Show simple item record

dc.contributor.authorShala, Besfort
dc.contributor.authorTrick, U
dc.contributor.authorLehmann, A
dc.contributor.authorGhita, B
dc.contributor.authorShiaeles, Stavros
dc.contributor.editorXhafa F
dc.contributor.editorLeu F-Y
dc.contributor.editorFicco M
dc.contributor.editorYang C-T
dc.date.accessioned2022-11-07T12:08:23Z
dc.date.available2022-11-07T12:08:23Z
dc.date.issued2019
dc.identifier.isbn9783030026066
dc.identifier.urihttp://hdl.handle.net/10026.1/19883
dc.description.abstract

Trust evaluation in decentralized M2M communities, where several end-users provide or consume independently M2M application services, enable the identification of trustless nodes and increase the security level of the community. Several trust management systems using different trust evaluation techniques are presented in the application field of M2M. However, most of them do not provide a secure way to store the computed trust values in the community. Moreover, the trust agents participating in the trust evaluation process are not securely identified and could lead to misbehavior among the trust agents resulting in non-reliable trust values. This research identifies several problems regarding decentralized M2M application services and the trust evaluation process. In order to overcome these issues this research proposes a novel approach by integrating blockchain technology in trust evaluation processes. Moreover, this publication presents a concept for using blockchain within the system for decentralized M2M application service provision. Finally, the combination of P2P overlay and blockchain network is introduced in order to verify the integrity of data.

dc.format.extent62-73
dc.language.isoen
dc.publisherSpringer International Publishing
dc.relation.ispartofAdvances on P2P, Parallel, Grid, Cloud and Internet Computing
dc.subjectBlockchain
dc.subjectM2M
dc.subjectSecurity
dc.subjectService and application
dc.subjectTrust
dc.titleBlockchain-Based Trust Communities for Decentralized M2M Application Services
dc.typechapter
plymouth.author-urlhttps://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000674927000006&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=11bb513d99f797142bcfeffcc58ea008
plymouth.volume24
plymouth.publisher-urlhttps://doi.org/10.1007/978-3-030-02607-3
plymouth.publication-statusPublished
plymouth.seriesLecture Notes on Data Engineering and Communications Technologies
dc.identifier.doi10.1007/978-3-030-02607-3_6
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1007/978-3-030-02607-3_6
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.typeBook chapter


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV