bharathi","year":"2020","journal-title":"International Journal of Automation and Computing"},{"key":"10.3233\/JHS-240037_ref5","unstructured":"T.\u00a0Chen et al., LAG: Lazily aggregated gradient for communication-efficient distributed learning, in: Proceedings of the 32nd International Conference on Neural Information Processing Systems, Curran Associates Inc., Montr\u00e9al, Canada, 2018, pp.\u00a05055\u20135065."},{"issue":"10","key":"10.3233\/JHS-240037_ref6","doi-asserted-by":"publisher","first-page":"4229","DOI":"10.1109\/TNNLS.2019.2953131","article-title":"Communication-efficient federated deep learning with layerwise asynchronous model update and temporally weighted aggregation","volume":"31","author":"Chen","year":"2020","journal-title":"IEEE Transactions on Neural Networks and Learning Systems"},{"issue":"1","key":"10.3233\/JHS-240037_ref7","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.tics.2017.10.004","article-title":"The anatomy of friendship","volume":"22","author":"Dunbar","year":"2018","journal-title":"Trends in Cognitive Sciences"},{"key":"10.3233\/JHS-240037_ref8","unstructured":"D.\u00a0Gambetta, Trust: Making and Breaking Cooperative Relations, Basil Blackwell, New York, NY, USA, 1988."},{"issue":"4","key":"10.3233\/JHS-240037_ref9","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2000.5340804","article-title":"A survey of trust in internet applications","volume":"3","author":"Grandison","year":"2000","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"10.3233\/JHS-240037_ref10","doi-asserted-by":"crossref","unstructured":"T.\u00a0Hu et al., Communication-efficient federated learning in channel constrained Internet of Things, in: GLOBECOM 2022 \u2013 2022 IEEE Global Communications Conference, 2022.","DOI":"10.1109\/GLOBECOM48099.2022.10000898"},{"key":"10.3233\/JHS-240037_ref11","doi-asserted-by":"crossref","unstructured":"J.\u00a0Jiang et al., Heterogeneity-aware distributed parameter servers, in: Proceedings of the 2017 ACM International Conference on Management of Data, Association for Computing Machinery, Chicago, Illinois, USA, 2017, pp.\u00a0463\u2013478.","DOI":"10.1145\/3035918.3035933"},{"key":"10.3233\/JHS-240037_ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2023.106848"},{"key":"10.3233\/JHS-240037_ref14","doi-asserted-by":"crossref","unstructured":"N.\u00a0Li and J.C.\u00a0Mitchell, Datalog with constraints: A foundation for trust management languages, in: Practical Aspects of Declarative Languages, Springer Berlin Heidelberg, Berlin, Heidelberg, 2003.","DOI":"10.1007\/3-540-36388-2_6"},{"issue":"1","key":"10.3233\/JHS-240037_ref15","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1109\/COMST.2021.3139052","article-title":"Surveying trust-based collaborative intrusion detection: State-of-the-art, challenges and future directions","volume":"24","author":"Li","year":"2021","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"10.3233\/JHS-240037_ref16","doi-asserted-by":"publisher","first-page":"674","DOI":"10.1109\/TMC.2021.3096846","article-title":"Adaptive asynchronous federated learning in resource-constrained edge computing","volume":"22","author":"Liu","year":"2023","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"24","key":"10.3233\/JHS-240037_ref17","doi-asserted-by":"publisher","first-page":"21961","DOI":"10.1007\/s00521-022-07656-w","article-title":"Context-awareness trust management model for trustworthy communications in the social Internet of Things","volume":"34","author":"Magdich","year":"2022","journal-title":"Neural Computing and Applications"},{"key":"10.3233\/JHS-240037_ref18","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.comcom.2020.01.014","article-title":"Blockchain for Internet of energy management: Review, solutions, and challenges","volume":"151","author":"Miglani","year":"2020","journal-title":"Computer Communications"},{"key":"10.3233\/JHS-240037_ref19","doi-asserted-by":"crossref","first-page":"49212","DOI":"10.1109\/ACCESS.2020.2979939","article-title":"A decentralized latency-aware task allocation and group formation approach with fault tolerance for IoT applications","volume":"8","author":"Mudassar","year":"2020","journal-title":"IEEE Access"},{"issue":"13","key":"10.3233\/JHS-240037_ref20","doi-asserted-by":"publisher","first-page":"14866","DOI":"10.1007\/s11227-022-04453-z","article-title":"Extreme learning machine and Bayesian optimization-driven intelligent framework for IoMT cyber-attack detection","volume":"78","author":"Nayak","year":"2022","journal-title":"The Journal of Supercomputing"},{"issue":"1","key":"10.3233\/JHS-240037_ref21","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/JSAC.2020.3036952","article-title":"Fast-convergent federated learning","volume":"39","author":"Nguyen","year":"2021","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.3233\/JHS-240037_ref22","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.ssresearch.2015.09.004","article-title":"From the general to the specific: How social trust motivates relational trust","volume":"55","author":"Robbins","year":"2016","journal-title":"Social Science Research"},{"issue":"2","key":"10.3233\/JHS-240037_ref23","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1016\/j.socnet.2008.12.002","article-title":"Exploring variation in active network size: Constraints and ego characteristics","volume":"31","author":"Roberts","year":"2009","journal-title":"Social Networks"},{"key":"10.3233\/JHS-240037_ref24","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1109\/TSP.2020.3046971","article-title":"UVeQFed: Universal vector quantization for federated learning","volume":"69","author":"Shlezinger","year":"2021","journal-title":"IEEE Transactions on Signal Processing"},{"key":"10.3233\/JHS-240037_ref26","doi-asserted-by":"publisher","DOI":"10.3390\/s17061346"},{"key":"10.3233\/JHS-240037_ref27","doi-asserted-by":"crossref","unstructured":"S.\u00a0Vashi et al., Internet of Things (IoT): A vision, architectural elements, and security issues, in: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2017.","DOI":"10.1109\/I-SMAC.2017.8058399"},{"key":"10.3233\/JHS-240037_ref28","doi-asserted-by":"crossref","unstructured":"H.\u00a0Wang et al., Optimizing federated learning on non-IID data with reinforcement learning, in: IEEE INFOCOM 2020 \u2013 IEEE Conference on Computer Communications, 2020.","DOI":"10.1109\/INFOCOM41043.2020.9155494"},{"key":"10.3233\/JHS-240037_ref29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2020.08.007","article-title":"TOT: Trust aware opportunistic transmission in cognitive radio social Internet of Things","volume":"162","author":"Wang","year":"2020","journal-title":"Computer Communications"},{"issue":"2","key":"10.3233\/JHS-240037_ref30","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.1109\/JIOT.2018.2842773","article-title":"Enhancing privacy and availability for data clustering in intelligent electrical service of IoT","volume":"6","author":"Xiong","year":"2019","journal-title":"IEEE Internet of Things Journal"},{"key":"10.3233\/JHS-240037_ref31","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for Internet of Things","volume":"42","author":"Yan","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"key":"10.3233\/JHS-240037_ref32","unstructured":"M.\u00a0Zaharia et al., Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing, in: Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, USENIX Association, San Jose, CA, 2012, p.\u00a02."},{"issue":"4","key":"10.3233\/JHS-240037_ref33","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10796-005-4807-3","article-title":"Propagation models for trust and distrust in social networks","volume":"7","author":"Ziegler","year":"2005","journal-title":"Information Systems Frontiers"}],"container-title":["Journal of High Speed Networks"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JHS-240037","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T08:44:42Z","timestamp":1777452282000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.medra.org\/servlet\/aliasResolver?alias=iospress&doi=10.3233\/JHS-240037"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,15]]},"references-count":30,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jhs-240037","relation":{},"ISSN":["1875-8940","0926-6801"],"issn-type":[{"value":"1875-8940","type":"electronic"},{"value":"0926-6801","type":"print"}],"subject":[],"published":{"date-parts":[[2024,10,15]]}}}