{"id":"https://openalex.org/W3012037979","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035294","title":"Fuzzy Logic Based Security Trust Evaluation for IoT Environments","display_name":"Fuzzy Logic Based Security Trust Evaluation for IoT Environments","publication_year":2019,"publication_date":"2019-11-01","ids":{"openalex":"https://openalex.org/W3012037979","doi":"https://doi.org/10.1109/aiccsa47632.2019.9035294","mag":"3012037979"},"language":"en","primary_location":{"id":"doi:10.1109/aiccsa47632.2019.9035294","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107334806","display_name":"Ahmad Khalil","orcid":"https://orcid.org/0000-0002-3507-9084"},"institutions":[{"id":"https://openalex.org/I4387155724","display_name":"Laboratoire d'Informatique de Bourgogne","ror":"https://ror.org/038kqx890","country_code":"FR","type":"facility","lineage":["https://openalex.org/I4387155724","https://openalex.org/I4405253280"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Ahmad Khalil","raw_affiliation_strings":["Laboratoire Informatique de Bourgogne (LIB) University of Bourgogne Franche-Comt\u00e9, Dijon, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire Informatique de Bourgogne (LIB) University of Bourgogne Franche-Comt\u00e9, Dijon, France","institution_ids":["https://openalex.org/I4387155724"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072387034","display_name":"Nader Mbarek","orcid":"https://orcid.org/0000-0002-9274-6816"},"institutions":[{"id":"https://openalex.org/I4387155724","display_name":"Laboratoire d'Informatique de Bourgogne","ror":"https://ror.org/038kqx890","country_code":"FR","type":"facility","lineage":["https://openalex.org/I4387155724","https://openalex.org/I4405253280"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Nader Mbarek","raw_affiliation_strings":["Laboratoire Informatique de Bourgogne (LIB) University of Bourgogne Franche-Comt\u00e9, Dijon, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire Informatique de Bourgogne (LIB) University of Bourgogne Franche-Comt\u00e9, Dijon, France","institution_ids":["https://openalex.org/I4387155724"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045655458","display_name":"Olivier Togni","orcid":"https://orcid.org/0000-0001-9510-3595"},"institutions":[{"id":"https://openalex.org/I4387155724","display_name":"Laboratoire d'Informatique de Bourgogne","ror":"https://ror.org/038kqx890","country_code":"FR","type":"facility","lineage":["https://openalex.org/I4387155724","https://openalex.org/I4405253280"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Olivier Togni","raw_affiliation_strings":["Laboratoire Informatique de Bourgogne (LIB) University of Bourgogne Franche-Comt\u00e9, Dijon, France"],"affiliations":[{"raw_affiliation_string":"Laboratoire Informatique de Bourgogne (LIB) University of Bourgogne Franche-Comt\u00e9, Dijon, France","institution_ids":["https://openalex.org/I4387155724"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5107334806"],"corresponding_institution_ids":["https://openalex.org/I4387155724"],"apc_list":null,"apc_paid":null,"fwci":1.2996,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.83325227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8197818994522095},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.6843412518501282},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6779001951217651},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6258008480072021},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5972509980201721},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5681116580963135},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5654913783073425},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.5355135798454285},{"id":"https://openalex.org/keywords/subjective-logic","display_name":"Subjective logic","score":0.515330970287323},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4820905029773712},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47644713521003723},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.43816742300987244},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.32434743642807007},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.30260783433914185},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11393868923187256},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.07533255219459534},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.07379737496376038}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8197818994522095},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.6843412518501282},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6779001951217651},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6258008480072021},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5972509980201721},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5681116580963135},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5654913783073425},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.5355135798454285},{"id":"https://openalex.org/C113839178","wikidata":"https://www.wikidata.org/wiki/Q7631418","display_name":"Subjective logic","level":3,"score":0.515330970287323},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4820905029773712},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47644713521003723},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.43816742300987244},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.32434743642807007},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30260783433914185},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11393868923187256},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.07533255219459534},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.07379737496376038},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/aiccsa47632.2019.9035294","is_oa":false,"landing_page_url":"https://doi.org/10.1109/aiccsa47632.2019.9035294","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","raw_type":"proceedings-article"},{"id":"pmh:oai:HAL:hal-02452340v1","is_oa":false,"landing_page_url":"https://hal.science/hal-02452340","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"16th ACS/IEEE International Conference on Computer Systems and Applications AICCSA 2019, Nov 2019, Abu Dhabi, United Arab Emirates","raw_type":"Conference papers"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2074709832","https://openalex.org/W2082778186","https://openalex.org/W2117806953","https://openalex.org/W2518735427","https://openalex.org/W2901546971"],"related_works":["https://openalex.org/W2121112638","https://openalex.org/W4385687966","https://openalex.org/W2040971779","https://openalex.org/W2061426947","https://openalex.org/W2145254015","https://openalex.org/W4256353475","https://openalex.org/W2509590646","https://openalex.org/W1889023078","https://openalex.org/W2171905045","https://openalex.org/W2912841859"],"abstract_inverted_index":{"In":[0,25,73],"the":[1,6,20,41,44,58,67,82,129,134,156,169,176],"new":[2],"technological":[3],"era":[4],"called":[5],"Internet":[7,21],"of":[8,43,60,86,139],"Things":[9],"(IoT),":[10],"people,":[11],"machines":[12],"and":[13,33,50,107,151],"objects":[14],"communicate":[15],"with":[16],"each":[17,121],"other":[18],"via":[19],"by":[22,132],"exchanging":[23,69],"information.":[24,72],"this":[26,74],"context,":[27],"trust":[28,66,84,118,140],"plays":[29],"an":[30,124,164],"important":[31],"role":[32,166],"is":[34],"considered":[35],"as":[36,100,123],"a":[37,78,91,117],"key":[38],"factor":[39],"in":[40,53,137,167],"success":[42],"IoT":[45,48,87,157],"services":[46,49],"expansion.":[47],"applications":[51],"use":[52],"some":[54],"cases":[55],"data":[56],"concerning":[57],"privacy":[59,153],"their":[61,70,180],"users.":[62],"Consequently,":[63],"users":[64,159],"should":[65],"entities":[68],"personal":[71],"paper,":[75],"we":[76],"present":[77],"framework":[79],"that":[80],"evaluates":[81,116],"security":[83],"level":[85,119,173],"nodes":[88,171],"based":[89,127],"on":[90,128],"Fuzzy":[92,113],"Logic":[93,114],"model":[94,115],"using":[95],"different":[96],"input":[97],"parameters":[98],"such":[99],"Device":[101,104,108],"Physical":[102],"Security,":[103],"Security":[105],"Level":[106],"Ownership":[109],"Trust.":[110],"The":[111],"proposed":[112],"for":[120],"node":[122],"output.":[125],"Then,":[126],"threshold":[130],"defined":[131],"users,":[133],"best":[135],"node(s)":[136],"terms":[138],"level,":[141],"is/are":[142],"selected":[143],"to":[144,162,178],"collect":[145,179],"information,":[146],"which":[147],"could":[148],"be":[149],"critical":[150],"concern":[152],"protection.":[154],"Thus,":[155],"service":[158],"are":[160],"able":[161],"play":[163],"active":[165],"selecting":[168],"trusted":[170],"(trust":[172],"greater":[174],"than":[175],"threshold)":[177],"data.":[181]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
