{"id":"https://openalex.org/W2912441624","doi":"https://doi.org/10.1109/lcn.2018.8638056","title":"Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things","display_name":"Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2912441624","doi":"https://doi.org/10.1109/lcn.2018.8638056","mag":"2912441624"},"language":"en","primary_location":{"id":"doi:10.1109/lcn.2018.8638056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2018.8638056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 43rd Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049875605","display_name":"Abdelmuttlib Ibrahim Abdalla Ahmed","orcid":"https://orcid.org/0000-0003-2966-097X"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":true,"raw_author_name":"Abdelmuttlib Ibrahim Abdalla Ahmed","raw_affiliation_strings":["Center for Mobile Cloud Computing Research (C4MCCR), Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center for Mobile Cloud Computing Research (C4MCCR), Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005292451","display_name":"Suleman Khan","orcid":"https://orcid.org/0000-0003-1190-258X"},"institutions":[{"id":"https://openalex.org/I11662577","display_name":"Monash University Malaysia","ror":"https://ror.org/00yncr324","country_code":"MY","type":"education","lineage":["https://openalex.org/I11662577"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Suleman Khan","raw_affiliation_strings":["School of Information Technology, Monash University, Malaysia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Monash University, Malaysia","institution_ids":["https://openalex.org/I11662577"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091401182","display_name":"Abdullah Gani","orcid":"https://orcid.org/0000-0002-4388-020X"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Abdullah Gani","raw_affiliation_strings":["Center for Mobile Cloud Computing Research (C4MCCR), Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center for Mobile Cloud Computing Research (C4MCCR), Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001320706","display_name":"Siti Hafizah Ab Hamid","orcid":"https://orcid.org/0000-0001-9598-8813"},"institutions":[{"id":"https://openalex.org/I33849332","display_name":"University of Malaya","ror":"https://ror.org/00rzspn62","country_code":"MY","type":"education","lineage":["https://openalex.org/I33849332"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Siti Hafizah Ab Hamid","raw_affiliation_strings":["Center for Mobile Cloud Computing Research (C4MCCR), Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia"],"affiliations":[{"raw_affiliation_string":"Center for Mobile Cloud Computing Research (C4MCCR), Faculty of Computer Science and Information Technology, University of Malaya, Kuala Lumpur, Malaysia","institution_ids":["https://openalex.org/I33849332"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057916222","display_name":"Mohsen Guizani","orcid":"https://orcid.org/0000-0002-8972-8094"},"institutions":[{"id":"https://openalex.org/I155093810","display_name":"University of Idaho","ror":"https://ror.org/03hbp5t65","country_code":"US","type":"education","lineage":["https://openalex.org/I155093810"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohsen Guizani","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Idaho, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Idaho, USA","institution_ids":["https://openalex.org/I155093810"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5049875605"],"corresponding_institution_ids":["https://openalex.org/I33849332"],"apc_list":null,"apc_paid":null,"fwci":5.3617,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.95678532,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"606","last_page":"613"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9617000222206116,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10050","display_name":"Multi-Criteria Decision Making","score":0.9613000154495239,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7962424755096436},{"id":"https://openalex.org/keywords/analytic-hierarchy-process","display_name":"Analytic hierarchy process","score":0.6042963266372681},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.5895340442657471},{"id":"https://openalex.org/keywords/vagueness","display_name":"Vagueness","score":0.5877780914306641},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5491369962692261},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.5300963521003723},{"id":"https://openalex.org/keywords/fuzzy-set","display_name":"Fuzzy set","score":0.5124629139900208},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.4924252927303314},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.4851468503475189},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4784691035747528},{"id":"https://openalex.org/keywords/fuzzy-logic","display_name":"Fuzzy logic","score":0.4211360812187195},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.37712863087654114},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3499279022216797},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3400266170501709},{"id":"https://openalex.org/keywords/operations-research","display_name":"Operations research","score":0.2567653954029083},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.20522883534431458}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7962424755096436},{"id":"https://openalex.org/C87345402","wikidata":"https://www.wikidata.org/wiki/Q485202","display_name":"Analytic hierarchy process","level":2,"score":0.6042963266372681},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.5895340442657471},{"id":"https://openalex.org/C2776825360","wikidata":"https://www.wikidata.org/wiki/Q1411921","display_name":"Vagueness","level":3,"score":0.5877780914306641},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5491369962692261},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.5300963521003723},{"id":"https://openalex.org/C42011625","wikidata":"https://www.wikidata.org/wiki/Q1055058","display_name":"Fuzzy set","level":3,"score":0.5124629139900208},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.4924252927303314},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.4851468503475189},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4784691035747528},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.4211360812187195},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.37712863087654114},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3499279022216797},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3400266170501709},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.2567653954029083},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.20522883534431458},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/lcn.2018.8638056","is_oa":false,"landing_page_url":"https://doi.org/10.1109/lcn.2018.8638056","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 43rd Conference on Local Computer Networks (LCN)","raw_type":"proceedings-article"},{"id":"pmh:oai:nrl.northumbria.ac.uk:40163","is_oa":false,"landing_page_url":"http://nrl.northumbria.ac.uk/40163/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401884","display_name":"Northumbria Research Link (Northumbria University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I32394136","host_organization_name":"Northumbria University","host_organization_lineage":["https://openalex.org/I32394136"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference or Workshop Item"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7699999809265137,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1590638423","https://openalex.org/W1898259180","https://openalex.org/W1951021953","https://openalex.org/W1976549461","https://openalex.org/W2027658147","https://openalex.org/W2028291172","https://openalex.org/W2034960640","https://openalex.org/W2041404167","https://openalex.org/W2045122145","https://openalex.org/W2071200009","https://openalex.org/W2076296214","https://openalex.org/W2086226971","https://openalex.org/W2120051256","https://openalex.org/W2123770198","https://openalex.org/W2128071980","https://openalex.org/W2134081299","https://openalex.org/W2142175015","https://openalex.org/W2157034822","https://openalex.org/W2161248663","https://openalex.org/W2161795680","https://openalex.org/W2168936936","https://openalex.org/W2313273281","https://openalex.org/W2978725006","https://openalex.org/W3014919463"],"related_works":["https://openalex.org/W4243605140","https://openalex.org/W2495963281","https://openalex.org/W4385687966","https://openalex.org/W2509590646","https://openalex.org/W2940914837","https://openalex.org/W2170496240","https://openalex.org/W2916013893","https://openalex.org/W2118529154","https://openalex.org/W2300110045","https://openalex.org/W2383693787"],"abstract_inverted_index":{"Nowadays,":[0],"trust":[1,28,43,78,88,105,121,136,198],"and":[2,16,38,50,133,153,195],"reputation":[3],"models":[4],"are":[5],"used":[6],"to":[7,53,160,183],"build":[8],"a":[9,30,69,80,85,104,109,142,171],"wide":[10],"range":[11],"of":[12,24,61,68,87,116,135],"trust-based":[13,17,175],"security":[14],"mechanisms":[15],"service":[18,111,167,186],"management":[19],"applications":[20],"on":[21,58],"the":[22,59,65,92,114,130,162,180,185,190,197],"Internet":[23],"Things":[25],"(IoT).":[26],"Considering":[27],"as":[29,79,103],"single":[31],"unit":[32],"can":[33],"result":[34],"in":[35,148,174,179,193],"missing":[36],"important":[37],"significant":[39],"factors.":[40],"We":[41,95,169],"split":[42],"into":[44],"its":[45,62],"building-blocks,":[46],"then":[47],"we":[48,76],"sort":[49],"assign":[51],"weight":[52],"these":[54,74],"building-blocks":[55],"(trust":[56],"metrics)":[57],"basis":[60],"priorities":[63],"for":[64,107,145,165],"transaction":[66],"context":[67],"particular":[70],"goal.":[71],"To":[72],"perform":[73],"processes,":[75],"consider":[77],"multi-criteria":[81,150],"decision-making":[82],"problem,":[83],"where":[84],"set":[86],"worthiness":[89],"metrics":[90],"represent":[91],"decision":[93,117,151],"criteria.":[94],"introduce":[96],"Entropy-based":[97],"fuzzy":[98],"analytic":[99],"hierarchy":[100],"process":[101],"(EFAHP)":[102],"model":[106],"selecting":[108],"trustworthy":[110],"provider,":[112],"since":[113],"sense":[115],"making":[118,146],"regarding":[119],"multi-metrics":[120],"is":[122,141,158],"structural.":[123],"EFAHP":[124,191],"gives":[125],"1)":[126],"fuzziness,":[127],"which":[128,140,157],"fits":[129],"vagueness,":[131],"uncertainty,":[132],"subjectivity":[134],"attributes;":[137],"2)":[138],"AHP,":[139],"systematic":[143],"way":[144],"decisions":[147],"complex":[149],"making;":[152],"3)":[154],"entropy":[155],"concept,":[156],"utilized":[159],"calculate":[161],"aggregate":[163],"weights":[164],"each":[166],"provider.":[168],"present":[170],"numerical":[172],"illustration":[173],"Service":[176],"Oriented":[177],"Architecture":[178],"IoT":[181],"(SOA-IoT)":[182],"demonstrate":[184],"provider":[187],"selection":[188],"using":[189],"Model":[192],"assessing":[194],"aggregating":[196],"scores.":[199]},"counts_by_year":[{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
