Show simple item record

dc.contributor.authorShala, Besfort
dc.contributor.authorTrick, U
dc.contributor.authorLehmann, A
dc.contributor.authorGhita, B
dc.contributor.authorShiaeles, S
dc.date.accessioned2021-05-18T12:11:43Z
dc.date.available2021-05-18T12:11:43Z
dc.date.issued2020-06-29
dc.identifier.issn2169-3536
dc.identifier.issn2169-3536
dc.identifier.urihttp://hdl.handle.net/10026.1/17142
dc.description.abstract

Building trust relationships between different decentralized entities in the IoT ecosystem is essential. Hereof, the combination of blockchain technology and trust evaluation techniques is recently considered as an efficient measure. However, both technologies within the IoT are still facing some limitations which are addressed in this research. First, this publication reviews various blockchain-based trust approaches and depicts their strengths and limitations regarding their usage in decentralized IoT communities. Then, an optimized trust model with a multi-layer adaptive and trust-based weighting system is proposed. Additionally, different trust metric parameters and their mathematical models used for trust evaluation are presented. Moreover, this publication presents a novel approach for incentivization processes in the IoT marketplace using control loops and smart contracts. Thereby, participants are motivated to continuously improve their behavior. Finally, the proposed trust model is proved to be reliable. The experimental results conducted from different scenarios show that the presented approach provides more resiliency against various attacks than existing ones.

dc.format.extent119961-119979
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers (IEEE)
dc.subjectBlockchain
dc.subjectInternet of Things
dc.subjectservices
dc.subjecttrust
dc.subjectsmart contract
dc.titleBlockchain and Trust for Secure, End-User-Based and Decentralized IoT Service Provision
dc.typejournal-article
dc.typeJournal Article
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000551986400001&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.volume8
plymouth.publication-statusPublished
plymouth.journalIEEE Access
dc.identifier.doi10.1109/access.2020.3005541
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2020-06-23
dc.rights.embargodate2021-6-24
dc.identifier.eissn2169-3536
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1109/access.2020.3005541
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2020-06-29
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV