You are on page 1of 29

Trust Management for Internet of Things:

A Systematic Literature Review


Alyzia Maria Konsta Alberto Lluch Lafuente Nicola Dragoni
Department of Applied Mathematics Department of Applied Mathematics Department of Applied Mathematics
and Computer Science and Computer Science and Computer Science
Technical University of Denmark Technical University of Denmark Technical University of Denmark
Email: akon@dtu.dk Email: albl@dtu.dk Email: ndra@dtu.dk
arXiv:2211.01712v1 [cs.NI] 3 Nov 2022

Abstract—Internet of Things (IoT) is a network of devices that Management for IoT. The main contributions of this paper
communicate with each other through the internet and provides are:
intelligence to industry and people. These devices are running
in potentially hostile environments, so the need for security is • A literature review in the existing Trust Management
critical. Trust Management aims to ensure the reliability of the techniques.
network by assigning a trust value in every node indicating • A categorization of the existing literature based on the
its trust level. This paper presents an exhaustive survey of the
techniques/tools used to form the Trust Management
current Trust Management techniques for IoT, a classification
based on the methods used in every work and a discussion of method.
the open challenges and future research directions. • Pointing out current challenges and future research direc-
Index Terms—Trust Management, Internet of Things, IoT, tions for Trust Management in IoT.
Security, Systematic Literature Review,
The rest of the papers is structured as follows: Section 2
summarizes the main concepts of IoT and Trust Management,
I. I NTRODUCTION Section 3 presents the research method we followed to struc-
Internet of things (IoT) is a recent technology broadly used ture our research, Section 4 discusses the related work and
in our everyday life. According to Cisco’s Annual Report other surveys on Trust Management for IoT, Section 5 provides
(2018-2023) the number of devices connected to IP networks the classification of the literature and description for all the
will be more than three times the global population by 2023 papers participating in this research and a quantification study,
[65]. The term IoT was first introduced in 1999 by Kevin Section 6 discusses the main challenges and future research
Ashton in the context of supply chain management [35], directions and Section 7 concludes the paper.
but the last decade the concept is being used in multiple
fields, like agriculture [12], health care [46], energy [13] II. BACKGROUND
and transportation [14] among others. IoT form a network
of devices -such as RFID, sensors, mobile phones etc.- that In this section we provide an overview of the basic concept
are communicating through the internet. These devices gather we are going to discuss in the following chapters.
information from their environment and provide intelligence
to industry and people.
A. IoT Architecture
IoT objects are running in remote locations in potentially
hostile environments, so they are vulnerable to security attacks. According to most researchers IoT is a three-layer archi-
However, these resource-constraint devices cannot support the tecture [39] [45]. These are the Perception layer, the Network
customary security algorithms, that require powerful hardware layer and the Application layer.
and software. Taking into account the magnitude of IoT and
• Perception layer: It consists of physical devices, such as
the domains using this technology we can imagine that a huge
sensors, that gather information from the environment.
amount of sensitive information are processed in IoT devices.
• Network layer: This layer is responsible for connecting
Therefore the need of security is crucial. One method used
the devices to servers and network devices. Also, the
to assess the reliability of the network is Trust Management.
protocols of this layer are used to transmit and exchange
Trust Management aims to ensure the reliability of the network
information among the devices.
by assigning a trust value in every node indicating its trust
• Application layer: Serves as an intermediate layer be-
level. Thus, the information provided by a node with a high
tween the network and the IoT services. The data col-
trust level is considered reliable. In order to create a trust
lected from the smart devices are transferred to the
relationship at least two entities must be involved: the trustor
application layer. Applications like smart health, smart
and the trustee.
home etc. belong to this layer.
In this work, we present an exhaustive survey in Trust
Fig. 1: IoT Architecture • Direct Trust: Trust is formed based on direct observations
and interactions between the 2 parties involved in the trust
relationship.
• Indirect Trust: The trustor and the trustee do not share
any previous interactions. Trust is formed based on rec-
ommendations of other nodes [64], [37].
2) Experiments: We are also going to examine what kind
of experiments took place in every work.
3) Trust Propagation: Trust propagation refers to how the
B. Categories trust is propagated and it is divided to two categories:
One of the contributions of this work is to point out the • Distributed: Every node stores the trust values of the
tools, methods and technologies being used to form the Trust other nodes. The nodes independently store and compute
Management techniques. The categories defined, represent the the trust values.
technologies used in every paper. We divide the papers into • Centralized: A centralized authority is present to compute
nine different categories: Blockchain, Context, Social, Game and store the trust values [64], [37].
Theory, Probabilistic, Prediction, Fuzzy, Direct and Recom- 4) Threat Model:: It is a set of attacks examined in each
mendations. These categories represent the technologies used work. The malicious node can perform these attacks in the
in every paper in order to gather the information for the trust system under investigation.
formation, to compute the final trust and to store the trust 5) Trust update: Trust update refers to when the trust is
related data as stated in Table I. The rows in Table I represent updated and can be divided into two categories:
the categories defined and the columns, the aspects of Trust
• Event driven: When a specific event is triggering the
Management every category contributes.
trust update. For example, when a node is requesting an
Category Info Gathering Computation Storing interaction the trust updating can be triggered.
• Time driven: When the trust is being updated in time
Blockchain X X intervals [64], [37].
Context X
6) Trust Formation: The trust formation refers to how the
Social X
overall trusted is formed. It is divided into two categories:
Game Theory X
Probabilistic X • Single Trust: Only one trust parameter is considered to

Prediction X form the trust of a node.


Fuzzy X • Multi Trust: Several parameters are used to form the trust

Direct X of a node, since the trust is considered multidimensional


Recommendations X [64], [37].
7) Simulator:: Refers to the simulator used in every work to
TABLE I: Categories used in this work perform the experiments. Of course in some cases real devices
were used.
In order to form a Trust Management technique one can
C. Attacks
combine the tools offered by any category, thus, each paper
could in principle be part of more than one category. Based on the examined literature an IoT node can perform
We are going to examine 7 different dimensions in every the attacks presented in Table II. An attack can be trust related
category, in order to identify the research gaps: information or belong to a different layer of the IoT architecture.
gathering, experiments, trust propagation, threat model, trust In an IoT system using a Trust Management technique
update, trust formation and the simulator. We decided to where the nodes are evaluated, the trust level of the node plays
include these 7 categories after examining which dimensions an important role to their image. A node with a good trust level
are included in the current literature and we also added the can have multiple collaborators and influence in the system.
Experiments and Simulator category. In our perspective, it Hence, we are concerned with trust related attacks. First we
is important to examine which Experiments were conducted are going to elaborate on this kind of attacks, identified so far
and how they were conducted in every work. Following we in the literature [37], [63]:
introduce the 7 dimensions of trust: • Bad mouthing attacks (BMA): A malicious node can
1) Information Gathering: One Trust Management system provide bad recommendations for a honest node, trying
should collect data in order to execute the trust computation. to ruin its reputation. The goal of this attack is to lower
Information Gathering is the first step towards trust compu- the reputation of a honest node.
tation. It refers to the process of collecting knowledge about • Ballot stuffing attacks (BSA): A malicious node is pro-
the trust parameters. We can divide information gathering into viding good recommendations for other malicious nodes.
two categories: The goal of this attack is to increase the trust level of
Attack Trust Application Network Perception • Denial of Service attack (DoS): When a malicious node
BMA X is sending multiple requests to the network in order to
BSA X make it unavailable for the rest of the users.
SPA X • Spoofing attack (SFA): When a node is using a different
OSA X identity and pretends to be someone else.
OOA X • Blackhole attack (BA): When a node is deleting all
EA messages it is supposed to forward. This attack is creating
NCA X a gap in the network.
RA X • Wormhole attack (WHA): The nodes involved in this
SA X attack are stronger nodes that communicate in longer
WA distances. The packets are forwarded from one malicious
DoS X node to the other through a tunnel. In this way, they can
SFA X trick the other nodes of the network to believe that these
BA X two nodes are closer.
WHA X • Injection attacks (IA): A malicious code is injected to
IA X disturb the smooth functionality of the network.
SDA • Sleep deprivation attack (SDA): The malicious node is
making frequent requests to a node, to keep it awake and
TABLE II: Category of every attack consume all the battery resources quickly [56].
III. R ESEARCH M ETHOD
In this section we are presenting the research method we
other malicious nodes, thus increasing their influence in
adopted to discover the existing literature for Trust Manage-
the network.
ment in IoT. We followed the research method proposed by
• Self promoting attacks (SPA): A malicious node can
Petersen et al [55]. In the following we are describing the
provide good recommendations for itself in order to
research questions, the search method and the study selection.
increase its influence in the network.
• Opportunistic service attacks (OSA): A malicious node A. Research Questions
can provide good service to gain high trust level and This paper is aiming to study the existing literature on Trust
then cooperate with other malicious node to perform bad Management in IoT, so we focus on the following research
mouthing and ballot stuffing attacks. questions:
• On-Off attacks (OOA): A malicious node can provide
• RQ1: Which methods are currently used in the field?
sometimes bad services and sometimes good services.
• RQ2: What is the threat model of those proposals?
With this attack a node is avoiding to be labeled as an
• RQ3: Which trust parameters are used?
untrustworthy node.
• RQ4: What kind of experiments were conducted?
In the scope of this paper we are also going to discuss the
following types of attacks mentioned in the literature included B. Search Method
in this survey: We used the PICOC criteria [42] to come up with relevant
• Eclipse attack (EA): In this type of attack the malicious keywords for our search:
node isolates the victim from the rest of the network [26]. • Population: We are interested in works in IoT nodes.

• Node Capture attack (NCA): This type of attack is • Intervention: We are interested in works that propose a

targeting the physical devices of IoT, in terms of com- Trust Management technique.
munication links, fake data input, etc. [45] • Comparison: We compare different kind of Trust Man-

• Replay attack (RA): In this type of attack the malicious agement schemes in IoT based on design features, secu-
node is listening to a communication to gain information rity capabilities, performance.
and misdirect the receiver. [45] For example if Alice • Outcomes: We present Trust Management techniques for

shares an information with Bob (to prove her identity), IoT: the opportunities and limitations, as well as future
then Eve is eavesdropping on the conversation and stores challenges.
the information Alice shared. Now Eve can maliciously • Context: we are interested in any paper that proposes a

communicate with Bob and pretend to be Alice. trust management technique for IoT nodes.
• Sybil attack (SA): A malicious node is having multiple Based on the above criteria we came up with the following
identities and can place itself simultaneously in different keywords: “Internet of things”, “IoT”, “trust”, “trustworthy”
places in the network. and “node”. We performed our search in DTU Findit , which
• Whitewashing attack (WA): When a node with a bad is an open (guest access) database, that includes publications
reputation is re-entering the network with a different from widely known journals and databases: Elsevier, IEE-
identity to reset its reputation. Explore, ACM Digital Library, etc.. We used the following
query: title:(IoT OR ”internet of things”) AND title:(trust OR was presented. Kumar et al. only focus on blockchain related
trustworthy) AND abstract:(node). our search returned 341 research.
papers. The final pool of papers were selected based on the Sharma et al. [64] presented the different stages involved
study selection we describe in the next paragraph. in the process of Trust Management. Furthermore, the au-
thors presented a survey on Trust Management schemes.
C. Study Selection The survey is conducted considering direct observations and
We started with 341 papers, after identifying the duplicates indirect recommendations, distributed, semi-distributed, cen-
we applied the following exclusion criteria: tralized schemes and blockchain based schemes for trust man-
• E1: The full text of the paper is not available.
agement in IoT. Moreover, they provided a comparative study
• E2: The papers in not provided in English.
of the existing schemes based on some system parameters
• E3: The work is not focusing on IoT.
like computation model, input attributes, evaluation tool, and
• E4: The work is not focusing on Trust Management
performance metrics examining their strengths and weak-
techniques. nesses. The paper, also highlights open research challenges
and present future direction for the researchers. Sharma et al.
After applying the above exclusion criteria the relevant we do not provide classification based on the technologies used
also performed the snowballing [70] technique and ended up and focus only on trust related attacks.
with 48 papers, that consist the final pool. Alshehri et al. [5] were focused on scalable and context-
aware Trust Management for IoT. They present the concept of
IV. R ELATED W ORK
IoT and the importance of Trust. The authors also provided
In this section we present some papers conducting surveys a comparative evaluation of existing trust solutions for IoT
on trust management for IoT. focusing on the scalability. Also they presented a trust man-
Guo et al. [37] classified trust computation models for agement protocol for the IoT. Furthermore, the authors also
service management in IoT systems. They proposed five design provided a context-aware evaluation for the IoT and compared
dimensions for a trust computation model: trust composition, the different trust solutions. Finally, the authors gave some
trust propagation, trust aggregation, trust update, and trust future directions for research. This work was published before
formation. The authors mentioned the pros and cons of each 2020 and the authors do not provide the threat models of the
dimension’s options. Finally, they also identified gaps in IoT works included in this survey. Also, this work focuses only on
trust computation research and suggested future research di- context-aware Trust Management.
rections. This work was published before 2020 and the authors Saeed at al. [63] proposed a classification tree in this survey
only mention the trust related attacks in their survey. for Trust Management models. The classification scheme is
Yan et al. [71] investigated the properties of trust, proposed taking into account five dimensions of trust. They do not
objectives of IoT trust management, and provided a survey examine the experiments conducted in every work or the threat
on the literature towards trustworthy IoT. Furthermore, the model mentioned in every category. The authors examine some
authors discussed unsolved issues, research challenges and trust related attacks on IoT devices. Finally, they point out
propose a research model for holistic trust management in IoT. some future directions. This work only mentions trust related
In order to conduct holistic IoT trust management, the trust attacks, also they do not classify the papers based on the
properties that impact trust relationships were explored and technologies used.
classified into five categories: Trustee’s objective properties, Pourghebleh et al. [57] presented a survey were the selected
Trustee’s subjective properties, Trustor’s subjective properties, techniques are categorized into four main classes, including
Trustor’s objective properties and Context that the trust rela- recommendation-based, prediction-based, policy-based, and
tionship resides in. This paper was published before 2020 and reputation-based. The authors also present a discussion where
the authors do not mention the threat models of the papers they compare the literature based on some metrics such
included in their survey. as accuracy, adaptability, availability, heterogeneity, integrity,
Singh et al. [65] discussed the fog computing three layer privacy, reliability, and scalability. Furthermore, some future
architecture and state-of-the-art models. The bottom layer of challenges and directions are provided. This work was con-
Fog Computing comprises of IoT devices [65]. Through their ducted before 2020. Also the paper mentions only trust related
survey on Trust Management in Fog Computing Singh et al., attacks.
also identified trust and security challenges. This recent work The summary of our findings are presented in Table III. We
only focus in Fog Computing Architectures. can observe from the Table that most of the works refer only to
Kumar et al. [45] focused on research regarding trust the Trust Related attacks. In order to identify the weaknesses
using the Blockchain technology in the IoT environment. The of the field, one should also take into account the non trust
authors pointed out some challenges and issues of Trust Man- related attacks that are being tackled in the literature.
agement in IoT proposing Blockchain based solutions. Further- Until now, only [65] refers to the technologies used to
more, some issues regarding the integration of Blockchain with classify the papers, but focuses only on trust related attacks.
IoT were discussed. Finally, a comparative analysis between Also, only [45] provides some solutions to the challenges
traditional and Blockchain-based trust management techniques presented, but the survey is focused on Blockchain based Trust
Trust Other Methods’ Future
Paper After 2020 General Solutions
Attacks Attacks Classification Directions
[37] X X X
[71] X X
[65] X X X X X
[45] X X X X X
[64] X X X X
[5] X
[63] X X X X
[57] X X X
Our work X X X X X X X

TABLE III: Comparison with Related Work

Management techniques.
We can conclude that our work provides a more complete
view in general Trust Management techniques. We point out
the technologies used in every work and provide a categoriza-
tion based on these technologies. We also take into account all
kind of attacks and provide future directions and a solution to
support the design of a multidimensional Trust Management
system.
V. OVERVIEW OF THE CATEGORIES
In this section we will provide a comprehensive picture
of all the categories mentioned. More specifically, we are
going to conduct a quantification study and discussion upon
attacks, publishers and publication years , trust properties and
experiments.

A. Percentage of papers in each category


In total the survey consisted of 48 papers. Each paper may
belong to different categories. We classified the papers in nine
different categories. In Figure 2 you can see the percentage of Fig. 2: Percentage of papers classified in each category
papers classified in each category.
As we can see, the most popular category is Recommen-
dations. In this category in order to calculate the trust each We observe that the trust related attacks -BMA, BSA, SPA,
node asks for recommendations. In this way, some attacks OSA, OOA- are studied the most in the literature. It is really
-like OSA- can be tackled, but it is important to take into important for a Trust Management system to be able to deal
consideration filtering the recommendations in order to deal with the trust related attacks, but this is only the foundation.
with BMA and BSA. A well designed trust management system, should be capable
Also the Social IoT is very popular. It simulates a network dealing with all kind of attacks. We can see that only 1.20%
of nodes as a group of things with social interactions. As in of the papers are considering the EA, RA, SDA and WHA.
real life, the nodes can develop relationships with the other These kind of attacks may cause severe damages to an IoT
participants and the level of trust is related to their social network.
interactions. This scheme also provides the opportunity to filter
the recommendations. C. Publisher and Publication Year
In this section we present results regarding the Publisher of
B. Percentage of attacks every paper and the publication year. It would be interesting to
In this section we are presenting some data related to the see when the research community started to investigate further
threat model provided. It is important to mention that 26 out of trust management solutions for IoT.
the 48 papers defined a specific threat model for their research. We can observe in Figure 4 that IEEE is the leading pub-
In Figure 3 you can see the statistical information regarding lisher with more than the half papers included in this survey.
the attacks studied in the literature. Furthermore, in Figure 5 we can see that the most popular
Fig. 5: Number of papers published in each year

II. We will examine what kinds of attacks were tackled, trust


parameters are used and experiments were conducted in each
category in order to identify weaknesses.
Fig. 3: Percentage of every attack mentioned in every threat 1) Blockchain: In the Blockchain category we included
model seven papers. Five out of seven papers included a threat model
and trust parameters, while all of them included section with
the experiments. In Figure 6, Figure 7 and Figure 8 one can
see details about the threat model, the trust parameters and the
experiments.
The attacks gained the most attention are the trust related
attacks BSA and BMA. The resource constrained IoT devices
are not always capable of participating in a blockchain network
as foul nodes, so they are vulnerable to EA. However, EA
corresponds to only 5.56% of the mentioned attacks.
During the experiments only a small percentage of the
works take into account the scalability and there was not any
work that took into account energy consumption. Both of these
two components are important, especially for the extended IoT
networks.
2) Context: In this category, we included five papers. One
out of five specified a threat model, four out of five defined
the trust parameters, while all of them included a section with
the experiments. In Figure 9, Figure 10 and Figure 11 you can
see details regarding the threat model. the trust parameters and
Fig. 4: Percentage of papers published by each publisher the experiments.
Context is a really important parameter for trust. Some
individuals may be trustworthy only under specific circum-
year for Trust Management for IoT publications was 2019. stances and contexts.However only one paper of this category
The first paper published in Trust Management specifically for is including the threat model, that includes the SA and BMA.
IoT were at 2011. It makes sense since IoT is a relatively new Most of the trust related attacks are not mentioned. A solid
technology and has gained a lot of attention the last decade. Trust Management system should be able to confront trust
The statistics for 2022 are not accurate since the research related attacks.
is conducted during that year. The papers involved in this There are no experiments conducted for scalability and
research are published until March 2022. energy consumption. A lot of works are comparing their work
with other existing models to justify the efficiency of their
D. Attacks, Trust Properties, Experiments solution.
In this section we will explore the categories related to 3) Social: In this category, we included 18 papers. Nine
trust composition and storage categories as stated in Table out of 18 specified a threat model, 16 out of 18 defined the
Fig. 6: Blockchain: Attacks Fig. 8: Blockchain: Experiments

Fig. 7: Blockchain: Trust Parameters

Fig. 9: Context: Attacks


trust parameters, while 17 of them included a section with the
experiments. In Figure 12, Figure 13 and Figure 14 you can
see details regarding the threat model. the trust parameters and The OOA is only mentioned in the research. The other
the experiments. attacks are not mentioned in the threat models presented. The
Trust related attacks are gaining most of the attention. The experiments in this category are taking into account the Energy
experiments are focused on performance and comparison with factor. Also most of the works are also conducting comparison
other models. The Energy consumption has taken into account with other existing models.
in a small percentage of 5%. 5) Game Theory: In this category, we included four papers.
4) Fuzzy: In this category, we included five papers. One Three out of four specified a threat model, two out of five
out of five specified a threat model, four out of five defined defined the trust parameters, while all of them included a
the trust parameters, while all of them included a section with section with the experiments. In Figure 18, Figure 19 and
the experiments. In Figure 15, Figure 16 and Figure 17 you Figure 20 you can see details regarding the threat model. the
can see details regarding the threat model, the trust parameters trust parameters and the experiments.
and the experiments. Many game theoretic approaches are aiming on reducing
Fig. 12: Social: Attacks
Fig. 10: Context: Trust Parameters

Fig. 11: Context: Experiments Fig. 13: Social: Trust Parameters

the energy consumption in an IoT network. So, the trust defined the trust parameters and included a section with the
parameters and the experiments are taking into account the experiments. In Figure 24, Figure 25 and Figure 26 you can
energy factor for evaluating the trust and for testing purposes. see details regarding the threat model. the trust parameters and
6) Probabilistic: In this category, we included six papers. the experiments. The experiments does not include scalability
Three out of six specified a threat model, four out of six and energy. In this category some non trust related attacks are
defined the trust parameters, while all of them included a gaining attention, like SFA, SDA and DoS.
section with the experiments. In Figure 21, Figure 22 and
Figure 23 you can see details regarding the threat model. the VI. C LASSIFICATION BASED ON THE USED M ETHODS
trust parameters and the experiments.
As we can see at Figure 21 four attacks mentioned with In each category we will compare the models. The tables
the same percentage. Three out of four are trust related will include the following columns: Paper, Direct, Indirect,
attacks. The probabilistic approaches are taking into account Time Driven, Event Driven, Experiments, Centralized, Single
the Energy as a trust parameter and it is also taken into account Trust, Multi Trust, Threat Model and Simulator as stated in
in the experiments. the Background section.
7) Prediction: In this category, we included six papers. • Paper: The paper under examination.
Three out of six specified a threat model, while all of them • Direct: If the paper is using a direct trust approach.
Fig. 16: Fuzzy: Trust Parameters
Fig. 14: Social: Experiments

Fig. 17: Fuzzy: Experiments

When the paper satisfies the corresponding column we add


Fig. 15: Fuzzy: Attacks a check mark (X) to the particular box.

A. Direct Trust
• Indirect: If the paper is using an indirect trust approach Direct observations refer to the process of gathering in-
(recommendations). formation for trust calculation though direct communication
• Time Driven: When the trust update is time driven. between the nodes. The node relies on its own observation
• Event Driven: When the trust update is event driven. when the trust calculation is taking place.
• Experiments: If a paper provides experiments supporting A summary of the works relying only to direct observations
the theorems. for trust evaluation is presented in Table IV. We can observe
• Centralized: If a central entity is responsible of Trust from the table that all the works provide experiments, prefer
Management. the multi trust approach and use the direct trust method - as
• Single Trust: When a paper is using only one parameter stated by the category. We can see that 60% of the papers
to form the trust. inform mas about the simulator used. The Threat model is
• Multi Trust: When a paper is using multiple parameters explicitly defined in 60% of the papers. We can also observe
to form the trust. that 40% of the papers provide a Centralized approach. Finally,
• Threat Model: When a paper explicitly states the threat 60% of the approaches are Event Driven, while 40% of the
model. papers do not define the Trust Update procedure. At the rest
• Simulator: When a paper states which simulator was used of the section we provide a summary of each paper.
to conduct the experiments. Alshehri et al. [6] proposed a cluster based architecture
Fig. 20: Game Theory: Experiments

Fig. 18: Game Theory: Attacks

Fig. 21: Probabilistic: Attacks


Fig. 19: Game Theory: Trust Parameters

ate invalid blocks. A lightweight block generation scheme


including: One super node and many master nodes that are re- were proposed where blocks are generated in time intervals.
sponsible for multiple cluster nodes. Only the cluster nodes are The block validation mechanism adapts the block validation
considered to be malicious. The malicious nodes can perform scheme based on the reputation of the node that generated the
OOA. Alshehri et al. introduced five algorithms to calculate the block and the number of validators. For the consensus mech-
trust score of every cluster node. In order to calculate the trust anism the following method was introduced: If a validator
score they take into account the quality of service, the history detects an invalid transaction it broadcasts INVALID and the
score and the trust score. They use a fuzzy approach to classify nodes have to validate the transaction, otherwise the block is
the trust scores into fuzzy sets. The nodes are then classified appended on the blockchain. The proposed technique evaluates
in 3 categories: trusted, semi-trusted and non-trusted. Based the trustworthiness of sensor observations. The sensor assigns
on the trust score the nodes can change clusters and based on a confident value to the data and send the data to a gateway.
the category they can perform specific acts. They performed The gateway compares the data with the data of the other
experiments in Cooja simulator regarding scalability, accuracy cluster sensors (assumption: the sensors of the same cluster
of different attacks and fuzzy and non fuzzy approaches and have correlated data). At the end based on the result the
they presented diagrams with the results. They also proposed reputation of the node is being recalculated. The gateways
a HEXA decimal-based messaging system that can be used to store the information on a blockchain. The reputation of the
detect tampered messages in transit. gateways is calculated based on their acts during the generation
Dedeoglu et al. [28] proposed a system containing sensors and validation of the blocks. The trust parameters taken into
and gateways. Gateways are running the blockchain and are account are the confidence of the data source, the reputation
associated with a number of sensors. A malicious sensor can of the data source and evidence of other observations. The
tamper with the data and a malicious gateway can gener- experiments took place in NS-3 simulator and they are both
Fig. 22: Probabilistic: Trust Parameters Fig. 24: Prediction: Attacks

Fig. 25: Prediction: Trust Parameters


Fig. 23: Probabilistic: Experiments

graph model. The probabilistic graph model is used to repre-


blockchain related and trust related. The final results were sent the relationship between nodes. The interaction of node i
presented in diagrams. to node j can be described as P and Q. P is a positive influence
Ma et al. [47] proposed a multi mix attack method. The of node i to node j and Q is a negative. The information
sub attacks include: tamper, replay, drop attack. The nodes gathered for the formation of trust are the data collection and
update their cognition when a packet is transferred. The base communication behavior. Also, a moving strategy method is
station collects all cognitions from nodes and performs central proposed in order to decrease the travel distance MEN has
trust evaluation. For detection of the malicious nodes, node’s to cover in order to evaluate every sensor. The experiments
trust should be forwarded to the k means clustering module. conducted using MATLAB and NS-3 and they were focused
The trust properties used for trust evaluation are honesty, on the performance of the mechanism, the analysis of energy
straight and volume. During the experiments the accuracy of consumption and testing the proposed moving algorithm. The
the proposed method was tested. results were presented in diagrams.
Wang et al. [68] proposed a system consisting of Mobile Saied et al. [19] proposed a context aware and multi service
edge nodes (MEN) and common sensors. The MEN are trust management system. Upon a request from a node asking
connected to a small number of sensors. In this paper a mobile for assistance, the trust manager starts the entity selection
edge trust evaluation scheme is proposed. The evaluation of the process to return a set of trustworthy assisting nodes to the
trustworthiness of sensor nodes is achieved using probabilistic requester. A set of recommenders send reports, the most
Rafey et al. [60] proposed a system where nodes are forming
communities of interest. The proposed model takes social
relationships into account to evaluate trust. Also, the trust is
calculated for the different contexts the node is participating
and the final trust is the summation of the individual ones.
This work also presents a way for storing the trust values.
The trust is derived from node transaction factors: Com-
putational power, Context importance, Confidence, feedback
and social relationship factors: owner trust and SIoT rela-
tionship. The malicious entities can be: individual malevolent
nodes, malevolent collectives, malevolent spies, malevolent
pre-trusted nodes, partially malevolent collectives or malev-
olent collectives with camouflage and they can perform SA
and BMA. The experiments were focused on performance
and comparison with other mechanisms. The final results were
presented in diagrams.
Boudagdigue et al. [21] proposed a system where, every
Fig. 26: Prediction: Experiments node is being monitored by its neighbors. Also some groups
of neighbors are formed for evaluating the indirect trust. This
important reports are those that lie to the same or more paper proposed a distributed trust model based on a similar
similar service and recent ones. A quality of recommendation model proposed for the vehicular networks. The authors used
score is assigned to each node reflecting its trustworthiness Markov Chains to model the trust changing. A discrete-time
when rating other nodes. The context was used to filter out chain with M + 1 states was introduced. State 0 corresponds
recommendations and to select the most relevant ones. The to the lower trust level and M to the upper most. The
trust is calculated based on the following parameters: score probabilities were calculated based on the direct and indirect
given by the requester node to service provider evaluating the trust scores. The malicious nodes can perform BMA, BSA,
offered service, a weight that depends on time and similarity selfish attacks and honesty attacks. The trust parameters taken
and quality of recommendations. Experiments were performed into account are honesty and cooperation. The experiments
focused on the comparison of reactions against different kind tested the proposed solution against different kind of trust
of attacks like on off, bad mouthing and selective behavior related attacks. The results were presented as diagrams.
attack. Nitti et al. [53] proposed a system consisting of a network
of nodes, a number of pre-trusted entities to hold a distributed
B. Recommendations hash table structure and four other components to man-
In order to gather the information needed for the trust cal- age the network: relationship management, service discovery,
culations, the nodes can ask for recommendations concerning service composition and trustworthiness management. This
the node under evaluation from other nodes. This procedure paper defined two models for trustworthiness management,
is also called indirect trust. There are many reasons that the subjective and the objective. In the first model each node
recommendations are valuable for the trust evaluation. Some computes the trustworthiness of its friends using its own
works are using recommendations, as a supplement to direct experience and the opinion of the friends in common. In the
observations, the summary of these works is presented on second model, the information of each node is stored on a
Table V. distributed hash table structure. The following trust parameters
From the table we can observe that all of the works use are taken into account: feedback, the total number of transac-
both direct and indirect trust - as stated by the category. tions, credibility, transaction factor, relationship factor, notion
Regarding the Trust Update procedure most of the papers are of centrality and computation capability. Trust calculations
using the Event Driven. More specifically, 70.3% are using rely on Social relationship factors. The following are the
Event Driven, 18.9% are using the Time Driven approach and social relationships that are formed in the model: Parental
the rest (10.8%) do not refer to the Trust Update Procedure. Object Relationship, co-location Object Relationship, co-work
Only 2.7% do not present experiments and from the papers Object Relationship, ownership Object Relationship and social
that present experiments 41.6% presents the simulator used object relationship. The experiments conducted are focusing
for the experiments. Moreover, 8.1% preferred a Centralized on comparing the performance with other models and how
approach. Regarding the Trust Formation most of the papers the proposed approaches work with three different dynamic
present a Multi trust approach (81%), 10.8% of the papers behaviors of the nodes.
provide a Single Trust approach and the rest (8.1%) do not Putra et al. [58] proposed a system where sensors are
provide the trust parameters. Finally, 54% of the papers define divided into Service Providers and Service Consumers, that
the Threat Model. At the rest of this part we are going to consist the lightweight clients in the main blockchain. Also a
present a summary of each work. set of permissioned blockchains are implemented to maintain
Time Event Threat
Paper Direct Indirect Experiments Centralized Single Trust Multi trust Simulator
Driven Driven Model
[6] X X X X X
[28] X X X X X X
[47] X X X X X X
[68] X X X X
[19] X X X X X

TABLE IV: Overview of approaches proposing direct trust Trust Management methods

the sensitive data of the sensors. These chains are maintained are presenting the results of the experiments.
in a consortium of independent and partially trusted entities. Abidi et al. [1] proposed a system consisting of: nodes
The following attacks can be performed by a malicious node: that create social relationships, a context Manager, a social
BMA, RA, PA, BSA, WA and SA. The trust is calculated on a relationship manager and a trust formation adjustor. The goal
smart contract in the main blockchain. The experiments took of the system is to assist the nodes to find trustworthy service
place in a real environment. For the blockchains the Rinkeby providers. The level of trust of the service providers depend
Ethereum test-network was used as the main blockchain and both on direct trust (the interactions between the requestor and
private chains for storing the sensitive data. The following the service provider) and recommendations of the requester’s
experiments took place: different kind of weights for calculat- neighbors. The trust parameters adjust to the network context
ing the trust scores, comparison wit other schemes, trust ans and the relationships between the nodes. The trust parameters
reputation convergence, latency and required gas. The final taken into account are the quality of Service and social trust
results were presented in diagrams and tables. properties like honesty cooperativeness and social relation-
Mon et al. [9] proposed a cluster based system with a ships. Trust calculations rely on Social relationship factors.
central trust entity. Initially a cluster is formed and the master The following are the social relationships that are formed in
node is selected based on its trust score, which includes QoS the model: Parental Object Relationship, co-location Object
and Social trust properties. The master node is periodically Relationship, co-work Object Relationship, ownership Object
updated based on the trust value using a regression model- Relationship and social object relationship. The experiments
based clustering. Experiments were conducted to test the per- were performed in MATLAB and they were focused on the
formance of the proposed approach. The results were presented performance of the method and comparison with other models.
in diagrams. The final results were presented in diagrams.
Aldawsari et al. [3] proposed a cluster based system. They Nitti et al. [54] proposed a system where the nodes evaluate
also incorporated a base station (BS) with unlimited energy the trustworthiness of other nodes based on their own observa-
into the network. For evaluating the trust in cluster level the tions and recommendations of common friends (between the
direct trust of the Cluster Head and the recommendations of trustor and the trustee). The trust parameters taken into account
its neighbors are encountered. For trust between two different are: feedback, the total number of transactions, credibility,
clusters the cluster heads and the BS are participating in the transaction factor, relationship factor, notion of centrality and
procedure. The energy consumption is taken into account to computation capability. Trust calculations rely on Social re-
calculate the trust. Experiments conducted on NS-3 simulator lationship factors. The following are the social relationships
to test the detection rate, the energy consumption, the trust that are formed in the model: Parental Object Relationship,
evaluation time and to compare the proposed scheme with co-location Object Relationship, co-work Object Relationship,
other methods. The results were presented in diagrams. ownership Object Relationship and social object relationship.
Marche et al. [49] proposed a system that focuses on detect- Experiments conducted to test the performance of the proposed
ing trust attacks. To achieve it machine learning techniques are solution. The results are presented in diagrams.
applied. Trust calculations rely on Social relationship factors. Wang et al. [67] proposed a trust model based on direct
The following are the social relationships that are formed in and indirect trust computation with trust prediction. The pre-
the model: Parental Object Relationship, co-location Object diction method depends on the combination of exponential
Relationship, co-work Object Relationship, ownership Object smoothing and a Markov chain. The exponential smoothing
Relationship and social object relationship. A malicious node was employed to predict the trust and a Markov chain is
can be malicious with everyone or selectively and perform the employed to fix any deviation. Thus, a prediction method was
following attacks: OOA, WHA, BMA, BSA, SA and OSA. employed to predict the current trust level based on interaction
For trust computations the following parameters are taken history, behavior history and some other factors like the device
into account: previous interactions, computation capabilities, model. For the trust computation both social and unsocial
relationship factor, external opinions, dynamic knowledge. parameters were considered. The following experiments were
Experiments conducted to test the performance of the iSVM performed: comparison of trust prediction with different expo-
used and the performance of the proposed solution. Diagrams nential smoothing coefficients, comparison between first and
second exponential smoothing, experiments for different kind from context similar nodes to calculate the trust of serving
of attacks. The results were presented as diagrams. nodes. The trust parameters used are the following: servers
Chen et al. [24] designed and analysed a trust management capability in terms of service provided, location, type of server,
protocol for SOA-based IoT systems. The IoT owners can Quality of service, similarity with the recommender, location
share their feedback, so a filtering method was proposed of the servers, list of requested services. The experiments were
to select the feedback of owners with common interests. focused on performance, resilience and comparison with other
Also, the nodes can adjust the weights of direct trust and models. The final results were presented in diagrams.
recommendations. The social aspects were used to weight Fang et al. [34] proposed a system with a cluster based
the recommendations: Friendship, social contact, community architecture. The paper proposes a trust management scheme
of interest. The user satisfaction is the trust parameter used using Dirichlet Distribution. Both the direct observations and
to calculate the trust. They also introduced a method for third party recommendation are considered to calculate the
trust storage. The malicious nodes can perform BMA, SPA, trust value of a node. This work is proposed to defend against
BSA and OSA. The experiments conducted on NS-3 simulator internal attacks. Experiments conducted on MATLAB focusing
and they are testing convergence, accuracy, resiliency, the on the comparison with Beta distribution based and Gaussian
effectiveness of storage management protocol and comparative distribution based, performance experiments for OOA. The
analysis. The results are presented in diagrams. final results were presented in diagrams.
Qureshi et al. [59] proposed a Trust Management system Din et al. [29] proposed a mechanism consisting of IoT-edge
for edge-based IoT networks. The proposed model combines nodes, application programming interface, and a centralized
direct and indirect trust to derive the trust level. The system’s trust agent. The trust agent evaluates the trust level. Based
threat model includes BMA, DoS and OOA. The trust cal- on their trust level the nodes are allowed to communicate
culation procedure takes into account the packet drop rate with other nodes. The trust properties used are the following:
and the packet data rate. OMNET++ used for the following compatibility, cooperativeness, delivery ratio, and recommen-
experiments: level of trustworthiness, detection rate, detection dations. The Contiki Cooja simulator was used to acquire the
accuracy, Detection of false positive rate, Impact of network results, Java language was used for the interaction, and virtual
life time, impact of average packet delay, impact of average machine was a platform for simulations. The experiments fo-
throughput and End to End delay analysis. cused on testing the quality-of-service (QoS) and the resilience
Guleng et al. [36] proposed a trust management architecture against BMA, BSA, WHA and SPA.
for vehicular ad hoc networks (VANET). Consequently, we can Mahmud et al. [48] proposed a trust management method
conclude that they studied a dynamic topology. The proposed for cloud based architecture for neuroscience applications. The
scheme is distributed and uses fuzzy logic to evaluate the proposed estimates the trust level using adaptive neuro-fuzzy
direct trust. For the indirect trust the authors proposed a inference system (ANFIS) and weighted additive methods.
reinforcement learning approach. In order to calculate the Furthermore, it is worth pointing out that this technique takes
trust scores they take into account the cooperativeness, the into account the behaviour of the node and the data trust -if
honesty, the responsibility factor and previous values. Also, the generated data are trusted. The Behavioral trust takes into
the proposed trust management takes into account the trust account: the Relative Frequency of Interaction, the intimacy,
about a message. They performed experiments using NS- the honesty, the previous interactions and the indirect trust. The
2.34 simulator to compare their method with ”w/o Trust” Data trust depends on the deviation of a node’s instantaneous
and ”Deterministic Trust”. Also a simulation of BMA was data from its historical data and indirect recommendations.
performed. The final results of the experiments were presented NS-2 simulator was used to perform the following experiments
in diagrams. Packet Forwarding Ratio, Network Throughput, Average En-
Bao et al. [15] proposed a dynamic trust management pro- ergy Consumption Ratio, Accuracy, F-measure, Comparison
tocol for IoT systems. The trust evaluation takes into account with other models and Different linguistic terms (5 and 3). The
direct and indirect recommendations and social aspects. They final results of the experiments were presented in diagrams.
also take into account the scalability in terms of storing the Yu et al. [72] proposed a system consisting of nodes and
trust values. The malicious nodes can perform BMA, SPA a base station (BS). The trust parameters for direct trust
and BSA. The nodes form communities and during the trust are: the packet forwarding capacity, the repetition rate, the
evaluation procedure the social aspects considered are the consistency of the packet content, the delay, the integrity,
honesty, the cooperativeness and the community of interest. etc. For the calculation of indirect trust the D-S theory was
Experiments conducted to observe the effect of some weights used. Experiments were conducted on MATAB to test the
used in the trust evaluation and the protocol resiliency to trust performance of the solution, the behavior under different
attacks. The results are presented in diagrams. attacks and compare the method to other schemes.
Altaf et al. [7] proposed a system consisting of users and Wen et al. [69] proposed a method based on [18], a cluster
service providers. The users are requesting services from the based scheme, where the nodes form communities of interest.
service providers. The context was used to calculate trust The whole network is governed by a SIOT server. In this work
in different context. One server has different trust scores the trust is evaluated from both direct and indirect trust. They
for every context. Each edge node takes recommendations introduced a deep learning model to predict the trust value
of the new nodes, in order to solve the cold start problem. SFA, Routing table overflow and resource consumption at-
The malicious nodes can perform BMA, BSA and OOA. tacks, Byzantine, BA, DoS attack and SDA. The trust is
The following experiments took place: accuracy with different computed based on the number of packets properly forwarded,
number of malicious nodes, comparison with another model the number of packets dropped and the number of packets
and adding a new node to the network. The final results were falsely injected. Experiments were performed to observe the
presented in diagrams. performance and the accuracy of the proposed solution. Also,
Kowshalya et al. [44] presented a system where the network they presented some diagrams depicting the comparison with
is presented as a graph. Where V are the participants and E two other models.
represents the edges between them. The devices form commu- Bao et al. [17] proposed a system where the nodes form
nities of interest based on parental, co work and co location communities of interest. The protocol is distributed and each
relationships. Also this paper ensures secure communication node evaluates the trust of nodes that the share interests.
among SIoT nodes through simple secret codes. For the trust The system can adapt to changes on communities of inter-
evaluation procedure the properties taken into account are the est through dynamically selecting the trust parameters. For
following: honesty, cooperativeness, community of interest and scalability the authors also proposed a storage management
energy. For the experiments the SWIM platform was used strategy to also save memory from the resource constraint
and the experiments tested the performance of the proposed IoT devices. The malicious nodes can perform BMA, SPA
model and compared it with other schemes. The results were and BSA. The experiments tested the effect of changing some
presented in diagrams. During the experiments the effect of weight values related to the trust evaluation procedure and
the trust weights were analysed. the trust evaluation with limited storage space. The results are
Bao et al. [16] consider an IoT environment with no presented in diagrams.
centralized trusted authority. Every device (node) has an owner Das et al. [25] proposed a system consisting of IoT nodes
and an owner could have many devices. Each owner has a list and Fog nodes. The IoT nodes communicate with the closest
of friends, representing its social relationships. The trust prop- Fog node. This paper proposes a community based trust
erties used for trust calculation are: honesty, cooperativeness, management architecture by considering self trust, social trust,
and community-interest. The threat model of this approach green trust and QoS trust. Experiments conducted on MAT-
includes BMA, SPA and BSA. The experiments tested the LAB concerning the performance of the system. Diagrams are
affect of trust parameters to the trust evaluation. presenting the final results of the experiments.
Adewuyi et al. [2] proposed a system called CTRUST. In Kouicem et al. [43] proposed a system based on a fog
this work the authors model the trust units with mathematical architecture that consists of the following components: IoT
functions. The trust properties used to calculate the trust service requesters, Service providers and fog nodes that are
level are: the social relationships between the nodes and the responsible for trust management. The Service providers and
context. This paper also introduces a parameter to model trust the for nodes participate in the blockchain. The paper proposes
maturity, the point at which trust can be computed using direct a new consensus mechanism. Each IoT object can assess the
interactions alone. The performance was evaluated based on trustworthiness of a service provider and share it. Exploiting
the trust accuracy, convergence, and resiliency. Diagrams are the blockchain architecture this protocol provides a global
presenting the final results. image of the trust values. The malicious service providers can
Mendoza et al. [50] proposed a distributed trust management perform: BMA, SPA, BSA, OOA and OSA. The malicious
model for multi-service IoT using direct and indirect observa- fog nodes can drop, delay, modify and redirect the received
tions. The Trust Management scheme assigns positive scores messages. The following parameters are taking into account
for honest nodes and negative scores for malicious nodes, for the trust evaluation procedure: A set of criteria reported
using direct interactions between nodes (services requests) and on the blockchain for direct trust, previous interactions and
recommendation from neighbors (by exchanging trust tables). recommendations. For the experiments a private blockchain
The authors implemented malicious nodes performing the was used and the consensus mechanism was a combination of
BMA to analyze the effectiveness of the model. The obtained PBFT and PoS. The following experiments were performed:
results from the experiments conducted on Cooja simulator different kind of weights, blockchain scalability evaluation and
show the proposed Trust Management model detects malicious comparison with other schemes. The results were presented in
behavior in the network, considering topologies with 10% until diagrams.
30% of malicious nodes. This model may be used to detect Abderrahim et al. [18] proposed a cluster approach. The
other common attacks in the IoT. nodes form communities of interest. The network is governed
Alnumay et al. [4] proposed a cluster based system, where by an SIOT server. This approach detects OOA thgough the
every cluster has a cluster head. The proposed trust model use of a Kalman Filter. The malicious nodes can perform
combines both direct and indirect trust. A Beta probabilistic BMA, BSA and OOA. The outcome of the transactions is
distribution is used and the theory of ARMA/GARCH to taken into account to calculate the trust, but also the previous
combine the trust units and derive the trust value. The cluster trust values. The code was developed using Python program-
heads are able to predict the trust value ahead using this ming language in order to identify the best weights under
method. A malicious node can perform the following attacks: which the estimated trust is close to the objective one, observe
the performance during OOA and perform experiments on trust WSN was considered consisting of a few sink nodes and a
prediction. The results are presented in diagrams. number of sensor nodes. The main goal of this paper is to
Awan et al. [10] proposed a multilevel architecture system. reduce energy consumption and latency for trust evaluation.
The nodes form communities of interest. Every community The paper proposed a method to find the optimal number
has a server to calculate the trust. A set of communities form of recommendations needed for trust evaluation while main-
a domain that has a server to calculate the trust of the domain. taining a high security level. The nodes are considered as
The whole system is governed by a server that is responsible players with the following strategies: reply or not reply to
for the trust of all the domains. The trust properties taken into save energy for trust computation. So this paper is proposing
account are compatibility, honesty and competence. a dilemma game. The malicious nodes may perform BMA,
Amiri-Zarandi et al. [8] proposed a fog architecture scheme. DoS or selfish attack. The parameter used to calculate the trust
The interactions between the nodes and the blockchain can is energy. NS-2 simulator was used to perform the following
be directly or via edge nodes. The nodes are divided into experiments: optimal selection of some values related to the
clusters and they communicate with a fog device. The social trust process and comparison with other mechanisms. The
connection between the devices are used for trust evaluation. results are presented in diagrams.
The scheme also works with recommendation, that are being Chen et al. [62] proposed a trust management protocol for
filtered by a lightweight algorithm. The blockchain is used Social IoT systems that can form community of interests. The
for storing the trust related data.The malicious nodes can trust parameters can dynamically be adapted to the changes of
perform BMA, BSA, SFA and DoS. Honesty was used as the the environment. The malicious nodes can perform discrimi-
trust parameter. Also, the following experiments took place nation attacks, BMA, SPA, WHA and BSA. Each device has
using the Ethereum blockchain: performance evaluation and an owner. Each owner has a list of friends, representing its
experimental comparison with other models. The results were social relationships. The trust parameters taken into account
presented in diagrams and tables. for the trust evaluation procedure are honesty, cooperativeness
Fang et al. [33] proposed a trust management technology and community of interest. Experiments conducted on NS-3
that guards the system from OOA. Also Beta distribution simulator to test the performance of the proposed protocol.
is used for the trust evaluation procedure. The authors also Awan et al. [11] proposed a mechanism that mainly works
mentioned the cyber-security requirements for Information- with direct observations and ask for recommendations if no
Centric Networking. Experiments conducted on MATLAB for interactions were recorded in the past. The authors also took
observing the performance of the scheme and comparison with into account the scalability, since the nodes only store the
other techniques. result of the experience component. Other trust parameters are
Chen et al. [23] focuses on a dynamic architecture, which the reputation and the knowledge. The following experiments
means that some nodes ma leave or enter the network. The took place on NS-3 simulator: the behavior of the solution
nodes are divided to Service Providers and Service Requestors. was tested on BSA, BMA and OOA, comparison with other
This work proposes a distributed fuzzy-logic trust management models and energy consumption.
scheme. The model consists of both direct trust (monitoring
the neighbors) and indirect trust (recommendations). In order C. Fuzzy Logic
to calculate the trust the following values are considered: Boolean logic permits expressions that are either true or
the end to end forwarding ratio (EPFR), the average energy false. However, in real life, sometimes, truth is a spectrum.
consumption (AEC) and the packet delivery ratio(PDR). Also Fuzzy logic is a multi value logic that permits intermediate
a global trust can be issued in order to obtain a more values between true and false [22][38]. There are some works
accurate value of trust. For the experiments the NS-3 simulator on trust management that exploit the nature of fuzzy logic
was used and the following values were taken into account: to represent the trust as a spectrum between trusted and not
EPFR, AEC, PDR, convergence speed, detection probability trusted. A summary of the findings is presented in Table VI.
and comparison with other models. The final results of the We can observe from the table that all of the papers provide
experiments were presented in diagrams. experiments. We can see that 80% of the papers mention
Jayasinghe et al. [40] proposed a system, where the nodes the simulator used to conduct the experiments. Regarding the
form communities of interests. In these model the transactions Trust Update 60% of the paper preferred an Event Driven
are under evaluation and should be determined if a transaction approach, while the rest (40%) the Time Driven method. It
is trustworthy. The trust parameters used are co-location is interesting to notice that none of the papers is using a
relationship, co-work relationship, mutuality and centrality Centralized authority for trust evaluation and none of the
and cooperativeness. An unsupervised learning technique was papers prefer a Single Trust approach. It is also worth pointing
employed for labeling the data’s trustworthiness. After the out that 20% of the papers in this category do not use direct
labeling, an SVM model is predicting the trust level. Ex- or indirect trust. Finally, 60% of the papers define the Threat
periments were performed to observe the performance of the Model.
proposed solution. Alshehri et al. [6] proposed a cluster based architecture
Duan et al. [31] adopted watchdog. Each sensor node is including: One super node and many master nodes that are re-
responsible for monitoring the behavior of its neighbors. A sponsible for multiple cluster nodes. Only the cluster nodes are
Time Event Threat
Paper Direct Indirect Experiments Centralized Single Trust Multi trust Simulator
Driven Driven Model
[60] X X X X X X
[21] X X X X X
[53] X X X X X
[58] X X X X X X
[9] X X X X X X
[3] X X X X X X
[49] X X X X X X
[1] X X X X X X
[54] X X X X X
[67] X X X X
[24] X X X X X X X
[59] X X X X X X X
[36] X X X X X X
[15] X X X X X X
[7] X X X X X
[34] X X X X
[29] X X X X X X
[48] X X X X X X X
[72] X X X X X
[69] X X X X X X
[44] X X X X X X
[16] X X X X X X
[2] X X X X X
[50] X X X X X X
[4] X X X X X X
[17] X X X X X
[25] X X X X X
[43] X X X X X X
[18] X X X X X X X
[10] X X X X X X
[8] X X X X X X
[33] X X X X X X
[23] X X X X X X X
[40] X X X X
[31] X X X X X X
[62] X X X X X X X
[11] X X X X X X X

TABLE V: Overview of approaches proposing Trust Management methods using Recommendations

considered to be malicious. The malicious nodes can perform for vehicular ad hoc networks (VANET). Consequently, we can
OOA. Alshehri et al. introduced five algorithms to calculate the conclude that they studied a dynamic topology. The proposed
trust score of every cluster node. In order to calculate the trust scheme is distributed and uses fuzzy logic to evaluate the
score they take into account the quality of service, the history direct trust. For the indirect trust the authors proposed a
score and the trust score. They use a fuzzy approach to classify reinforcement learning approach. In order to calculate the
the trust scores into fuzzy sets. The nodes are then classified trust scores they take into account the cooperativeness, the
in 3 categories: trusted, semi-trusted and non-trusted. Based honesty, the responsibility factor and previous values. Also,
on the trust score the nodes can change clusters and based on the proposed trust management takes into account the trust
the category they can perform specific acts. They performed about a message. They performed experiments using NS-
experiments in Cooja simulator regarding scalability, accuracy 2.34 simulator to compare their method with ”w/o Trust”
of different attacks and fuzzy and non fuzzy approaches and and ”Deterministic Trust”. Also a simulation of BMA was
they presented diagrams with the results. They also proposed performed. The final results of the experiments were presented
a HEXA decimal-based messaging system that can be used to in diagrams.
detect tampered messages in transit.
Mahmud et al. [48] proposed a trust management method
Guleng et al. [36] proposed a trust management architecture for cloud based architecture for neuroscience applications. The
proposed estimates the trust level using adaptive neuro-fuzzy are managing the chain though a consensus mechanism. This
inference system (ANFIS) and weighted additive methods. property made the blockchain popular in different applications.
Furthermore, it is worth pointing out that this technique takes In the scope of trust management for IoT, some works exploit
into account the behaviour of the node and the data trust -if the properties of the blockchain to calculate or store the trust
the generated data are trusted. The Behavioral trust takes into data. A summary of the results can be seen in Table VII.
account: the Relative Frequency of Interaction, the intimacy, We can observe from the table that all of the papers provide
the honesty, the previous interactions and the indirect trust. The experiments but only 28.6% of the papers provide the simula-
Data trust depends on the deviation of a node’s instantaneous tor used. None of the papers proposes a Centralized approach,
data from its historical data and indirect recommendations. which makes sense since we are examining blockchain-based
NS-2 simulator was used to perform the following experiments methods. Regarding the information gathering: 14.3% is using
Packet Forwarding Ratio, Network Throughput, Average En- only direct trust, 42.8% are using also recommendations and
ergy Consumption Ratio, Accuracy, F-measure, Comparison 42.8% do not use an information gathering technique. Most
with other models and Different linguistic terms (5 and 3). The of the approaches are Event Driven (71.4%), while the rest
final results of the experiments were presented in diagrams. (28.6%) are Time Driven. In total, 85.7% are referring to
Chen et al. [23] focuses on a dynamic architecture, which the trust formation, with 57.1% using the Multi trust scheme.
means that some nodes ma leave or enter the network. The Finally, 85.7% are defining the Threat Model.
nodes are divided to Service Providers and Service Requestors. Dedeoglu et al. [28] proposed a system containing sensors
This work proposes a distributed fuzzy-logic trust management and gateways. Gateways are running the blockchain and are
scheme. The model consists of both direct trust (monitoring associated with a number of sensors. A malicious sensor can
the neighbors) and indirect trust (recommendations). In order tamper with the data and a malicious gateway can gener-
to calculate the trust the following values are considered: ate invalid blocks. A lightweight block generation scheme
the end to end forwarding ratio (EPFR), the average energy were proposed where blocks are generated in time intervals.
consumption (AEC) and the packet delivery ratio(PDR). Also The block validation mechanism adapts the block validation
a global trust can be issued in order to obtain a more scheme based on the reputation of the node that generated the
accurate value of trust. For the experiments the NS-3 simulator block and the number of validators. For the consensus mech-
was used and the following values were taken into account: anism the following method was introduced: If a validator
EPFR, AEC, PDR, convergence speed, detection probability detects an invalid transaction it broadcasts INVALID and the
and comparison with other models. The final results of the nodes have to validate the transaction, otherwise the block is
experiments were presented in diagrams. appended on the blockchain. The proposed technique evaluates
Esposito et al. [32] proposed a system consisting of IoT the trustworthiness of sensor observations. The sensor assigns
nodes that communicate with edge nodes, that participate in a confident value to the data and send the data to a gateway.
a blockchain. The blockchain stores a smart contract that The gateway compares the data with the data of the other
periodically stores the trust scores. The smart contract receives cluster sensors (assumption: the sensors of the same cluster
the real numbers extracted from the nodes and uses fuzzy have correlated data). At the end based on the result the
logic to translate the real numbers into linguistic terms. The reputation of the node is being recalculated. The gateways
main threat of the system is to store on the blockchain a store the information on a blockchain. The reputation of the
false value for the computed trust score. So, the solution gateways is calculated based on their acts during the generation
is focusing on finding a way to reject these kind of false and validation of the blocks. The trust parameters taken into
messages. A game theoretic approach was employed forming a account are the confidence of the data source, the reputation
game between the edge node and a common node. A node has of the data source and evidence of other observations. The
two available actions: to send a message or to avoid sending experiments took place in NS-3 simulator and they are both
a message. This message might contain malicious data. At blockchain related and trust related. The final results were
the reception of the message, the edge node can do only two presented in diagrams.
possible actions: Y indicating that it accepts the message and Debe et al. [27] proposed a scheme based on Ethereum
passes it to the blockchain participants to update its state, or blockchain where gateways are presented as full nodes of the
N indicating that it rejects the message and does not pass blockchain and sensors as lightweight nodes. They propose
it to the blockchain. Real sensors was used for performing a data attestation solution. The lightweight nodes get some
the following experiments: comparison with other models, responses from the full nodes. These responses are validated
belief evolution, attack success probability with and without by other full nodes. The attack this work tackles is EA. The
the proposed defense. The final results of the experiments were trust is calculated on a smart contract and the parameter used to
presented in diagrams. assess the trustworthiness of a gateway is the client’s feedback.
The code is publicly available and the experiments focused on
D. Blockchain Based smart contract code vulnerability analysis with tools.
The blockchain is a distributed database or ledger first Putra et al. [58] proposed a system where sensors are
introduced in [52] as an underlying technology for bitcoin. divided into Service Providers and Service Consumers, that
Blockchain provides immutability, since all the participants consist the lightweight clients in the main blockchain. Also a
Time Event Threat
Paper Direct Indirect Experiments Centralized Single Trust Multi trust Simulator
Driven Driven Model
[6] X X X X X
[36] X X X X X X
[48] X X X X X X X
[23] X X X X X X X
[32] X X X

TABLE VI: Overview of approaches proposing Fuzzy Logic Trust Management methods

set of permissioned blockchains are implemented to maintain be directly or via edge nodes. The nodes are divided into
the sensitive data of the sensors. These chains are maintained clusters and they communicate with a fog device. The social
in a consortium of independent and partially trusted entities. connection between the devices are used for trust evaluation.
The following attacks can be performed by a malicious node: The scheme also works with recommendation, that are being
BMA, RA, PA, BSA, WA and SA. The trust is calculated on a filtered by a lightweight algorithm. The blockchain is used
smart contract in the main blockchain. The experiments took for storing the trust related data.The malicious nodes can
place in a real environment. For the blockchains the Rinkeby perform BMA, BSA, SFA and DoS. Honesty was used as the
Ethereum test-network was used as the main blockchain and trust parameter. Also, the following experiments took place
private chains for storing the sensitive data. The following using the Ethereum blockchain: performance evaluation and
experiments took place: different kind of weights for calculat- experimental comparison with other models. The results were
ing the trust scores, comparison wit other schemes, trust ans presented in diagrams and tables.
reputation convergence, latency and required gas. The final Esposito et al. [32] proposed a system consisting of IoT
results were presented in diagrams and tables. nodes that communicate with edge nodes, that participate in
Kouicem et al. [43] proposed a system based on a fog a blockchain. The blockchain stores a smart contract that
architecture that consists of the following components: IoT periodically stores the trust scores. The smart contract receives
service requesters, Service providers and fog nodes that are the real numbers extracted from the nodes and uses fuzzy
responsible for trust management. The Service providers and logic to translate the real numbers into linguistic terms. The
the for nodes participate in the blockchain. The paper proposes main threat of the system is to store on the blockchain a
a new consensus mechanism. Each IoT object can assess the false value for the computed trust score. So, the solution
trustworthiness of a service provider and share it. Exploiting is focusing on finding a way to reject these kind of false
the blockchain architecture this protocol provides a global messages. A game theoretic approach was employed forming a
image of the trust values. The malicious service providers can game between the edge node and a common node. A node has
perform: BMA, SPA, BSA, OOA and OSA. The malicious two available actions: to send a message or to avoid sending
fog nodes can drop, delay, modify and redirect the received a message. This message might contain malicious data. At
messages. The following parameters are taking into account the reception of the message, the edge node can do only two
for the trust evaluation procedure: A set of criteria reported possible actions: Y indicating that it accepts the message and
on the blockchain for direct trust, previous interactions and passes it to the blockchain participants to update its state, or
recommendations. For the experiments a private blockchain N indicating that it rejects the message and does not pass
was used and the consensus mechanism was a combination of it to the blockchain. Real sensors was used for performing
PBFT and PoS. The following experiments were performed: the following experiments: comparison with other models,
different kind of weights, blockchain scalability evaluation and belief evolution, attack success probability with and without
comparison with other schemes. The results were presented in the proposed defense. The final results of the experiments were
diagrams. presented in diagrams.
Bordel et al. [20] proposed a method where a trusted third E. Game Theory
party is acting as TTP. The IoT messages are controlled by Game theory provides the framework to describe strategic
the third party. This party is acting between the IoT nodes and interaction between rational players. The nodes of a system
the blockchain. The architecture is based on the Blockchain can be seen as rational players, since they try to maintain a
technology and the computation of different conceptual models high trust score in order to be selected as service providers.
(cognitive, computational, neurological and game theoretical) Therefore, some works model the trust management method
using stochastic functions. Smart contracts are employed to as a game using game theoretic approaches. A summary of
calculate the global trust. Matlab 2020 was used to perform the results can be seen in Table VIII.
the following experiments: convergence time and success rate. We can observe from the Table that all of the papers present
The results were presented in diagrams. experiments and define the threat model. Even though all the
Amiri-Zarandi et al. [8] proposed a fog architecture scheme. papers provide experiments, 25% of them state the simulator
The interactions between the nodes and the blockchain can used. Also all of the papers provide a Time Driven solution,
Time Event Threat
Paper Direct Indirect Experiments Centralized Single Trust Multi trust Simulator
Driven Driven Model
[28] X X X X X X
[27] X X X X
[58] X X X X X X
[43] X X X X X X
[20] X X X X
[8] X X X X X X
[32] X X X

TABLE VII: Overview of approaches proposing Blockchain based Trust Management methods

but 25% of them provide a hybrid scheme with both Event and the proposed defense. The final results of the experiments were
Time driven approach. None of the papers involve a centralized presented in diagrams.
authority in their system. Regarding the Trust Formation: 25% Rani et al. [61] considered a number of sensor nodes,
of them are using multiple trust parameters, 25% only a single deployed randomly in a network field. All these nodes are
trust parameter and 50% do not specify the trust formation. equipped with limited power batteries and have equal short ra-
Djedjig et al. [30] proposed a distributed cooperation-trust- dio range. A base station with unlimited source of energy as a
based routing mechanism for RPL, where the malicious nodes central administrative authority is also deployed in the network
can perform rank attacks and BA. At each hop of an RPL field. It is also considered that the nodes of the network form
routing path, the child node selects the node that has higher clusters. A cluster consists of cluster members and a cluster
trust value, more energy and better link quality as its preferred head. The proposed scheme uses the evolutionary game theory
parent. The trust is calculated by taking into account the energy in cluster formation, and non-cooperative game theory to de-
consumption, the honesty, the selfishness and the ETX. Also, tect the malicious nodes in the network. When a node receives
they translated the proposed trust management method into a a trust request it has two possible actions: to reply, or not reply.
strategy using game theory concepts. A non-trusted node will When a node replies it has some communication cost, that
be discarded from the network. So, there is no advantage for helps in energy efficiency. The malicious nodes can perform
a rational player to misbehave since it will be discarded from BMA, OOA, packet modification, collusion attacks, DoS, BA,
the network. The foundation of the solution is a non-zero-sum WHA. The experiments performed on NS-3 simulator focusing
non-cooperative iterated PD game. Experiments performed on: detection rate, average energy consumption, comparison
using Cooja simulator and were focused on comparing the with other schemes, trust evaluation time and detection time.
proposed method with other schemes in terms of: throughput, The results were presented in diagrams.
energy, Average Node Rank Changes under Blackhole and Duan et al. [31] adopted watchdog. Each sensor node is
Rank attacks and Average Packet Delivery Ratio. The results responsible for monitoring the behavior of its neighbors. A
were presented as diagrams. WSN was considered consisting of a few sink nodes and a
number of sensor nodes. The main goal of this paper is to
Esposito et al. [32] proposed a system consisting of IoT reduce energy consumption and latency for trust evaluation.
nodes that communicate with edge nodes, that participate in The paper proposed a method to find the optimal number
a blockchain. The blockchain stores a smart contract that of recommendations needed for trust evaluation while main-
periodically stores the trust scores. The smart contract receives taining a high security level. The nodes are considered as
the real numbers extracted from the nodes and uses fuzzy players with the following strategies: reply or not reply to
logic to translate the real numbers into linguistic terms. The save energy for trust computation. So this paper is proposing
main threat of the system is to store on the blockchain a a dilemma game. The malicious nodes may perform BMA,
false value for the computed trust score. So, the solution DoS or selfish attack. The parameter used to calculate the trust
is focusing on finding a way to reject these kind of false is energy. NS-2 simulator was used to perform the following
messages. A game theoretic approach was employed forming a experiments: optimal selection of some values related to the
game between the edge node and a common node. A node has trust process and comparison with other mechanisms. The
two available actions: to send a message or to avoid sending results are presented in diagrams.
a message. This message might contain malicious data. At
the reception of the message, the edge node can do only two
F. Context
possible actions: Y indicating that it accepts the message and
passes it to the blockchain participants to update its state, or One node can participate in many contexts and behave
N indicating that it rejects the message and does not pass differently in each one. Some works are taking into account the
it to the blockchain. Real sensors was used for performing different contexts to evaluate the trustworthiness of the node.
the following experiments: comparison with other models, The summary of the findings for this category are presented
belief evolution, attack success probability with and without in Table IX.
Time Event Threat
Paper Direct Indirect Experiments Centralized Single Trust Multi trust Simulator
Driven Driven Model
[30] X X X X X X X X
[32] X X X
[61] X X X X X
[31] X X X X X X

TABLE VIII: Overview of approaches proposing Game Theoretic Trust Management methods

We can observe from the table that all of the papers are us- recommendations and to select the most relevant ones. The
ing Event Driven approach, they provide experiments and use trust is calculated based on the following parameters: score
multiple parameters for trust calculation. 20% of the papers given by the requester node to service provider evaluating the
are using only direct observations for information gathering, offered service, a weight that depends on time and similarity
while the rest (75%) are also using recommendations. Also, and quality of recommendations. Experiments were performed
20% of the papers are using a central authority for deriving focused on the comparison of reactions against different kind
the trust. Even though all the papers provide experiments, only of attacks like on off, bad mouthing and selective behavior
20% of them indicates the simulator used. Finally, 20% of the attack.
papers define the threat model. Abidi et al. [1] proposed a system consisting of: nodes
Rafey et al. [60] proposed a system where nodes are forming that create social relationships, a context Manager, a social
communities of interest. The proposed model takes social relationship manager and a trust formation adjustor. The goal
relationships into account to evaluate trust. Also, the trust is of the system is to assist the nodes to find trustworthy service
calculated in the different contexts the node is participating providers. The level of trust of the service providers depend
and the final trust is the summation of the individual ones. both on direct trust (the interactions between the requestor and
This work also presents a way for storing the trust values. the service provider) and recommendations of the requestor’s
The trust is derived from node transaction factors: Com- neighbors. The trust parameters adjust to the network context
putational power, Context importance, Confidence, feedback and the relationships between the nodes. The trust parameters
and social relationship factors: owner trust and SIoT rela- taken into account are the quality of Service and social trust
tionship. The malicious entities can be: individual malevolent properties like honesty cooperativeness and social relation-
nodes, malevolent collectives, malevolent spies, malevolent ships. Trust calculations rely on Social relationship factors.
pre-trusted nodes, partially malevolent collectives or malev- The following are the social relationships that are formed in
olent collectives with camouflage and they can perform SA the model: Parental Object Relationship, co-location Object
and BMA. The experiments were focused on performance Relationship, co-work Object Relationship, ownership Object
and comparison with other mechanisms. The final results were Relationship and social object relationship. The experiments
presented in diagrams. were performed in MATLAB and they were focused on the
performance of the method and comparison with other models.
Altaf et al. [7] proposed a system consisting of users and
The final results were presented in diagrams.
service providers. The users are requesting services from the
Adewuyi et al. [2] proposed a system called CTRUST. In
service providers. The context was used to calculate trust
this work the authors model the trust units with mathematical
in different context. One server has different trust scores
functions. The trust properties used to calculate the trust
for every context. Each edge node takes recommendations
level are: the social relationships between the nodes and the
from context similar nodes to calculate the trust of serving
context. This paper also introduces a parameter to model trust
nodes. The trust parameters used are the following: servers
maturity, the point at which trust can be computed using direct
capability in terms of service provided, location, type of server,
interactions alone. The performance was evaluated based on
Quality of service, similarity with the recommender, location
the trust accuracy, convergence, and resiliency. Diagrams are
of the servers, list of requested services. The experiments were
presenting the final results.
focused on performance, resilience and comparison with other
models. The final results were presented in diagrams. G. Social
Saied et al. [19] proposed a context aware and multi service Social IoT provides a combination between IoT and social
trust management system. Upon a request from a node asking networking. The sensors can establish social relationships [51].
for assistance, the trust manager starts the entity selection Some works are exploiting this aspect in order to create trust
process to return a set of trustworthy assisting nodes to the management methods. A summary of the findings for this
requester. A set of recommenders send reports, the most category can be seen in Table X.
important reports are those that lie to the same or more We can observe from the table that 94.4% of the papers
similar service and recent ones. A quality of recommendation are using both direct and indirect trust, only 5.6% is using
score is assigned to each node reflecting its trustworthiness only direct observations. Regarding the Trust Update 77.8%
when rating other nodes. The context was used to filter out of the papers are using the Event Driven approach, 11.1%
Time Event Threat
Paper Direct Indirect Experiments Centralized Single Trust Multi trust Simulator
Driven Driven Model
[60] X X X X X X
[7] X X X X X
[19] X X X X X
[1] X X X X X X
[2] X X X X X

TABLE IX: Overview of approaches proposing Context based Trust Management methods

are using the Time Driven approach and 11.1% do not refer Object Relationship, ownership Object Relationship and social
to the Trust Update. It is worth pointing out that 5.6% of object relationship. The experiments conducted are focusing
the papers are using a hybrid approach to the Trust Update. on comparing the performance with other models and how
Also, 94.4% are presenting Experiments but only 22.2% the proposed approaches work with three different dynamic
of them are referring to the simulator used. 11.1% of the behaviors of the nodes.
papers preferred a Centralized authority to manage the trust Mon et al. [9] proposed a cluster based system with a central
calculation procedure. Regarding the Trust Formation: 11.1% trust entity. Initially a cluster is formed and the master node
of the papers are using Single Trust approach, while the rest is selected based on their trust scores, which includes QoS
(88.9%) are using Multi Trust approach. Finally, 90% of the and Social trust properties. The master node is periodically
papers are defining the Threat Model. updated based on the trust value using a regression model-
Rafey et al. [60] proposed a system where nodes are forming based clustering. Experiments were conducted to test the per-
communities of interest. The proposed model takes social formance of the proposed approach. The results were presented
relationships into account to evaluate trust. Also, the trust is in diagrams.
calculated in the different contexts the node is participating Marche et al. [49] proposed a system that focuses on detect-
and the final trust is the summation of the individual ones. ing trust attacks. To achieve it machine learning techniques are
This work also presents a way for storing the trust values. applied. Trust calculations rely on Social relationship factors.
The trust is derived from node transaction factors: Computa- The following are the social relationships that are formed in
tional power, Context importance, Confidence, feedback and the model: Parental Object Relationship, co-location Object
social relationship factors: owner trust and SIoT relationship. Relationship, co-work Object Relationship, ownership Object
Therefore, trust calculations rely on Social relationship factors. Relationship and social object relationship. A malicious node
The owner trust includes centrality and friendship. The mali- can be malicious with everyone or selectively and perform the
cious entities can be: individual malevolent nodes, malevolent following attacks: OOA, WHA, BMA, BSA, SA and OSA.
collectives, malevolent spies, malevolent pre-trusted nodes, For trust computations the following parameters are taken
partially malevolent collectives or malevolent collectives with into account: previous interactions, computation capabilities,
camouflage and they can perform SA and BMA. The exper- relationship factor, external opinions, dynamic knowledge.
iments were focused on performance and comparison with Experiments conducted to test the performance of the iSVM
other mechanisms. The final results were presented in dia- used and the performance of the proposed solution. Diagrams
grams. are presenting the results of the experiments.
Nitti et al. [53] proposed a system consisting of a network Abidi et al. [1] proposed a system consisting of: nodes
of nodes, a number of pre-trusted entities to hold a distributed that create social relationships, a context Manager, a social
hash table structure and four other components to man- relationship manager and a trust formation adjustor. The goal
age the network: relationship management, service discovery, of the system is to assist the nodes to find trustworthy service
service composition and trustworthiness management. This providers. The level of trust of the service providers depend
paper defined two models for trustworthiness management, both on direct trust (the interactions between the requestor and
the subjective and the objective. In the first model each node the service provider) and recommendations of the requestor’s
computes the trustworthiness of its friends using its own neighbors. The trust parameters adjust to the network context
experience and the opinion of the friends in common. In the and the relationships between the nodes. The trust parameters
second model, the information of each node is stored on a taken into account are the quality of Service and social trust
distributed hash table structure. The following trust parameters properties like honesty cooperativeness and social relation-
are taken into account: feedback, the total number of transac- ships. Trust calculations rely on Social relationship factors.
tions, credibility, transaction factor, relationship factor, notion The following are the social relationships that are formed in
of centrality and computation capability. Trust calculations the model: Parental Object Relationship, co-location Object
rely on Social relationship factors. The following are the Relationship, co-work Object Relationship, ownership Object
social relationships that are formed in the model: Parental Relationship and social object relationship. The experiments
Object Relationship, co-location Object Relationship, co-work were performed in MATLAB and they were focused on the
performance of the method and comparison with other models. represents the edges between them. The devices form commu-
The final results were presented in diagrams. nities of interest based on parental, co work and co location
Nitti et al. [54] proposed a system where the nodes evaluate relationships. Also this paper ensures secure communication
the trustworthiness of other nodes based on their own observa- among SIoT nodes through simple secret codes. For the trust
tions and recommendations of common friends (between the evaluation procedure the properties taken into account are the
trustor and the trustee). The trust parameters taken into account following: honesty, cooperativeness, community of interest and
are: feedback, the total number of transactions, credibility, energy. For the experiments the SWIM platform was used
transaction factor, relationship factor, notion of centrality and and the experiments tested the performance of the proposed
computation capability. Trust calculations rely on Social re- model and compared it with other schemes. The results were
lationship factors. The following are the social relationships presented in diagrams. During the experiments the effect of
that are formed in the model: Parental Object Relationship, the trust weights were analysed.
co-location Object Relationship, co-work Object Relationship, Adewuyi et al. [2] proposed a system called CTRUST. In
ownership Object Relationship and social object relationship. this work the authors model the trust units with mathematical
Experiments conducted to test the performance of the proposed functions. The trust properties used to calculate the trust
solution. The results are presented in diagrams. level are: the social relationships between the nodes and the
Wang et al. [67] proposed a trust model based on direct context. This paper also introduces a parameter to model trust
and indirect trust computation with trust prediction. The pre- maturity, the point at which trust can be computed using direct
diction method depends on the combination of exponential interactions alone. The performance was evaluated based on
smoothing and a Markov chain. The exponential smoothing the trust accuracy, convergence, and resiliency. Diagrams are
was employed to predict the trust and a Markov chain is presenting the final results.
employed to fix any deviation. Thus, a prediction method was Bao et al. [17] proposed a system where the nodes form
employed to predict the current trust level based on interaction communities of interest. The protocol is distributed and each
history, behavior history and some other factors like the device node evaluates the trust of nodes that the share interests.
model. For the trust computation both social and unsocial The system can adapt to changes on communities of inter-
parameters were considered. The following experiments were est through dynamically selecting the trust parameters. For
performed: comparison of trust prediction with different expo- scalability the authors also proposed a storage management
nential smoothing coefficients, comparison between first and strategy to also save memory from the resource constraint
second exponential smoothing, experiments for different kind IoT devices. The malicious nodes can perform BMA, SPA
of attacks. The results were presented as diagrams. and BSA. The experiments tested the effect of changing some
Chen et al. [24] designed and analysed a trust management weight values related to the trust evaluation procedure and
protocol for SOA-based IoT systems. The IoT owners can the trust evaluation with limited storage space. The results are
share their feedback, so a filtering method was proposed presented in diagrams.
to select the feedback of owners with common interests. Das et al. [25] proposed a system consisting of IoT nodes
Also, the nodes can adjust the weights of direct trust and and Fog nodes. The IoT nodes communicate with the closest
recommendations. The social aspects were used to weight Fog node. This paper proposes a community based trust
the recommendations: Friendship, social contact, community management architecture by considering self trust, social trust,
of interest. The user satisfaction is the trust parameter used green trust and QoS trust. Experiments conducted on MAT-
to calculate the trust. They also introduced a method for LAB concerning the performance of the system. Diagrams are
trust storage. The malicious nodes can perform BMA, SPA, presenting the final results of the experiments.
BSA and OSA. The experiments conducted on NS-3 simulator Awan et al. [10] proposed a multilevel architecture system.
and they are testing convergence, accuracy, resiliency, the The nodes form communities of interest. Every community
effectiveness of storage management protocol and comparative has a server to calculate the trust. A set of communities form
analysis. The results are presented in diagrams. a domain that has a server to calculate the trust of the domain.
Bao et al. [15] proposed a dynamic trust management pro- The whole system is governed by a server that is responsible
tocol for IoT systems. The trust evaluation takes into account for the trust of all the domains. The trust properties taken into
direct and indirect recommendations and social aspects. They account are compatibility, honesty and competence.
also take into account the scalability in terms of storing the Amiri-Zarandi et al. [8] proposed a fog architecture scheme.
trust values. The malicious nodes can perform BMA, SPA The interactions between the nodes and the blockchain can
and BSA. The nodes form communities and during the trust be directly or via edge nodes. The nodes are divided into
evaluation procedure the social aspects considered are the clusters and they communicate with a fog device. The social
honesty, the cooperativeness and the community of interest. connection between the devices are used for trust evaluation.
Experiments conducted to observe the effect of some weights The scheme also works with recommendation, that are being
used in the trust evaluation and the protocol resiliency to trust filtered by a lightweight algorithm. The blockchain is used
attacks. The results are presented in diagrams. for storing the trust related data.The malicious nodes can
Kowshalya et al. [44] presented a system where the network perform BMA, BSA, SFA and DoS. Honesty was used as the
is presented as a graph. Where V are the participants and E trust parameter. Also, the following experiments took place
using the Ethereum blockchain: performance evaluation and history, behavior history and some other factors like the device
experimental comparison with other models. The results were model. For the trust computation both social and unsocial
presented in diagrams and tables. parameters were considered. The following experiments were
Jayasinghe et al. [40] proposed a system, where the nodes performed: comparison of trust prediction with different expo-
form communities of interests. In these model the transactions nential smoothing coefficients, comparison between first and
are under evaluation and should be determined if a transaction second exponential smoothing, experiments for different kind
is trustworthy. The trust parameters used are co-location of attacks. The results were presented as diagrams.
relationship, co-work relationship, mutuality and centrality Subhash et al. [66] proposed Power Trust. Power Trust
and cooperativeness. An unsupervised learning technique was assigns trust values to the nodes of the network based on
employed for labeling the data’s trustworthiness. After the the energy auditing. Using the energy auditing model, they
labeling, an SVM model is predicting the trust level. Ex- calculate trust values of every node present in the network
periments were performed to observe the performance of the dynamically and predict the physical attacks and cyber-attacks.
proposed solution. In order to detect the attacks, a deep learning model was
Bao et al. [16] consider an IoT environment with no trained with past data that contains normal and excessive en-
centralized trusted authority. Every device (node) has an owner ergy consumption due to an attack. The model can predict both
and an owner could have many devices. Each owner has a list physical and cyber attacks. The experiments were performed
of friends, representing its social relationships. The trust prop- in Cooja simulator and they were focused in the performance
erties used for trust calculation are: honesty, cooperativeness, and the accuracy of the method. The results were presented in
and community-interest. The threat model of this approach diagrams.
includes BMA, SPA and BSA. The experiments tested the Wen et al. [69] proposed a method based on [18], a cluster
affect of trust parameters to the trust evaluation. based scheme, where the nodes form communities of interest.
Chen et al. [62] proposed a trust management protocol for The whole network is governed by a SIOT server. In this work
Social IoT systems that can form community of interests. The the trust is evaluated from both direct and indirect trust. They
trust parameters can dynamically be adapted to the changes of introduced a deep learning model to predict the trust value
the environment. The malicious nodes can perform discrimi- of the new nodes, in order to solve the cold start problem.
nation attacks, BMA, SPA, WHA and BSA. Each device has The malicious nodes can perform BMA, BSA and OOA.
an owner. Each owner has a list of friends, representing its The following experiments took place: accuracy with different
social relationships. The trust parameters taken into account number of malicious nodes, comparison with another model
for the trust evaluation procedure are honesty, cooperativeness and adding a new node to the network. The final results were
and community of interest. Experiments conducted on NS-3 presented in diagrams.
simulator to test the performance of the proposed protocol. Alnumay et al. [4] proposed a cluster based system, where
every cluster has a cluster head. The proposed trust model
H. Prediction combines both direct and indirect trust. A Beta probabilistic
Sometimes the image of the trustworthiness of a node is distribution is used and the theory of ARMA/GARCH to
not clear, so a prediction mechanism would help the rest of combine the trust units and derive the trust value. The cluster
the nodes estimate its trust level. There are works for trust heads are able to predict the trust value ahead using this
management that use prediction mechanisms to enhance the method. A malicious node can perform the following attacks:
trust evaluation process. The summary of the findings for this SFA, Routing table overflow and resource consumption at-
category are presented in Table XI. tacks, Byzantine, BA, DoS attack and SDA. The trust is
We can observe from the Table that 33.3% of the paper are computed based on the number of packets properly forwarded,
using only direct trust for information gathering, while 66.6% the number of packets dropped and the number of packets
also also using recommendations. Regarding the Trust Update: falsely injected. Experiments were performed to observe the
16.7% of the papers are using a Time Driven approach, 33.3% performance and the accuracy of the proposed solution. Also,
are using an Event Driven approach and 50% do not refer to they presented some diagrams depicting the comparison with
the Trust Update. All of the papers present Experiments, but two other models.
only 33.3% of them refer to the simulator used. Also all of Abderrahim et al. [18] proposed a cluster approach. The
the papers are using Multi trust for Trust Formation and none nodes form communities of interest. The network is governed
of them a Central Authority for trust calculation. Finally, 50% by an SIOT server. This approach detects OOA thgough the
of the papers define the Threat Model. use of a Kalman Filter. The malicious nodes can perform
Wang et al. [67] proposed a trust model based on direct BMA, BSA and OOA. The outcome of the transactions is
and indirect trust computation with trust prediction. The pre- taken into account to calculate the trust, but also the previous
diction method depends on the combination of exponential trust values. The code was developed using Python program-
smoothing and a Markov chain. The exponential smoothing ming language in order to identify the best weights under
was employed to predict the trust and a Markov chain is which the estimated trust is close to the objective one, observe
employed to fix any deviation. Thus, a prediction method was the performance during OOA and perform experiments on trust
employed to predict the current trust level based on interaction prediction. The results are presented in diagrams.
Time Event Threat
Paper Direct Indirect Experiments Centralized Single Trust Multi trust Simulator
Driven Driven Model
[60] X X X X X X
[53] X X X X X
[9] X X X X X X
[49] X X X X X X
[1] X X X X X X
[54] X X X X X
[67] X X X X
[24] X X X X X X X
[15] X X X X X X
[44] X X X X X X
[2] X X X X X
[17] X X X X X
[25] X X X X X
[10] X X X X X X
[8] X X X X X X
[40] X X X
[16] X X X X X X
[62] X X X X X X X

TABLE X: Overview of approaches proposing Social based Trust Management methods

Jayasinghe et al. [40] proposed a system, where the nodes to the lower trust level and M to the upper most. The
form communities of interests. In these model the transactions probabilities were calculated based on the direct and indirect
are under evaluation and should be determined if a transaction trust scores. The malicious nodes can perform BMA, BSA,
is trustworthy. The trust parameters used are co-location selfish attacks and honesty attacks. The trust parameters taken
relationship, co-work relationship, mutuality and centrality into account are honesty and cooperation. The experiments
and cooperativeness. An unsupervised learning technique was tested the proposed solution against different kind of trust
employed for labeling the data’s trustworthiness. After the related attacks. The results were presented as diagrams.
labeling, an SVM model is predicting the trust level. Ex- Wang et al. [67] proposed a trust model based on direct
periments were performed to observe the performance of the and indirect trust computation with trust prediction. The pre-
proposed solution. diction method depends on the combination of exponential
smoothing and a Markov chain. The exponential smoothing
I. Probabilistic and Markov chain was employed to predict the trust and a Markov chain is
There have been some research on estimating trust based on employed to fix any deviation. Thus, a prediction method was
probability theory. A summary of the findings for this category employed to predict the current trust level based on interaction
is summarized in Table XII. history, behavior history and some other factors like the device
We can observe from the Table that 33.3% of the papers are model. For the trust computation both social and unsocial
using only Direct observations, while the rest of them (66.7%) parameters were considered. The following experiments were
are also using recommendations for information gathering. performed: comparison of trust prediction with different expo-
Also, 16.7% of the papers preferred a Time Driven approach, nential smoothing coefficients, comparison between first and
16.7% an Event Driven one and the rest of them do not refer to second exponential smoothing, experiments for different kind
the Trust Update. All of the papers are presenting Experiments, of attacks. The results were presented as diagrams.
but 66.6% of them refer to the Simulator used. Also none of Joshi et al. [41] proposed a system that consists of a
the papers is using a Centralized entity for trust evaluation. number of resource constraint IoT nodes, with a short radio
Regarding Trust Formation, 66.6% are using Multi trust, while range and a base station with limitless source of energy as a
the rest fo not refer to the Trust Update. Finally, 50% of them central authority. This research work has presented a 2state
defined the Threat Model. HMM with Trusted state and compromised state together
Boudagdigue et al. [21] proposed a system where, every with essential and unessential output as observation state. The
node is being monitored by its neighbors. Also some groups trustworthiness of the node is modeled by the 2 state HMM to
of neighbors are formed for evaluating the indirect trust. This predict the likelihood of the node’s next state. The state tran-
paper proposed a distributed trust model based on a similar sition probability matrix is defined by the energy consumed,
model proposed for the vehicular networks. The authors used the number of modified packets and the number of forwarding
Markov Chains to model the trust changing. A discrete-time packets. The malicious nodes can drop the packets or tamper
chain with M + 1 states was introduced. State 0 corresponds with the data. Experiments were conducted in MATLAB in
Time Event Threat
Paper Direct Indirect Experiments Centralized Single Trust Multi trust Simulator
Driven Driven Model
[67] X X X X
[66] X X X X
[69] X X X X X X
[4] X X X X X X
[18] X X X X X X X
[40] X X X

TABLE XI: Overview of approaches proposing Prediction based Trust Management methods

order to evaluate the network trustworthiness with various system should be able to respond efficiently. Especially
percentages of compromised nodes and comparison with other in the dynamic networks, where the number of nodes is
methods. The results were presented in diagrams. not fixed, a Trust Management scheme should be able to
Wang et al. [68] proposed a system consisting of Mobile adapt to a growing amount of work.
edge nodes (MEN) and common sensors. The MEN are • Privacy: Privacy is a really important factor in every sys-
connected to a small number of sensors. In this paper a mobile tem. Especially for the resource constrained IoT devices.
edge trust evaluation scheme is proposed. The evaluation of the A Trust Management system, may handle sensitive data
trustworthiness of sensor nodes is achieved using probabilistic to calculate and preserve the trust between two nodes.
graph model. The probabilistic graph model is used to repre- For example the frequency of communication between
sent the relationship between nodes. The interaction of node i the nodes. If such an information end up to a malicious
to node j can be described as P and Q. P is a positive influence party, it would be exposed which nodes are the most
of node i to node j and Q is a negative. The information valuable for the network. Also, the blockchain technology
gathered for the formation of trust are the data collection and can solve multiple problems, but a public blockchain
communication behavior. Also, a moving strategy method is that offers decentralization lacks of privacy preserving. If
proposed in order to decrease the travel distance MEN has some sensitive piece of information have to be exposed
to cover in order to evaluate every sensor. The experiments in a smart contract or stored in a blockchain it is visible
conducted using MATLAB and NS-3 and they were focused to all the participants.
on the performance of the mechanism, the analysis of energy • Context: Context is really important for trust. Some
consumption and testing the proposed moving algorithm. The individuals are to be trusted under specific contexts or
results were presented in diagrams. circumstances. A malicious node may be trustworthy only
Fang et al. [34] proposed a system with a cluster based under a specific context. Only five papers included in this
architecture. The paper proposes a trust management scheme survey are taking into account the context in order to
using Dirichlet Distribution. Both the direct observations and calculate trust. The highly heterogeneous IoT networks
third party recommendation are considered to calculate the act differently under different contexts.
trust value of a node. This work is proposed to defend against • Energy: Energy is a really important factor for the re-
internal attacks. Experiments conducted on MATLAB focusing source constrained IoT devices. The research community
on the comparison with Beta distribution based and Gaussian hasn’t investigated extensively the issue of designing a
distribution based, performance experiments for OOA. The lightweight trust management system. We can observe at
final results were presented in diagrams. the pie charts that a few of the works are conducting
Fang et al. [33] proposed a trust management technology experiments to measure the energy consumption caused
that guards the system from OOA. Also Beta distribution by the operation of the Trust Management. The leading
is used for the trust evaluation procedure. The authors also category is the game theoretic approaches, some other
mentioned the cyber-security requirements for Information- categories does not even include energy in their pie chart
Centric Networking. Experiments conducted on MATLAB for for the experiments.
observing the performance of the scheme and comparison with • Attacks: The trust management systems adds some trust
other techniques. related attacks to the threat model. These kind of attacks
VII. C HALLENGES should be tackled by the trust management system, in
order to be valuable for the IoT network. During the
Based on the above analysis, we are presenting some analysis we saw that most of the works are focusing
highlights of the vulnerabilities we observed. mainly on dealing with trust related attacks. The attacks
• Scalability: We can observe for the pie charts that most of gained the most attention by the research community are
the works did not take into account the scalability factor BMA, BSA and SPA. The OOA and OSA have not been
for conducting the experiments. In the extended IoT studied so extensively. But a trust management scheme
networks, where a huge amount of sensors are connected should be able to detect multiple attacks, not only trust
and communicating with each other, a Trust Management
Time Event Threat
Paper Direct Indirect Experiments Centralized Single Trust Multi trust Simulator
Driven Driven Model
[21] X X X X X
[67] X X X X
[41] X X X X X X
[68] X X X X
[34] X X X X
[33] X X X X X X

TABLE XII: Overview of approaches proposing Probabilistic and Markov chain based Trust Management methods

oriented. Especially, blockchain based works that refer [3] Hamad Aldawsari and Abdel Monim Artoli. A reliable lightweight trust
to the IoT nodes as lightweight nodes should take into evaluation scheme for iot security. International Journal of Advanced
Computer Science and Applications, 12(11), 2021.
account the EA. As a future work it will be nice to [4] Waleed Alnumay, Uttam Ghosh, and Pushpita Chatterjee. A trust-
investigate Trust Management techniques that tackle the based predictive model for mobile ad hoc network in internet of things.
trust related attacks, but also deal with a variety of other Sensors, 19(6), 2019.
[5] Mohammad Dahman Alshehri and Farookh Khadeer Hussain. A
attacks. comparative analysis of scalable and context-aware trust management
approaches for internet of things. In Sabri Arik, Tingwen Huang,
VIII. C ONCLUSION Weng Kin Lai, and Qingshan Liu, editors, Neural Information Process-
Internet of things is a network of resource constrained ing, pages 596–605, Cham, 2015. Springer International Publishing.
[6] Mohammad Dahman Alshehri and Farookh Khadeer Hussain. A fuzzy
devices that communicate with each other using the internet. security protocol for trust management in the internet of things (fuzzy-
These devices are sunning in potentially hostile environments, iot). Computing, 101(7):791–818, jul 2019.
so the need for security is critical. One way to assess the [7] Ayesha Altaf, Haider Abbas, Faiza Iqbal, Farrukh Aslam Khan, Saddaf
Rubab, and Abdelouahid Derhab. Context-oriented trust computation
trustworthiness of a node is applying trust management tech- model for industrial internet of things. Computers & Electrical Engi-
niques. The Trust Management for IoT has gained a lot of the neering, 92:107123, 2021.
researchers’ attention the last decade. In the scope of this paper [8] Mohammad Amiri-Zarandi, Rozita Dara, and Evan Fraser. Lbtm:
A lightweight blockchain-based trust management system for social
we are presenting a survey on Trust Management methods internet of things. The Journal of Supercomputing, 78:1–19, 04 2022.
for IoT. We focus our research on four research questions: [9] Feslin Anish Mon, Godfrey Winster Sathianesan, and Dr.Ramesh R.
RQ1, Which methods are currently used in the field, RQ2, Trust model for iot using cluster analysis: A centralized approach.
Wireless Personal Communications, 03 2021.
What is the threat model of those proposals, RQ3, Which trust [10] Kamran Ahmad Awan, Ikram Ud Din, Mahdi Zareei, Muhammad Talha,
parameters are used, RQ4, What kind of experiments were Mohsen Guizani, and Sultan Ullah Jadoon. Holitrust-a holistic cross-
conducted. We answer the first question (RQ1) by classifying domain trust management mechanism for service-centric internet of
things. IEEE Access, 7:52191–52201, 2019.
the papers into nine different categories representing the [11] Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Mohsen
methods used for the trust evaluation procedure. Following we Guizani, Ayman Altameem, and Sultan Ullah Jadoon. Robusttrust – a
answer the other research questions (RQ2-RQ4) by presenting pro-privacy robust distributed trust management mechanism for internet
of things. IEEE Access, 7:62095–62106, 2019.
charts representing the attacks taken into consideration, the [12] Nirnay Bansal. IoT Applications in Agriculture, pages 93–114. Apress,
trust parameters used and the experiments conducted in every Berkeley, CA, 2020.
category. We discuss our findings and present some future [13] Nirnay Bansal. IoT Applications in Energy, pages 115–134. Apress,
Berkeley, CA, 2020.
directions. We also suggest a future research direction related
[14] Nirnay Bansal. IoT Applications in Transportation, pages 239–262.
to Attack Trees for designing the possible attacks and coun- Apress, Berkeley, CA, 2020.
termeasures related to an IoT system. Attacks Trees can help [15] Fenye Bao and Ing-Ray Chen. Dynamic trust management for internet of
the research community design more solid Trust Management things applications. In Proceedings of the 2012 International Workshop
on Self-Aware Internet of Things, Self-IoT ’12, page 1–6, New York,
systems, containing all possible attacks and countermeasures. NY, USA, 2012. Association for Computing Machinery.
[16] Fenye Bao and Ing-Ray Chen. Trust management for the internet
ACKNOWLEDGMENT of things and its application to service composition. In 2012 IEEE
This work has been supported by Innovation Fund Denmark International Symposium on a World of Wireless, Mobile and Multimedia
Networks (WoWMoM), pages 1–6, 2012.
and the Digital Research Centre Denmark, through bridge [17] Fenye Bao, Ing-Ray Chen, and Jia Guo. Scalable, adaptive and
project “SIOT – Secure Internet of Things – Risk analysis survivable trust management for community of interest based internet
in design and operation”. of things systems. In 2013 IEEE Eleventh International Symposium on
Autonomous Decentralized Systems (ISADS), pages 1–7, 2013.
R EFERENCES [18] Oumaima Ben Abderrahim, Mohamed Houcine Elhdhili, and Leila
Saidane. Tmcoi-siot: A trust management system based on communities
[1] Rihab Abidi and Nadia Ben Azzouna. Self-adaptive trust management of interest for the social internet of things. In 2017 13th International
model for social iot services. In 2021 International Symposium on Wireless Communications and Mobile Computing Conference (IWCMC),
Networks, Computers and Communications (ISNCC), pages 1–7, 2021. pages 747–752, 2017.
[2] Anuoluwapo A. Adewuyi, Hui Cheng, Qi Shi, Jiannong Cao, Áine [19] Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, and Maryline
MacDermott, and Xingwei Wang. Ctrust: A dynamic trust model for Laurent. Trust management system design for the internet of things:
collaborative applications in the internet of things. IEEE Internet of A context-aware and multi-service approach. Computers & Security,
Things Journal, 6(3):5432–5445, 2019. 39:351–365, 2013.
[20] Borja Bordel and Ramón Alcarria. Distributed trust and reputa- [41] Gamini Joshi and Vidushi Sharma. Light-weight hidden markov trust
tion services in pervasive internet-of-things deployments. In Ilsun evaluation model for iot network. In 2021 Fifth International Conference
You, Hwankuk Kim, Taek-Young Youn, Francesco Palmieri, and Igor on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC),
Kotenko, editors, Mobile Internet Security, pages 16–29, Singapore, pages 142–149, 2021.
2022. Springer Nature Singapore. [42] Barbara Ann Kitchenham and Stuart Charters. Guidelines for performing
[21] Chaimae Boudagdigue, Abderrahim Benslimane, Abdellatif Kobbane, systematic literature reviews in software engineering. Technical Report
and Mouna Elmachkour. A distributed advanced analytical trust model EBSE 2007-001, Keele University and Durham University Joint Report,
for iot. In 2018 IEEE International Conference on Communications 07 2007.
(ICC), pages 1–6, 2018. [43] Djamel Eddine Kouicem, Youcef Imine, Abdelmadjid Bouabdallah, and
[22] Oscar Castillo and Patricia Melin. Fuzzy Logic, pages 5–27. Physica- Hicham Lakhlef. Decentralized blockchain-based trust management
Verlag HD, Heidelberg, 2001. protocol for the internet of things. IEEE Transactions on Dependable
[23] Dong Chen, Guiran Chang, Dawei Sun, Jiajia Li, Jie Jia, and Xingwei and Secure Computing, 19(2):1292–1306, 2022.
Wang. Trm-iot: A trust management model based on fuzzy reputation [44] Meena Kowshalya and Valarmathi ml. Dynamic trust management for
for internet of things. Comput. Sci. Inf. Syst., 8:1207–1228, 10 2011. secure communications in social internet of things (siot). Sādhanā, 43,
[24] Ing-Ray Chen, Jia Guo, and Fenye Bao. Trust management for soa- 09 2018.
based iot and its application to service composition. IEEE Transactions [45] Rajesh Kumar and Rewa Sharma. Leveraging blockchain for ensuring
on Services Computing, 9(3):482–495, 2016. trust in iot: A survey. Journal of King Saud University - Computer and
[25] Rupayan Das, Moutushi Singh, and Koushik Majumder. SGSQoT: A Information Sciences, 2021.
Community-Based Trust Management Scheme in Internet of Things: [46] Qi Lin and Qiuhong Zhao. IoT Applications in Healthcare, pages 115–
eHaCON 2018, Kolkata, India, Springer Conference, pages 209–222. 133. Springer International Publishing, Cham, 2021.
01 2019. [47] Zuchao Ma, Liang Liu, and Weizhi Meng. Dconst: Detection of
[26] Mazin Debe, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, and Junaid multiple-mix-attack malicious nodes using consensus-based trust in iot
Arshad. Trustworthy blockchain gateways for resource-constrained networks. In Joseph K. Liu and Hui Cui, editors, Information Secu-
clients and iot devices. IEEE Access, 9:132875–132887, 2021. rity and Privacy, pages 247–267, Cham, 2020. Springer International
[27] Mazin Debe, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, and Junaid Publishing.
Arshad. Trustworthy blockchain gateways for resource-constrained [48] Mufti Mahmud, M. Shamim Kaiser, M. Mostafizur Rahman, Muhammad
clients and iot devices. IEEE Access, 9:132875–132887, 2021. Rahman, Antesar Shabut, Shamim Al Mamun, and Amir Hussain. A
[28] Volkan Dedeoglu, Raja Jurdak, Guntur D. Putra, Ali Dorri, and Salil S. brain-inspired trust management model to assure security in a cloud
Kanhere. A trust architecture for blockchain in iot. In Proceedings of the based iot framework for neuroscience applications. Cognitive Compu-
16th EAI International Conference on Mobile and Ubiquitous Systems: tation, 10, 10 2018.
Computing, Networking and Services, MobiQuitous ’19, page 190–199, [49] Claudio Marche and Michele Nitti. Trust-related attacks and their detec-
New York, NY, USA, 2019. Association for Computing Machinery. tion: A trust management model for the social iot. IEEE Transactions
[29] Ikram Ud Din, Aniqa Bano, Kamran Ahmad Awan, Ahmad Almogren, on Network and Service Management, 18(3):3297–3308, 2021.
Ayman Altameem, and Mohsen Guizani. Lighttrust: Lightweight trust [50] Carolina Veronica Lezama Mendoza and João Henrique Kleinschmidt.
management for edge devices in industrial internet of things. IEEE A distributed trust management mechanism for the internet of things
Internet of Things Journal, pages 1–1, 2021. using a multi-service approach. Wireless Personal Communications,
[30] Nabil Djedjig, Djamel Tandjaoui, Faiza Medjek, and Imed Romdhani. 103(3):2501–2513, 2018.
Trust-aware and cooperative routing protocol for iot security. Journal [51] Roopa M.S., Santosh Pattar, Rajkumar Buyya, Venugopal K R, Sun-
of Information Security and Applications, 52:102467, 2020. dararaj Iyengar, and Lalit Patnaik. Social internet of things (siot): Foun-
[31] Junqi Duan, Deyun Gao, Dong Yang, Chuan Heng Foh, and Hsiao-Hwa dations, thrust areas, systematic review and future directions. Computer
Chen. An energy-aware trust derivation scheme with game theoretic Communications, 139, 03 2019.
approach in wireless sensor networks for iot applications. IEEE Internet [52] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system.
of Things Journal, 1(1):58–69, 2014. Cryptography Mailing list at https://metzdowd.com, 03 2009.
[32] Christian Esposito, Oscar Tamburis, Xin Su, and Chang Choi. Robust [53] Michele Nitti, Roberto Girau, and Luigi Atzori. Trustworthiness
decentralised trust management for the internet of things by using game management in the social internet of things. IEEE Transactions on
theory. Information Processing & Management, 57(6):102308, 2020. Knowledge and Data Engineering, 26(5):1253–1266, 2014.
[33] Weidong Fang, Ming Xu, Chunsheng Zhu, Weili Han, Wuxiong Zhang, [54] Michele Nitti, Roberto Girau, Luigi Atzori, Antonio Iera, and Giacomo
and Joel J. P. C. Rodrigues. Fetms: Fast and efficient trust management Morabito. A subjective model for trustworthiness evaluation in the social
scheme for information-centric networking in internet of things. IEEE internet of things. In 2012 IEEE 23rd International Symposium on
Access, 7:13476–13485, 2019. Personal, Indoor and Mobile Radio Communications - (PIMRC), pages
[34] Weidong Fang, Wuxiong Zhang, Lianhai Shan, Xiaohong Ji, and Guo- 18–23, 2012.
qing Jia. Ddtms: Dirichlet-distribution-based trust management scheme [55] Kai Petersen, Sairam Vakkalanka, and Ludwik Kuzniarz. Guidelines
in internet of things. Electronics, 8(7), 2019. for conducting systematic mapping studies in software engineering: An
[35] Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu update. Information and Software Technology, 64:1–18, 2015.
Palaniswami. Internet of things (iot): A vision, architectural ele- [56] Matthew Pirretti, Sencun Zhu, N. Vijaykrishnan, Patrick McDaniel,
ments, and future directions. Future Generation Computer Systems, Mahmut Kandemir, and Richard Brooks. The sleep deprivation attack
29(7):1645–1660, 2013. Including Special sections: Cyber-enabled in sensor networks: Analysis and methods of defense. International
Distributed Computing for Ubiquitous Cloud and Network Services & Journal of Distributed Sensor Networks, 2(3):267–287, 2006.
Cloud Computing and Scientific Applications — Big Data, Scalable [57] Behrouz Pourghebleh, Karzan Wakil, and Nima Jafari Navimipour. A
Analytics, and Beyond. comprehensive study on the trust management techniques in the internet
[36] Siri Guleng, Celimuge Wu, Xianfu Chen, Xiaoyan Wang, Tsutomu of things. IEEE Internet of Things Journal, 6(6):9326–9337, 2019.
Yoshinaga, and Yusheng Ji. Decentralized trust evaluation in vehicular [58] Guntur Dharma Putra, Volkan Dedeoglu, Salil S. Kanhere, Raja Jurdak,
internet of things. IEEE Access, 7:15980–15988, 2019. and Aleksandar Ignjatovic. Trust-based blockchain authorization for iot.
[37] Jia Guo, Ing-Ray Chen, and Jeffrey J.P. Tsai. A survey of trust com- IEEE Transactions on Network and Service Management, 18(2):1646–
putation models for service management in internet of things systems. 1658, 2021.
Computer Communications, 97:1–14, 2017. [59] Kashif Naseer Qureshi, Abeer Iftikhar, Shahid Nazeer Bhatti, Francesco
[38] Mark Hürlimann. Fuzzy Logic, pages 41–58. Gabler, Wiesbaden, 2009. Piccialli, Fabio Giampaolo, and Gwanggil Jeon. Trust management and
[39] Mohammad Jabraeil Jamali, Bahareh Bahrami, Arash Heidari, Parisa evaluation for edge intelligence in the internet of things. Engineering
Allahverdizadeh, and Farhad Norouzi. IoT Architecture, pages 9–31. 01 Applications of Artificial Intelligence, 94:103756, 2020.
2020. [60] Sherif Emad Abdel Rafey, Ayman Abdel-Hamid, and Mohamad Abou
[40] Upul Jayasinghe, Gyu Myoung Lee, Tai-Won Um, and Qi Shi. Machine El-Nasr. Cbstm-iot: Context-based social trust model for the internet of
learning based trust computational model for iot services. IEEE things. In 2016 International Conference on Selected Topics in Mobile
Transactions on Sustainable Computing, 4(1):39–52, 2019. & Wireless Networking (MoWNeT), pages 1–8, 2016.
[61] Rinki Rani, Sushil Kumar, and Upasana Dohare. Trust evaluation for
light weight security in sensor enabled internet of things: Game theory
oriented approach. IEEE Internet of Things Journal, 6(5):8421–8432,
2019.
[62] Ing ray Chen, Fenye Bao, and Jia Guo. Trust-based service management
for social internet of things systems. IEEE Trans. on Dependable and
Secure Computing.
[63] Muhammad Saeed, Muhammad Aftab, Rashid Amin, and Deepika
Koundal. Trust management model in iot: A comprehensive survey.
In Ajith Abraham, Ana Maria Madureira, Arturas Kaklauskas, Niketa
Gandhi, Anu Bajaj, Azah Kamilah Muda, Dalia Kriksciuniene, and
João Carlos Ferreira, editors, Innovations in Bio-Inspired Computing
and Applications, pages 675–684, Cham, 2022. Springer International
Publishing.
[64] Avani Sharma, Emmanuel S. Pilli, Arka P. Mazumdar, and Poonam Gera.
Towards trustworthy internet of things: A survey on trust management
applications and schemes. Computer Communications, 160:475–493,
2020.
[65] Sheenu Singh and Meetu Kandpal. A comprehensive survey on trust
management in fog computing. In Simon Fong, Nilanjan Dey, and Amit
Joshi, editors, ICT Analysis and Applications, pages 87–97, Singapore,
2022. Springer Nature Singapore.
[66] P. Subhash, Gollapudi Ramesh Chandra, and K. Samrat Surya. Power
trust: Energy auditing aware trust-based system to detect security attacks
in iot. In 2021 Sixth International Conference on Wireless Communica-
tions, Signal Processing and Networking (WiSPNET), pages 265–269,
2021.
[67] Eric Wang, Chien-Ming Chen, Dongning Zhao, W.H. Ip, and Kai Yung.
A dynamic trust model in internet of things. Soft Computing, 24, 04
2020.
[68] Tian Wang, Hao Luo, Weijia Jia, Anfeng Liu, and Mande Xie. Mtes:
An intelligent trust evaluation scheme in sensor-cloud-enabled indus-
trial internet of things. IEEE Transactions on Industrial Informatics,
16(3):2054–2062, 2020.
[69] Yuyao Wen, Zhan Xu, Ruxin Zhi, and Jinhui Chen. Trust prediction
model based on deep learning in social internet of things. In Bo Li,
Changle Li, Mao Yang, Zhongjiang Yan, and Jie Zheng, editors, IoT as a
Service, pages 557–570, Cham, 2021. Springer International Publishing.
[70] Claes Wohlin. Guidelines for snowballing in systematic literature studies
and a replication in software engineering. In Proceedings of the 18th
International Conference on Evaluation and Assessment in Software
Engineering, EASE ’14, New York, NY, USA, 2014. Association for
Computing Machinery.
[71] Zheng Yan, Peng Zhang, and Athanasios V. Vasilakos. A survey on trust
management for internet of things. Journal of Network and Computer
Applications, 42:120–134, 2014.
[72] Yang Yu, Ziyan Jia, Weige Tao, Bo Xue, and Changhoon Lee. An
efficient trust evaluation scheme for node behavior detection in the
internet of things. Wireless Personal Communications, 93, 03 2017.

You might also like