
iot sites using machine learning approaches. Internet
of Things, 7:100059.
Hongjun, D., Zhiping, J., and Xiaona, D. (2008). An
Entropy-based Trust Modeling and Evaluation for
Wireless Sensor Networks. In 2008 International
Conference on Embedded Software and Systems,
pages 27–34.
Junior, F. M. R. and Kamienski, C. A. (2021). A survey on
trustworthiness for the internet of things. IEEE Ac-
cess, 9:42493–42514.
Khan, M. A. and Salah, K. (2018). IoT security: Review,
blockchain solutions, and open challenges. Future
Generation Computer Systems, 82:395–411.
Khan, Z. A., Ullrich, J., Voyiatzis, A. G., and Herrmann,
P. (2017). A Trust-Based Resilient Routing Mecha-
nism for the Internet of Things. In Proceedings of the
12th International Conference on Availability, Relia-
bility and Security, ARES ’17, New York, NY, USA.
Association for Computing Machinery.
Kullback, S. (1959). Information Theory and Statistics. Wi-
ley, New York.
Li, W., Santos, I., Delicato, F. C., Pires, P. F., Pirmez, L.,
Wei, W., Song, H., Zomaya, A., and Khan, S. (2017).
System modelling and performance evaluation of a
three-tier Cloud of Things. Future Generation Com-
puter Systems, 70:104 – 125.
Liu, L., Loper, M., Ozkaya, Y., Yasar, A., and Yigitoglu, E.
(2016). Machine to machine trust in the iot era. In
Proceedings of the 18th International Conference on
Trust in Agent Societies - Volume 1578, TRUST’16,
page 18–29, Aachen, DEU. CEUR-WS.org.
Macedo, E. L. C., de Oliveira, E. A. R., Silva, F. H., Mello,
R. R., Franc¸a, F. M. G., Delicato, F. C., de Rezende,
J. F., and de Moraes, L. F. M. (2019). On the security
aspects of Internet of Things: A systematic literature
review. Journal of Communications and Networks,
21(5):444–457.
Macedo, E. L. C., Silva, R. S., de Moraes, L. F. M., and
Fortino, G. (2020). Trust Aspects of Internet of Things
in the Context of 5G and Beyond. In 2020 4th Con-
ference on Cloud and Internet of Things (CIoT), pages
59–66.
Paliszkiewicz, J. (2018). Trust: A Multifaceted Notion,
pages 9–23. Springer International Publishing, Cham.
Principe, J. C. (2010). Information theoretic learning:
Renyi’s entropy and kernel perspectives. Springer Sci-
ence & Business Media, USA.
Prokofiev, A. O., Smirnova, Y. S., and Silnov, D. S. (2017).
The Internet of Things cybersecurity examination. In
2017 Siberian Symposium on Data Science and Engi-
neering (SSDSE), pages 44–48.
Sato, H., Kanai, A., Tanimoto, S., and Kobayashi, T. (2016).
Establishing Trust in the Emerging Era of IoT. In 2016
IEEE Symposium on Service-Oriented System Engi-
neering (SOSE), pages 398–406.
Sfar, A. R., Natalizio, E., Challal, Y., and Chtourou, Z.
(2018). A roadmap for security challenges in the Inter-
net of Things. Digital Communications and Networks,
4(2):118 – 137.
Shannon, C. E. (1948). A Mathematical Theory of Commu-
nication. Bell System Technical Journal, 27(3):379–
423.
Shi, W., Cao, J., Zhang, Q., Li, Y., and Xu, L. (2016). Edge
Computing: Vision and Challenges. IEEE Internet of
Things Journal, 3(5):637–646.
Sicari, S., Rizzardi, A., Grieco, L., and Coen-Porisini, A.
(2015). Security, privacy and trust in Internet of
Things: The road ahead. Computer Networks, 76:146
– 164.
Sivanathan, A., Sherratt, D., Gharakheili, H. H., Radford,
A., Wijenayake, C., Vishwanath, A., and Sivaraman,
V. (2017). Characterizing and classifying IoT traffic
in smart cities and campuses. In 2017 IEEE Confer-
ence on Computer Communications Workshops (IN-
FOCOM WKSHPS), pages 559–564.
Stankovic, J. A. (2014). Research Directions for the Internet
of Things. IEEE Internet of Things Journal, 1(1):3–9.
Statista (2021). IoT and non-IoT connections worldwide
2010-2025 . Technical report, Statista.
Tang, B., Kang, H., Fan, J., Li, Q., and Sandhu, R. (2019).
IoT Passport: A Blockchain-Based Trust Framework
for Collaborative Internet-of-Things. In Proceedings
of the 24th ACM Symposium on Access Control Mod-
els and Technologies, SACMAT ’19, page 83–92,
New York, NY, USA. Association for Computing Ma-
chinery.
Wang, K., Xu, S. P., Chen, C.-M., Islam, S. H., Hassan,
M. M., Savaglio, C., Pace, P., and Aloi, G. (2021).
A trusted consensus scheme for collaborative learn-
ing in the edge ai computing domain. IEEE Network,
35(1):204–210.
Wang, P. and Zhang, P. (2016). A Review on Trust Eval-
uation for Internet of Things. In Proceedings of the
9th EAI International Conference on Mobile Multime-
dia Communications, MobiMedia ’16, pages 34–39,
ICST, Brussels, Belgium, Belgium. ICST (Institute for
Computer Sciences, Social-Informatics and Telecom-
munications Engineering).
Yan, Z., Zhang, P., and Vasilakos, A. V. (2014). A survey
on trust management for Internet of Things. Journal
of network and computer applications, 42:120–134.
Zhang, P. and Zhou, M. (2020). Security and trust in
blockchains: Architecture, key technologies, and open
issues. IEEE Transactions on Computational Social
Systems, 7(3):790–801.
Zhang, P., Zhou, M., and Fortino, G. (2018). Security and
trust issues in fog computing: A survey. Future Gen-
eration Computer Systems, 88:16 – 27.
Zhou, B., Li, H., and Xu, L. (2018). An Authentication
Scheme Using Identity-based Encryption Blockchain.
In 2018 IEEE Symposium on Computers and Commu-
nications (ISCC), pages 00556–00561.
IoTBDS 2022 - 7th International Conference on Internet of Things, Big Data and Security
36