A Brain-Inspired Trust Management Model to Assure Security in a Cloud based IoT Framework for Neuroscience Applications
read more
Citations
Toward a Heterogeneous Mist, Fog, and Cloud-Based Framework for the Internet of Healthcare Things
Social Group Optimization-Assisted Kapur's Entropy and Morphological Segmentation for Automated Detection of COVID-19 Infection from Computed Tomography Images.
Trust-based recommendation systems in Internet of Things: a systematic literature review
A consensus novelty detection ensemble approach for anomaly detection in activities of daily living
Towards trustworthy Internet of Things: A survey on Trust Management applications and schemes
References
Fuzzy identification of systems and its applications to modeling and control
A survey of trust and reputation systems for online service provision
The rise of big data on cloud computing
The Beta Reputation System
Introduction to Network Simulator NS2
Related Papers (5)
Conceptual Framework for Internet of Things' Virtualization via OpenFlow in Context-aware Networks
Frequently Asked Questions (13)
Q2. What future works have the authors mentioned in the paper "A brain-inspired trust management model to assure security in a cloud based iot framework for neuroscience applications" ?
In the future, sophisticated optimization techniques along with Bayesian statistics, Deep Learning, and Reinforcement Learning based TMM will be used in ensuring security, reliability and accuracy of the ever growing cloud based IoT and Block Chain architectures. MSK and AS further implemented and refined the system development. The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Q3. What are the two important elements for creating collaborative frameworks?
The big data and cloud are two paramount elements for creating collaborative frameworks to analyze brain signals (e.g., EEG, ECoG, AP, LFPs, etc.) and brain images (e.g., MEG, MRI, fMRI, PET, etc.) and to perform data-driven modeling [19].
Q4. What are the three factors that determine the trust level of a node?
For each node, the assessment of the behavioral trust is performed considering three factors related to that node– relative frequency of interaction (RFI), intimacy, and honesty.
Q5. What are the three factors that are considered in deducing trust level?
In deducing E2E trust level, certain relationship among the nodes are considered which include– node profile information, node behavioral trust, and data trust [34].
Q6. What is the effect of the proposed TMM on the data transmission process?
In comparison to the TRM, with the increasing number of malicious nodes (10% to 50%) present in the communication network, the proposed TMM consumes less energy during12/17the data transmission process.
Q7. What is the importance of the interaction frequency?
In any social context, the intimacy or relationship duration of interaction is an important factor in calculating the trust level.
Q8. How is the data trust of the j-th node calculated?
Having obtained the direct and indirect trust values, data trust of the j-th node is calculated by Equation 8.T dj (t) = T ddj (t) + ∑ k 1
Q9. What is the definition of the NetT?
The NetT can be defined as the rate at which the source transmissions are delivered successfully to the destination over the link(s) between the source-destination pair.
Q10. What is the purpose of this paper?
This paper proposed a Brain-inspired TMM to secure data transmission and ensure data reliability for the cloud-based IoT architecture targeting Neuroscience applications.
Q11. how can i get a j-th node to trust?
T dij (t) can be expressed by the equation 7.T dij (t) = Tmax for ∑ k D ind kj (t) k = D his 1| ∑ k D ind kj (t)k −D his j |for ∑ k D ind kj (t)k 6= D his j ,(7)where, Dindkj is the instantaneous data of j-th node during indirect interaction with k nodes.
Q12. What is the definition of the trust level of a given node?
the trust level of a given node (j) denoted by Tj is estimated by summing up the behavioral and data trust as Equation 1.Tj(t) = T nbj (t) + T dj (t), (1)where, T nbj (t) is the evaluated behavioral trust and T dj (t) is the evaluated data trust.6/17The trust properties for the behavioral trust of a nodes are discussed below.
Q13. What is the AECR value of the proposed TMM?
The reduced AECR value, compared to the TRM, indicates that the proposed TMM is capable of identifying more malicious nodes in the communication network.