{"id":"https://openalex.org/W7125956072","doi":"https://doi.org/10.1109/smc58881.2025.11343034","title":"OMATE-ZT: Optimized Multi-Attribute Trust Evaluation Model for Zero-Trust in Industrial Internet of Things","display_name":"OMATE-ZT: Optimized Multi-Attribute Trust Evaluation Model for Zero-Trust in Industrial Internet of Things","publication_year":2025,"publication_date":"2025-10-05","ids":{"openalex":"https://openalex.org/W7125956072","doi":"https://doi.org/10.1109/smc58881.2025.11343034"},"language":null,"primary_location":{"id":"doi:10.1109/smc58881.2025.11343034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124068294","display_name":"Meng Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I125904092","display_name":"Shenyang Aerospace University","ror":"https://ror.org/02423gm04","country_code":"CN","type":"education","lineage":["https://openalex.org/I125904092"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Meng Zhang","raw_affiliation_strings":["Shenyang Aerospace University,College of Artificial Intelligence,Shenyang,China"],"affiliations":[{"raw_affiliation_string":"Shenyang Aerospace University,College of Artificial Intelligence,Shenyang,China","institution_ids":["https://openalex.org/I125904092"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124058283","display_name":"Yuliang Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I125904092","display_name":"Shenyang Aerospace University","ror":"https://ror.org/02423gm04","country_code":"CN","type":"education","lineage":["https://openalex.org/I125904092"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuliang Cheng","raw_affiliation_strings":["Shenyang Aerospace University,College of Artificial Intelligence,Shenyang,China"],"affiliations":[{"raw_affiliation_string":"Shenyang Aerospace University,College of Artificial Intelligence,Shenyang,China","institution_ids":["https://openalex.org/I125904092"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101619711","display_name":"Hangyu Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hangyu Wang","raw_affiliation_strings":["Institute of Information Engineering, CAS,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101950263","display_name":"Fei Lv","orcid":"https://orcid.org/0000-0002-6219-9946"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Lv","raw_affiliation_strings":["Institute of Information Engineering, CAS,Beijing,China"],"affiliations":[{"raw_affiliation_string":"Institute of Information Engineering, CAS,Beijing,China","institution_ids":["https://openalex.org/I4210156404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5124068294"],"corresponding_institution_ids":["https://openalex.org/I125904092"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.7552392,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"5088","last_page":"5094"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.23970000445842743,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.23970000445842743,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.23260000348091125,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.18160000443458557,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/industrial-internet","display_name":"Industrial Internet","score":0.6628999710083008},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.582099974155426},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5539000034332275},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46700000762939453},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.424699991941452},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.367000013589859}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7788000106811523},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6629999876022339},{"id":"https://openalex.org/C202839342","wikidata":"https://www.wikidata.org/wiki/Q60740481","display_name":"Industrial Internet","level":3,"score":0.6628999710083008},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.582099974155426},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5539000034332275},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.5034000277519226},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46700000762939453},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.424699991941452},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.367000013589859},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.3176000118255615},{"id":"https://openalex.org/C168031717","wikidata":"https://www.wikidata.org/wiki/Q1530280","display_name":"Balance (ability)","level":2,"score":0.29190000891685486},{"id":"https://openalex.org/C3018395757","wikidata":"https://www.wikidata.org/wiki/Q1379672","display_name":"Evaluation methods","level":2,"score":0.2786000072956085},{"id":"https://openalex.org/C40071531","wikidata":"https://www.wikidata.org/wiki/Q2513962","display_name":"Industrial control system","level":3,"score":0.2766000032424927},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.2685000002384186}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/smc58881.2025.11343034","is_oa":false,"landing_page_url":"https://doi.org/10.1109/smc58881.2025.11343034","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Conference on Systems, Man, and Cybernetics (SMC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2999943723","https://openalex.org/W3121084507","https://openalex.org/W3143652073","https://openalex.org/W3195846920","https://openalex.org/W4220963030","https://openalex.org/W4285727657","https://openalex.org/W4320029285","https://openalex.org/W4364301920","https://openalex.org/W4385956833","https://openalex.org/W4386445981","https://openalex.org/W4387757647","https://openalex.org/W4387872721","https://openalex.org/W4389143741","https://openalex.org/W4389451945","https://openalex.org/W4391953359","https://openalex.org/W4394674411","https://openalex.org/W4402156680","https://openalex.org/W4406612230"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,15,17,45,75,145],"growth":[2],"of":[3,6,19,168,190,196],"Industrial":[4],"Internet":[5],"Things":[7],"(IIoT)":[8],"devices":[9],"and":[10,64,81,134,154,170,211],"their":[11],"deeper":[12],"integration":[13],"with":[14,41,192],"internet,":[16],"risk":[18],"cyberattacks":[20],"is":[21],"increasing.":[22],"Traditional":[23],"perimeter-based":[24,56],"security":[25,57,169],"architectures":[26],"rely":[27],"on":[28,112],"fixed":[29],"trust":[30,68,84,142],"boundaries.":[31],"Once":[32],"these":[33],"boundaries":[34],"are":[35],"breached,":[36],"attackers":[37],"can":[38],"move":[39],"laterally":[40],"little":[42],"resistance,":[43],"exposing":[44],"system":[46,206],"to":[47,70,121],"further":[48],"threats.":[49],"Zero-Trust":[50],"(ZT)":[51],"breaks":[52],"away":[53],"from":[54],"traditional":[55],"approaches.":[58],"It":[59,115],"adopts":[60],"a":[61,92,100,139,177],"resource-centric":[62],"paradigm":[63],"incorporates":[65,116],"dynamic,":[66,140],"multi-dimensional":[67,88,141],"evaluation":[69,85,143,188],"prevent":[71],"lateral":[72],"movement":[73],"across":[74],"attack":[76],"surface.":[77],"Achieving":[78],"highly":[79],"accurate":[80],"real-time":[82,152,209],"ZT":[83,113],"under":[86],"complex,":[87],"attributes":[89],"has":[90],"become":[91],"key":[93],"challenge":[94],"for":[95,161],"IIoT":[96,162,220],"environment":[97],"security.":[98],"As":[99],"result,":[101],"we":[102],"propose":[103],"OMATE-ZT,":[104],"an":[105,117,148,187,193],"Optimized":[106],"Multi-Attribute":[107],"Trust":[108],"Evaluation":[109],"model":[110,146],"based":[111],"principles.":[114],"enhanced":[118],"FastKAN":[119],"algorithm":[120],"dynamically":[122],"evaluate":[123,155],"multiple":[124],"trust-related":[125],"dimensions,":[126],"including":[127],"subjects,":[128],"objects,":[129],"environmental":[130],"attributes,":[131],"network":[132],"traffic,":[133],"physical":[135],"indicators.":[136],"By":[137],"leveraging":[138],"mechanism,":[144],"achieves":[147,186],"effective":[149],"balance":[150],"between":[151],"responsiveness":[153],"accuracy.":[156],"This":[157],"makes":[158],"it":[159],"suitable":[160],"scenarios":[163],"that":[164,184,203],"require":[165],"high":[166],"levels":[167],"low-latency":[171],"decision-making.":[172],"We":[173],"validate":[174],"OMATE-ZT":[175,185,204],"using":[176],"real-world":[178],"industrial":[179],"dataset.":[180],"The":[181],"results":[182,201],"show":[183],"accuracy":[189],"99.72%":[191],"average":[194],"latency":[195],"0.3613":[197],"milliseconds":[198],"(ms).":[199],"These":[200],"indicate":[202],"enhances":[205],"security,":[207],"improves":[208],"responsiveness,":[210],"strengthens":[212],"adaptability,":[213],"while":[214],"effectively":[215],"mitigating":[216],"common":[217],"threats":[218],"in":[219],"environments.":[221]},"counts_by_year":[],"updated_date":"2026-02-23T20:09:44.859080","created_date":"2026-01-29T00:00:00"}
