Science topic

Trust Management - Science topic

Explore the latest publications in Trust Management, and find Trust Management experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Trust Management (5,802)
Sorted by most recent
Article
Full-text available
Compliance with security requirements in the fog computing environment is known as an important phenomenon in maintaining the quality of service due to the dynamic topology. Security and privacy breaches can occur in fog computing because of its properties and the adaptability of its deployment method. These characteristics render current systems i...
Preprint
Full-text available
There are mostly two approaches to tackle trust management worldwide Strong and crisp and Soft and Social. We analyze the impact of integrated trust mechanism in three different e-commerce services. The trust aspect is a dormant element between potential users and being developed expert or internet systems. We support our integration by preside ove...
Article
Full-text available
The Internet of Things (IoT) connects objects that sense, communicate, and interact to achieve shared goals, and its integration with manufacturing has led to Industry 4.0. Security is crucial for user acceptance, involving data confidentiality, integrity, authentication, identity management, privacy, and trust among devices. Trust management is vi...
Preprint
Full-text available
Discussions and practices on sustainability are actively underway around the world. In this social context, this study conceptualized ESG management values focused on sports organizations, especially professional sports clubs in Korea. Utilizing Q Methodology, suitable for research on individual's subjectivity, we explored ESG management values acc...
Article
Full-text available
Recently, there has been a notable surge in the intricate complexities of global supply chain management (SCM), which is gaining researchers’ attention. Supply chain sustainability is put at risk by security issues in blockchain technology that affect everything from infrastructure to management. For sustainable supply chain management (SSCM), thes...
Article
Full-text available
Internet of Things (IoT) devices generate and transfer a vast volume of data in interaction with various objects. These data rely on cloud computing (CC) or fog computing (FC) for processing and calculations. Unlike CC, FC delivers task processing closer to IoT devices. Consequently, FC leads to reduced latency, increased efficiency, ease of deploy...
Preprint
Full-text available
The growing importance of edge and fog computing in the modern IT infrastructure is driven by the rise of decentralized applications. However, resource allocation within these frameworks is challenging due to varying device capabilities and dynamic network conditions. Conventional approaches often result in poor resource use and slowed advancements...
Article
Full-text available
This study principally addresses the challenges associated with streaming videos in wireless Mobile ad hoc networks (MANETs), primarily constrained by wireless channels and node mobility. This study proposes a novel routing protocol incorporating a feedback mechanism and cross-layer architecture, supported by three key enhancements. First, it incor...
Article
Full-text available
In socially aware networking, encryption algorithms are used in privacy-preserving algorithms to provide security for the nodes. However, the shared key lacks certain security management during transmission, which can affect the security of messages delivery. Therefore, this paper proposes a Self-organizing Key Security Management Algorithm (SKSM)...
Research Proposal
Full-text available
It is indeed a matter of great pleasure and privilege to invite you all to submit a chapter proposal (abstract) for the forthcoming book on “Security and Privacy in 6G Communication Technology” to be published by Scrivener Publishing (WILEY). You can initially submit the chapter proposals or abstract of 400–500 words till 30th July 2024. Full chapt...
Chapter
Full-text available
This research investigates the development of a lightweight digital trust architecture within the internet of medical things (IoMT). Employing a multi-faceted methodology, it commences with a systematic literature review, identifying gaps in IoMT security and digital trust frameworks. A theoretical framework , tailored for IoMT, is proposed, integr...
Preprint
Full-text available
The aim of this paper is to introduce the Fog-less Computing Model (FoCoM). FoCoM enables collaboration among intelligent Objects by combining their processing capabilities and the services they provide to accomplish tasks required by Users. This feasibility arises from the social nature bestowed upon them by the Social Internet of Things. Conseque...
Article
Full-text available
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1186/s13635-023-00146-z.
Article
Full-text available
This research introduces a comprehensive collaborative intrusion detection system (CIDS) framework aimed at bolstering the security of Internet of Things (IoT) environments by synergistically integrating lightweight architecture, trust management, and privacy-preserving mechanisms. The proposed hierarchical architecture spans edge, fog, and cloud l...
Article
Full-text available
The rise of decentralized social networks (DSNs) necessitates robust trust models to ensure secure and reliable interactions in an increasingly dynamic online environment. While blockchain technology has revolutionized finance with cryptocurrencies and decentralized control, its potential to transform trust management in DSNs remains largely unexpl...
Article
Full-text available
Purpose — Waqf unit trust funds are a form of value-based impact investing that combines financial investment with philanthropic goals through waqf (Islamic endowment). This study uses the theory of planned behaviour (TPB) to investigate the factors that influence people’s intentions to participate in waqf unit trust funds in Malaysia. Furthermore,...
Article
Full-text available
Wireless Sensor Networks (WSNs) are crucial in various fields including Health Care Monitoring, Battlefield Surveillance, and Smart Agriculture. However, WSNs are susceptible to malicious attacks due to the massive quantity of sensors within them. Hence, there is a demand for a trust evaluation framework within WSNs to function as a secure system,...
Conference Paper
Full-text available
The development of the Internet of Vehicles (IoV) and autonomous vehicles plays a significant role in intelligent transportation systems (ITS) that are empowered by vehicular networks. However, the dynamic nature of these networks presents challenges that need to be addressed. Reinforcement learning (RL) has emerged as an effective technique for st...
Article
Full-text available
In IoT ecosystems, the interaction of devices with each other creates a perfect environment but there are heterogeneous nodes that will supply a variety of services. In the intelligent environment, devices with various processing capacities may operate together and communicate transparently with one other and with users. These IoT gadgets are frequ...
Article
Full-text available
The delivery of high-quality healthcare services is a multifaceted endeavor influenced by various factors, among which human factors play a pivotal role. This paper explores the significance of human factors in upholding service quality within hospital settings. Drawing upon interdisciplinary research from fields such as psychology, sociology, and...
Preprint
Full-text available
Wireless sensor networks (WSNs) comprise an extensive array of spatially dispersed sensor nodes, interconnected through a wireless medium to monitor and record physical information from the environment. In WSNs, multi-hop routing is employed for data transmission among nodes, rendering these networks susceptible to a diverse range of attacks. In or...
Article
Full-text available
The sensor‐enabled in‐vehicle communication and infrastructure‐centric vehicle‐to‐everything (V2X) communications have significantly contributed to the spark in the amount of data exchange in the connected and autonomous vehicles (CAV) environment. The growing vehicular communications pose a potential cyber security risk considering online vehicle...
Article
Full-text available
Vehicular Ad Hoc Networks (VANETs) are powerful platforms for vehicular data services and applications. The increasing number of vehicles has made the vehicular network diverse, dynamic, and large-scale, making it difficult to meet the 5G network’s demanding requirements. Decentralized systems are interesting and provide attractive services because...
Article
Full-text available
The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This feature allows users to distribute data to particular recipients, while also allowing data proprietors to selectively grant access to their data to users. Ensuring data security and privacy is a formi...
Article
Full-text available
A growing kind of communication, the Internet of Things (IoT), links all network-capable devices worldwide. The most recent phase of the Internet of Things (IoT), known as the Internet of Medical Things (IoMT), is one that is rapidly catching researchers’ interest. The centralized storage system houses the substantial amount of medical data created...
Article
Full-text available
The combination of blockchain-enabled smart contracts and the Internet of Things (IoT) is an emerging research area with a potential for far-reaching impact on our daily lives. While existing literature reviews explore current and future research states, most do not investigate the intellectual foundation. This study is a database-assisted narrativ...
Article
Full-text available
As cloud computing becomes increasingly integral to data management and services, security and privacy concerns remain paramount. This article presents a comprehensive review of the current protocols and mechanisms designed to fortify security and privacy in distributed cloud environments. It synthesizes contributions from various research works, e...
Article
Full-text available
This conceptual analysis explores communication strategies for effective Corporate Social Responsibility (CSR) and stakeholder engagement in the oil and gas industry. The oil and gas sector faces increasing scrutiny from stakeholders, including communities, governments, NGOs, and investors, regarding its social and environmental impact. Effective c...
Article
Full-text available
Mobile ad hoc networks (MANETs) are wireless multi-hop networks that do not rely on any fixed infrastructure, unlike traditional networks. Nodes in MANETs are formed dynamically and are free to move in any direction at variable speeds. The special characteristics of MANETs make them vulnerable to flooding attacks, which can have a negative impact o...
Article
Full-text available
The article begins by offering a comprehensive review of the current research landscape concerning trust management mechanisms. It elucidates the foundational concepts behind trust management mechanisms, subsequently detailing various attack models and the inherent vulnerabilities they exploit. A significant portion of the discussion delves into th...
Article
Full-text available
In a permissionless social network environment, it is difficult for a user to assess the trustworthiness of other users. Thus, trust management becomes a crucial issue for securing social activities. The conventional method for assessing trust involves an authority to identify fakes. However, generative AI is gradually reducing the ability to disti...
Article
Full-text available
Internet of Vehicles (IoV) integrates with various heterogeneous nodes, such as connected vehicles, roadside units, etc., which establishes a distributed network. Vehicles are managed nodes providing all the services required during inter-vehicular communication which makes it essential to use a trust management mechanism. Existing trust management...
Article
Full-text available
Data sharing among edge devices belonging to different stakeholders can open new possibilities for emerging Internet-of-Things (IoT) edge intelligence and collaboration. However, traditional data sharing methods enabled through a centralized mechanism were no longer suitable for edge scenarios due to security, privacy and scalability issues. Decent...
Article
Full-text available
With the rapid development of communication technologies, the demand for security and automation of driving has promoted the development of the Internet of Vehicles (IoV). The IoV aims to provide users with a safer, more comfortable, and more efficient driving experience. However, the current IoV also faces a series of potential security risks and...
Article
Full-text available
Wireless sensor networks (WSNs) are increasingly being used in a variety of applications, such as smart healthcare systems and the Internet of Things (IoT). Trust in WSNs is the confidence in secure, efficient collaboration among nodes, crucial for reliable data packet routing. However, their susceptibility to trust-related challenges such as diffe...
Article
Full-text available
Trust management has been shown to be an effective technique for protecting networks from malicious nodes and ensuring wireless sensor network (WSN) security. A number of trust systems have been proposed, but most of them are not adaptative to the current state of network security and the intensity of the attacks to which they are subjected, especi...
Article
Full-text available
This study conducts an in-depth review of the Social Internet of Things (SIoT), a significant advancement from the conventional Internet of Things (IoT) via the integration of socialization principles akin to human interactions. We explore the architecture, trust management, relationship dynamics, and other crucial aspects of SIoT, with a particula...
Article
Full-text available
This paper presents the augmented Internet of Things (AIoT) framework for cooperatively distributed deep blockchain-assisted vehicle networks. AIoT framework splits the vehicle application into various tasks while executing them on different computing nodes. The vehicle application has different constraints, such as security, time, and accuracy, wh...
Article
Full-text available
The values that people hold are linked to their economic performance. These links can be either direct or indirect, operating through moderating variables such as social network participation, interpersonal trust, trust in institutions, human capital, managerial skills and hours worked. In this paper these effects are studied using structural equat...
Research Proposal
Full-text available
Behavioural finance attempts to investigate the psychological and sociological issues that Influence investment decision making process of individual and institutions. It also considers how various psychological traits affect how individuals or groups act as investors, analysts, and portfolio manager. The study investigated the effects of behaviora...
Article
Full-text available
With the booming development of the Internet of Things (IoT) industry, millions of data are generated every day. How to use and manage these data safely and efficiently has become a hot issue of concern to people. Due to the accumulation of IoT data, the isolated data island phenomenon makes it difficult to connect and interact with each data owner...
Article
Full-text available
A trustworthy cloud services provider makes sure that data backups, disaster recovery, and compliance with industry standards are all met, allowing businesses to concentrate on their core competencies and innovation while leaving the complexity of IT infrastructure management to the professionals. The selection of the finest cloud services provider...
Article
Full-text available
The concept of fog computing was suggested to help cloud computing for the fast data processing of Internet of Things (IoT) based applications. Even, fog computing faces many challenges such as Security, Privacy & Storage. One way to handle these challenges is to integrate blockchain with fog computing. There are several applications of blockchain...
Article
Full-text available
Through visualization and resource integration, cloud computing has expanded its service its service area and offers a better user experience than the traditional platform, along with us business operation model bringing huge economic and social benefits. However, a large amount of evidence shows that cloud computing is facing with serious security...
Article
Full-text available
Vehicular Ad Hoc Network (VANET) is a key component in the Intelligent Transportation System (ITS) with a number of applications for safety, traffic management, emergency services, entertainment, and so on. These applications are implemented by exchanging data among the nodes in an open, dynamic, and distributed fashion, and hence VANETs are vulner...
Article
Full-text available
In this paper, a hybrid blockchain-based authentication scheme is proposed that provides the mechanism to authenticate the randomly distributed sensor IoTs. These nodes are divided into three types: ordinary nodes, cluster heads and sink nodes. For authentication of these nodes in a Wireless Sensor IoTs (WSIoTs), a hybrid blockchain model is introd...
Article
Full-text available
Edge computing has low transmission delay and unites more agile interconnected devices spread across geographies, which enables cloud-edge storage more suitable for distributed data sharing. This paper proposes a trustworthy and reliable multi-keyword search (TRMS) in blockchain-assisted cloud-edge storage, where data users can choose a faster sear...
Research
Full-text available
This research delves into the intricate relationship between emotions and leadership, seeking to understand the profound impact that emotional intelligence has on the effectiveness of leaders. Emotions play a pivotal role in shaping interpersonal dynamics, decision-making processes, and overall team morale within organizational settings. This study...
Article
Full-text available
This research purposes to test and analyze the influence of E-CRM, E-Service Quality, Brand Trust, Customer Satisfaction and analyze the role of E-Service Quality and Brand Trust in mediating the influence of E-CRM on brand loyalty in home fixed broadband services. The sampling design used in this research was non-probability sampling with purposiv...
Article
Full-text available
Given the complexity of trust management in smart cities, this work unfolds the important role of trust management across various domains. Be- yond its traditional roots in human relationships, trust management emerges as a cornerstone in technological, business, and societal contexts. This scoping review first organizes the literature by five most...
Article
Full-text available
The emerging yet promising paradigm of the Internet of Vehicles (IoV) has recently gained considerable attention from researchers from academia and industry. As an indispensable constituent of the futuristic smart cities, the underlying essence of the IoV is to facilitate vehicles to exchange safety-critical information with the other vehicles in t...
Article
Full-text available
The Social Internet of Vehicles (SIoV) is an emerging network that interconnects vehicles and generates vast amounts of data concerning social relationships, chauffeurs, commuters, as well as surrounding conditions. However, security is a major concern in SIoV networks, especially during data transmission. In order to solve this problem, we propose...
Article
Full-text available
The IoT, or Internet of Things, has quickly grown in popularity as a means to collect data in real-time from any and all linked devices. These networked physical objects can exchange data with one another via their respective sensor technologies and have their own unique identifiers. Insightful data analytics applied to the obtained information als...
Article
Full-text available
The Internet of Vehicles (IoV) is a technology that is connected to the public internet and is a subnetwork of the Internet of Things (IoT) in which vehicles with sensors are connected to a mobile and wireless network. Numerous vehicles, users, things, and networks allow nodes to communicate information with their surroundings via various communica...
Article
Full-text available
Internet of Things (IoT) and wireless communication technologies are evolving rapidly and changing the way we live and work. IoT devices may need to share personal information over the public network taking the help of nearby devices. Thus, the trustworthiness of nearby devices shall play an essential role in providing security and privacy assuranc...
Article
Full-text available
Supply chains increasingly develop toward complex networks, both technically in terms of devices and connectivity, and also anthropogenic with a growing number of actors. The lack of mutual trust in such networks results in challenges that are exacerbated by stringent requirements for shipping conditions or quality, and where actors may attempt to...
Article
Full-text available
In the last two decades, multiple ICT evolutions boosted the ability to collect and analyze vast amounts of data (on the order of Zettabytes). Collectively, they paved the way for the so-called data economy, revolutionizing most sectors of our society, including healthcare, transportation, and grids. At the core of this revolution, distributed data...
Article
Full-text available
As next-generation networking environments become increasingly complex and integral to the fabric of digital transformation as the traditional perimeter-based security model proves inadequate. The Zero Trust framework emerges as a critical solution to this challenge, advocating for a security model that assumes no implicit trust and requires verifi...
Article
Full-text available
Within large and growing human communities where interactions occur, trust is a key factor to consider. Computational trust models have then been widely studied since the 2000s targeting items ratings (e.g. in e-commerce) or M2M (e.g. in IoT network). Among these models, EigenTrust is today one of the most popular and studied ones. It provides a gl...
Article
Full-text available
The Internet of Things (IoT) plays a crucial role in our daily lives. Many objects are being equipped with electronic components in order to facilitate their interconnection and integration with the Internet. Due to the growing usage of IoT devices and generated data, to ensure the reliability of the network, it is necessary to utilize scalable and...
Article
Full-text available
The semiconductor industry has adopted heterogeneous integration (HI), incorporating modular intellectual property (IP) blocks (chiplets) into a unified system-in-package (SiP) to overcome the slowdown in Moore’s Law and Dennard scaling and to respond to the increasing demand for advanced integrated circuits (ICs). Despite the manifold benefits of...
Article
Full-text available
The proliferation of the Internet of Things (IoT) has brought unprecedented connectivity, introducing complex trust and reputation management challenges across vast, heterogeneous networks. This paper introduces the DeepTrust framework, a novel approach leveraging deep learning algorithms to assess and manage trust and reputation in IoT environment...
Preprint
Full-text available
The ubiquity of mobile phones and web technology has facilitated continuous communication within Online Social Networks (OSNs) such as Twitter, Instagram, Facebook, and LinkedIn. In OSNs, individuals have the capability to share posts and photos with their relatives and friends, as well as to promote and publicize their businesses. However, this al...
Article
Full-text available
Restructurings in financial institutions are complex processes that require effective communication to minimize uncertainties, manage employee concerns, and maintain stakeholder confidence. This paper explores the importance of communication during restructurings and presents a best practice approach to facilitate successful communication throughou...
Article
Full-text available
Wireless Body Area Networks (WBANs) are an emerging industrial technology for monitoring physiological data. These networks employ medical wearable and implanted biomedical sensors aimed at improving quality of life by providing body-oriented services through a variety of industrial sensing gadgets. The sensors collect vital data from the body and...
Article
Full-text available
The most traditional policy models which do not consider dynamic nature of distribute systems and the limitation in addressing issues like adaptability, extensibility, and reasoning over security policies. The main cause of the flexibility and scalability issues in the environments of the Internet and dynamic networks is that there is no central co...
Article
Full-text available
The advent of the Internet of Vehicles (IoV) has led to a significant surge in data generation from vehicles, prompting the innovative utilization of data transactions within the IoV environment. However, due to the inherent trustless nature of data transactions in IoV, concerns have arisen regarding the lack of trust between involved parties and t...
Conference Paper
Full-text available
Nowadays, critical infrastructures are managed through paradigms such as cloud/fog/edge computing and Network Function Virtualization (NFV), providing advantages as flexibility, availability, and reduced management costs. These paradigms introduce several advantages but-given their nature of physically distributed systems-leave room for various sec...
Article
Full-text available
Dynamic allocation of frequency resources to nodes in a wireless communication network is a well-known method adopted to mitigate potential interference, both unintentional and malicious. Various selection approaches have been adopted in literature, to limit the impact of interference and keep a high quality of wireless links. In this paper, we pro...
Article
Full-text available
Artificial Intelligence (AI) is now applied in various contexts, from casual uses like entertainment and smart homes to critical decisions such as determining medical priorities, drug recommendations, humanitarian aid planning, satellite schedules, privacy, and detecting malicious software. There has been significant research into the societal impa...
Article
Full-text available
The uncertainty introduced by the use of low-cost sensors in ad-hoc sensor networks is an ongoing concern that can be alleviated at the network level through a hybrid solution that relies on the use of reference nodes and reputation-based trust management. As reference nodes impose a significant expense, it is important to minimize their number whi...
Article
Full-text available
The Denial of Service (DoS) attack threatens the availability of key components of Vehicular Ad-hoc Network (VANET). Various centralized and decentralized trust-based approaches have been proposed to secure the VANET from DoS attack. The centralized approach is less efficient because the attack on the central trust manager leads to the overall fail...
Thesis
Full-text available
In an era where the Internet plays an ever-expanding role, trust is the cornerstone of secure and seamless digital interactions. Trust verification is critical in diverse electronic transactions within our increasingly interconnected digital landscape. This thesis enhances trust verification in diverse electronic transactions within a heterogeneous...
Article
Full-text available
Aim: This study aims to explore the critical dimension of assessing the perceptions and readiness of hematologists to embrace artificial intelligence (AI) technologies in their diagnostic and treatment decision-making processes. Methods: This study used a cross-sectional design for collecting data related to the perceptions and readiness of hematol...
Article
Full-text available
To transform existing education practices in tackling different challenges and future uncertainties, it is essential to engage teachers as active agents in students’ learning, collegial collaboration, school development and societal issues throughout the career. This study investigates the change and continuity of teacher professional agency associ...
Article
Full-text available
With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also gradually becoming prominent. At present, research on network security protection mainly starts from the overall perspective, and some studies also start from the interaction between nodes. However, the...
Article
Full-text available
As an important part of the industrial internet, identity analysis data are growing with the expansion of the field involved in the industrial internet. The management of industrial internet identity analysis data faces many problems, such as complex types, a wide range of information, rapid growth, reduced security, etc. In view of the above probl...
Article
Full-text available
Flying Ad‐Hoc Network (FANET) is a promising ad hoc networking paradigm that can offer new added value services in military and civilian applications. Typically, it incorporates a group of Unmanned Aerial Vehicles (UAVs), known as drones that collaborate and cooperate to accomplish several missions without human intervention. However, UAV communica...
Article
Full-text available
The data are combined and transmitted through wireless sensor network (WSN) in internet of things applications. Multi‐Objective Cluster Head Based Energy Aware Routing using Auto‐Metric Graph Neural Network with Hybrid Balancing Composite Motion and Border Collie Optimization is proposed in this article for secured data aggregation (SDA) in WSN. Th...
Article
Full-text available
Wireless Sensor Network (WSN) is a network area that includes a large number of nodes and the ability of wireless transmission. WSNs are frequently employed for vital applications in which security and dependability are of utmost concern. The main objective of the proposed method is to design a WSN to maximize network longevity while minimizing pow...
Conference Paper
Full-text available
Recent advances in the Internet of Things (IoT), machine learning, and edge computing have led to the development of paradigms such as smart cities, smart grids, smart healthcare, and intelligent transportation systems as efficient and cost-effective solutions. Subsequently, there has also been an increase in the number of connected devices, rangin...
Article
Full-text available
Live-streaming commerce has become increasingly prevalent in recent years and has significantly impacted consumer purchasing behavior. This study aims to assess the impact of live-streaming environmental features, presence, and perceived trust on consumer purchase intention, building upon the stimulus-organism-response (SOR) model. The authors obta...
Conference Paper
Full-text available
Successful information propagation from source to destination in Vehicular Adhoc Network (VANET) can be hampered by the presence of neighbouring attacker nodes causing unwanted packet dropping. Potential attackers change their behaviour over time and remain undetected due to the adhoc nature of VANET. Capturing the dynamic attacker behaviour and up...
Article
Full-text available
From diagnosis to therapies, the development of artificial intelligence (AI) has facilitated improvements in personalised healthcare applications. The evolution of AI in healthcare is closely related to the changes in the types and volumes of data which we need to deal with. The first generation of healthcare technologies, represented by the highly...
Conference Paper
Full-text available
Trust is an important factor in the success of P2P networks. It is needed to ensure that nodes in the network can be trusted to behave honestly and to deliver on their promises (e.g sharing resources). While traditional reputation trust management systems (RTMS) such as BTrust or EigenTrust have proven effective, there is room for further enhanceme...
Article
Full-text available
A mechanism of fog computing environment is employed in order to enhance the cloud computing services toward the edge devices in a range of locations with low latency. A fog computing environment is effective when compared to cloud computing for providing communication between various edge devices such as smart devices and mobile devices used by us...
Article
Full-text available
Introduction: Health workers faced overwhelming demands and experienced crisis levels of burnout before the COVID-19 pandemic; the pandemic presented unique challenges that further impaired their mental health. Methods: Data from the General Social Survey Quality of Worklife Module were analyzed to compare self-reported mental health symptoms am...
Article
Full-text available
The article analyzed the higher education financing system of the Russian Federation and highlighted the issues that limit the management and financing of higher education, strengthening and development, improving the quality of education and increasing the efficiency, competitiveness, financing and transparency of the higher education system in th...
Conference Paper
Full-text available
Flying Ad Hoc Networks (FANETs) have emerged as a transformative technology, offering versatile applications across surveillance, communication, disaster relief, and more. However, the dynamic and decentralized nature of FANETs, coupled with their vulnerability to various threats, necessitates robust trust management techniques to ensure reliable a...
Article
Full-text available
With the growth of network technology, network security issues have gradually emerged, and people have gradually begun to focus on network security issues. In network security management technology, network anomaly detection is an important step. At present, network security technologies mainly include network firewall technology, anti-virus softwa...
Article
Full-text available
The conventional trust model employed in satellite network security routing algorithms exhibits limited accuracy in detecting malicious nodes and lacks adaptability when confronted with unknown attacks. To address this challenge, this paper introduces a secure satellite network routing technology founded on deep learning and trust management. The a...
Article
Full-text available
The rapid proliferation of mobile devices and multimedia content has led to an increased need for ensuring trustworthiness and authentication of the shared data. Traditional centralized methods have proven to be insufficient in maintaining privacy and addressing scalability issues. This paper presents a novel approach to enhancing mobile multimedia...
Article
Full-text available
Designing a routing protocol that can against the attacks of malicious nodes is very essential because open wireless channels make a wireless ad hoc network (WAN) affected by different security attacks. To overcome this problem, Dual-Discriminator Conditional Generative Adversarial Network Optimized with Namib beetle optimization algorithm is propo...
Chapter
Full-text available
As mobile networks grow, managing the security of communication between all its internal components becomes more challenging because of the increasing number of services, network functions, and stakeholders involved. Among the different dimensions of security, trust is one that 5G communication service providers (CSP) must prioritize to provide sec...
Preprint
Full-text available
Non-Fungible Tokens (NFTs) are blockchain-based digital assets that are unique and cannot be replicated. In most cases, NFTs are used to hold the unique value of an asset in a traceable manner. However, NFTs can also be leveraged to provide a unique digital identity, allowing for secure data storage, access, and sharing. These features provide impo...
Article
Full-text available
Technological development combined with the evolution of the Internet has made it possible to reach an increasing number of people over the years and given them the opportunity to access information published on the network. The growth in the number of fake news generated daily, combined with the simplicity with which it is possible to share them,...