<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Moving Target Defense and Trust management New Challenges for IoT and SIoT systems⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Souraya Hamida</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ammar Hamida</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Okba Kazar</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, Mohamed Khider University of Biskra</institution>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Batna 2</institution>
          ,
          <addr-line>Mostefa Ben Boulaid</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Kalba</institution>
          ,
          <addr-line>Sharjah</addr-line>
          ,
          <country country="AE">United Arab Emirates</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>A transition from traditional networks to a new era of IoT and social IoT has occurred as a result of the widespread use of mobile devices and wireless technology. Notwithstanding the advancements made, the safety of IoT and SIoT systems still has to be enhanced. For this need, we give a general overview of how trust management and moving target defense are used in IoT and SIoT to assure security.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;security</kwd>
        <kwd>Internet of Things</kwd>
        <kwd>Social Internet of Things</kwd>
        <kwd>moving target defense</kwd>
        <kwd>trust management</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>With the widespread use of wireless technologies and
mobile devices, traditional networks are giving way to the
Internet of Things (IoT). From industry to home services,
the Internet of Things has a significant impact on many
diferent areas [1] [2]</p>
      <p>The Social Internet of Things (SIoT) is a
groundbreaking new paradigm that was created by applying social
networking concepts to the Internet of Things. The latter Figure 1: Mapping between IoT and SIoT architecture[1]
is a potent architectural substitute for Internet of Things
solutions. Fig. 1. illustrates a mapping between IoT and
SIoT architecture. the moving target defense paradigm. Section 5 gives the</p>
      <p>IoT and SIoT systems are being used more and more conclusion and our future work.
in the real world. However, they are less secure than
modern non-IoT systems. In addition, to remove any
obstacles to the general adoption of IoT and SIoT, security 2. Trust management
problems related to them must be addressed in light of
their potential capabilities. A crucial component of secu- One of the most important components of security is
rity is managing trust and moving target defense [1] [3]. trust management. The purpose of trust management
We must comprehend the existing technologies, frame- systems is to inform users about trust and assist them
work for trust management, and moving target defense in making decisions. For trustworthy data fusion and
in IoT and SIoT systems to integrate security into these mining, qualified services with contextual information,
systems. In this paper, we provide an overview of the and improved user privacy and information security in
study of trust management and moving target defense the IoT, trust management is crucial.[1] [4] [5].
for IoT and SIoT systems. Trust management has been utilized in the Internet of</p>
      <p>The remainder of this work is structured as follows: Things to foster trustworthy information sharing among
sections 2 and 3 present an overview of trust management physical items and to construct social relationships
auand moving target defense in Iot and SIoT. Section 4 tonomously.[6].
illustrates the diference between trust management and</p>
      <sec id="sec-1-1">
        <title>2.1. Trust management in IoT</title>
        <sec id="sec-1-1-1">
          <title>2.1.1. Trust management technique</title>
          <p>in IoT systems, trust management is essential to allay
people’s worries about data integrity and privacy. The
methodical process of eliminating and safeguarding a
network from unreliable nodes, such as malicious nodes or
attacking nodes, broken nodes or malfunctioning nodes,
and selfish nodes, is known as trust management. Figure
2 is a summary of all trust management strategies found
in the literature [7] [2].</p>
        </sec>
        <sec id="sec-1-1-2">
          <title>2.1.2. Trust management Framework</title>
          <p>The significant limitations that come with IoT-based
wireless sensor networks make it dificult to suggest trust
management for these kinds of networks [2].</p>
          <p>
            Numerous works have presented a framework for IoT
trust management. To increase a node’s confidence,
several of the themes took into account the security
arrangements for each layer [8]. To provide a flexible secure
framework that may enhance security based on trust
evaluation in human-IoT interactions, other researchers
employed a model-based security toolkit [9] . Authors
[
            <xref ref-type="bibr" rid="ref18 ref4 ref7">10</xref>
            ] and [11] present a framework that enables
developers to incorporate trust concerns in the network while
accounting for the functional needs obtained from IoT
scenarios. To distribute public keys at the edge of a fog
network, the authors of [12] use trust tables at each node
[13].
          </p>
          <p>The selection of trust attributes in certain studies is
based on the quantity of successful and unsuccessful
transactions or positive and negative behaviours. Others
have just taken into account social interactions or QoS
characteristics [2] [14].</p>
        </sec>
      </sec>
      <sec id="sec-1-2">
        <title>2.2. Trust management in SIoT</title>
        <p>
          A novel framework for the Social Internet of Things (SIoT)
has surfaced in recent times. According to its owners’
established norms, every object in this paradigm can
autonomously form relationships with other objects in
the network. Establishing trustworthy links between
items and observing their dependability before
depending on their knowledge is crucial. Last but not least, trust
management has been applied to promote reliable
information sharing among physical objects and foster social
interactions on their own [15] [16] [
          <xref ref-type="bibr" rid="ref29">17</xref>
          ].
        </p>
        <sec id="sec-1-2-1">
          <title>2.2.1. TRUST MANAGEMENT FRAMEWORK IN SIoT</title>
          <p>
            the use of blockchain, machine learning, and deep
learning in trust management frameworks are some of the
most recent developments in this area [
            <xref ref-type="bibr" rid="ref38">18</xref>
            ] [19] [20][
            <xref ref-type="bibr" rid="ref38">18</xref>
            ]
[19] [20]. Specifically, blockchain ofers improved
security, fault tolerance, immutability, and transparency
[21].
          </p>
          <p>
            Outlines a methodology for trust management in
relation to node behaviour when Bad Mouthing Attack is
introduced in [
            <xref ref-type="bibr" rid="ref31">22</xref>
            ] [
            <xref ref-type="bibr" rid="ref31">22</xref>
            ]. Overall trust is the product of
expected and estimated trust, which is determined using
a Bayes Model and Weighted Sum. The trust calculation
makes use of past and anticipated behaviour to thwart
malicious attacks [21].
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>3. Moving Target Defense</title>
      <p>
        Moving Target Defense (MTD) is a cyberdefense
paradigm. It can be used to address the security issues
in Internet of Things networks. The fundamental idea
behind MTD is to ward of attackers by constantly
altering the attack surface (such as system and network
configurations) to raise the complexity and cost of the
attack and also refute any system intelligence that the
attackers may have gathered [23] [24] [
        <xref ref-type="bibr" rid="ref40">25</xref>
        ].
      </p>
      <sec id="sec-2-1">
        <title>3.1. MTD frameworks for IOT</title>
        <p>In [26], authors presented an MTD framework
appropriate for Internet of Things systems. The goal of the
suggested framework is to support MTD strategy
formulation and execution for Internet of Things systems. The
authors developed two MTD techniques based on the
framework: port-hopping, which targets UDP port
numbers, and the Constrained Application Protocol (CoAP).
Both strategies were implemented using actual Internet
of Things hardware platforms. Kyi et al. presented a
framework for IoT system security using an MTD
approach as a place to start when combining diverse
defense strategies at various IoT levels. The first component
corresponds to a real IoT system. In addition, a virtual
Internet of Things system relates to the second part of
the framework. An assault detection system corresponds
to the third component. There are not enough
components in the framework to create MTD strategies for IoT
systems [3].</p>
      </sec>
      <sec id="sec-2-2">
        <title>3.2. MTD techniques for IoT</title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>5. Conclusion</title>
      <p>Three basic design questions must be defined by an MTD
technique: WHAT, HOW, and WHEN to move. This last
can be defined as follows [24]:</p>
      <p>An evolving, new technological idea called the MTD
paradigm can safeguard an Internet of Things system
despite obstacles [27]. Although network topology
shuflfing can efectively halt attack actions utilizing
compromised IoT devices as stepping stones, none of the
MTDbased techniques applied to IoT considered this [28] [29]
[30].</p>
      <p>
        Decoys are deployed so that the network
shuflingbased MTD can deflect the attacker from real IoT devices
and give a false impression of the network while also
confusing the attacker with changing connections among
IoT devices. This can efectively raise the cost and efort
of the attack while lowering the likelihood that real IoT
devices would be afected [
        <xref ref-type="bibr" rid="ref40">25</xref>
        ].
      </p>
    </sec>
    <sec id="sec-4">
      <title>4. The diference between MTD and trust management</title>
      <p>There is a diference between the use of MTD and trust
management in IoT and SIoT systems. In this section, we
will mention the most important one. Table 1 illustrates
the diference between Mtd and trust management for
IoT and SIoT systems. The most important diference
is the Moving target defense is a defense mechanism
that dynamically changes the attack surface, but Trust
management is a security mechanism that dynamically
creates reliable social networking. In addition, the
Moving target defense applies to lower layers of the network
but Trust management is applied to the social layer
(application) in the object. Furthermore, several research
papers use trust management for IoT and SIoT but no
research work uses moving target defense for SIoT.
[2]
[3]
[4]
[5]</p>
      <p>Use it against social attacks by calculating the
reliability of the services provided by the objects.</p>
      <p>Increase the uncertainty, complexity and diversity
of the network system.</p>
      <p>
        Increase reliable relationships between objects in
the social network
[6]
[7]
[8]
[9]
[
        <xref ref-type="bibr" rid="ref18 ref4 ref7">10</xref>
        ]
[11]
[12]
[13]
[14]
[15]
      </p>
      <p>Available: http://ieeexplore.ieee.org/document/
7528258/ (visited on 10/14/2023).
[16]
1109/ACCESS.2022.3213699. [Online]. Available:
https://ieeexplore.ieee.org/document/9917502/
(visited on 10/13/2023).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <surname>R. K. Chahal</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          <string-name>
            <surname>Kumar</surname>
            , and
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Batra</surname>
          </string-name>
          , “
          <article-title>Trust management in social internet of things: A taxonomy, open issues, and challenges</article-title>
          ,”
          <source>Computer Communications</source>
          , vol.
          <volume>150</volume>
          , pp.
          <fpage>13</fpage>
          -
          <lpage>46</lpage>
          , Jan.
          <year>2020</year>
          , issn: 01403664. doi:
          <volume>10</volume>
          . 1016 / j . comcom .
          <year>2019</year>
          .
          <volume>10</volume>
          . 034.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          com/retrieve/pii/S0140366419310953 (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>H.</given-names>
            <surname>Tyagi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Pandey</surname>
          </string-name>
          , “
          <article-title>A detailed study on trust management techniques for security and privacy in IoT: Challenges, trends</article-title>
          , and research directions,”
          <string-name>
            <surname>High-Confidence</surname>
            <given-names>Computing</given-names>
          </string-name>
          , vol.
          <volume>3</volume>
          , no.
          <issue>2</issue>
          , p.
          <fpage>100</fpage>
          <lpage>127</lpage>
          , Jun.
          <year>2023</year>
          , issn:
          <fpage>26672952</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <source>doi: 10</source>
          .1016/j.hcc.
          <year>2023</year>
          .
          <volume>100127</volume>
          . [Online]. Available: https://linkinghub.elsevier.com/retrieve/pii/ S2667295223000259 (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Mercado-Velazquez</surname>
          </string-name>
          ,
          <string-name>
            <surname>P. J. EscamillaAmbrosio</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Ortiz-Rodriguez</surname>
          </string-name>
          ,
          <article-title>“A moving target defense strategy for internet of things cybersecurity</article-title>
          ,
          <source>” IEEE Access</source>
          , vol.
          <volume>9</volume>
          , pp.
          <volume>118</volume>
          <fpage>406</fpage>
          -
          <lpage>118</lpage>
          418,
          <year>2021</year>
          , issn:
          <fpage>2169</fpage>
          -
          <lpage>3536</lpage>
          . doi:
          <volume>10</volume>
          . 1109 / ACCESS .
          <year>2021</year>
          .
          <volume>3107403</volume>
          . [Online]. Available: https://ieeexplore.ieee.org/document/9521488/ (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ruan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , L. Alfantoukh,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Durresi</surname>
          </string-name>
          , “
          <article-title>Measurement theory-based trust management framework for online social communities</article-title>
          ,
          <source>” ACM Transactions on Internet Technology</source>
          , vol.
          <volume>17</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          , May 31,
          <year>2017</year>
          , issn:
          <fpage>1533</fpage>
          -
          <lpage>5399</lpage>
          ,
          <fpage>1557</fpage>
          -
          <lpage>6051</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <source>doi: 10</source>
          .1145/3015771. [Online]. Available: https: / / dl . acm . org / doi / 10 . 1145 / 3015771 (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>Z.</given-names>
            <surname>Yan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>A. V.</given-names>
            <surname>Vasilakos</surname>
          </string-name>
          , “
          <article-title>A survey on trust management for internet of things</article-title>
          ,
          <source>” Journal of Network and Computer Applications</source>
          , vol.
          <volume>42</volume>
          , pp.
          <fpage>120</fpage>
          -
          <lpage>134</lpage>
          , Jun.
          <year>2014</year>
          , issn: 10848045. doi: 10 .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          1016 / j . jnca .
          <year>2014</year>
          .
          <volume>01</volume>
          . 014. [Online]. Available: https : / / linkinghub . elsevier. com / retrieve / pii / S1084804514000575 (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <surname>Halasz</surname>
          </string-name>
          , “
          <article-title>Trust management in social internet of things across domains</article-title>
          ,
          <source>” Internet of Things</source>
          , vol.
          <volume>23</volume>
          , p.
          <fpage>100</fpage>
          <lpage>833</lpage>
          , Oct.
          <year>2023</year>
          , issn: 25426605. doi: 10 .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          1016 / j . iot .
          <year>2023</year>
          .
          <volume>100833</volume>
          . [Online]. Available: https : / / linkinghub . elsevier. com / retrieve / pii / S2542660523001567 (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>R.</given-names>
            <surname>Kumar</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Sharma</surname>
          </string-name>
          , “
          <article-title>Leveraging blockchain for ensuring trust in IoT: A survey</article-title>
          ,
          <source>” Journal of King</source>
          Saud University - Computer and Information Sciences, vol.
          <volume>34</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>8599</fpage>
          -
          <lpage>8622</lpage>
          , Nov.
          <year>2022</year>
          , issn: 13191578. doi:
          <volume>10</volume>
          .1016/j.jksuci.
          <year>2021</year>
          .
          <volume>09</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          com/retrieve/pii/S131915782100255X (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>D.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Chang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Jin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Ren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          , and
          <string-name>
            <given-names>F.</given-names>
            <surname>Li</surname>
          </string-name>
          , “
          <article-title>A novel secure architecture for the internet of things</article-title>
          ,” in
          <source>2011 Fifth International Conference on Genetic and Evolutionary Computing</source>
          , Kitakyushu, Japan: IEEE, Aug.
          <year>2011</year>
          , pp.
          <fpage>311</fpage>
          -
          <lpage>314</lpage>
          , isbn:
          <fpage>978</fpage>
          - 1-
          <fpage>4577</fpage>
          -0817-6. doi:
          <volume>10</volume>
          . 1109 / ICGEC .
          <year>2011</year>
          .
          <volume>77</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [Online]. Available: http://ieeexplore.ieee.org/ document/6042788/ (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>I.</given-names>
            <surname>Kounelis</surname>
          </string-name>
          , G. Baldini,
          <string-name>
            <given-names>R.</given-names>
            <surname>Neisse</surname>
          </string-name>
          , G. Steri,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tallacchini</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Guimaraes</surname>
          </string-name>
          <string-name>
            <surname>Pereira</surname>
          </string-name>
          , “
          <article-title>Building trust in the human?internet of things relationship</article-title>
          ,
          <source>” IEEE Technology and Society Magazine</source>
          , vol.
          <volume>33</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>73</fpage>
          -
          <lpage>80</lpage>
          ,
          <year>2014</year>
          , issn:
          <fpage>0278</fpage>
          -
          <lpage>0097</lpage>
          . doi:
          <volume>10</volume>
          . 1109 / MTS .
          <year>2014</year>
          .
          <volume>2364020</volume>
          . [Online]. Available: https : //ieeexplore.ieee.org/document/6969184 (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <surname>S.-C. Arseni</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Mitoi</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Vulpe</surname>
          </string-name>
          , “
          <article-title>Pass-IoT: A platform for studying security, privacy and</article-title>
          trust in IoT,” in
          <source>2016 International Conference on Communications (COMM)</source>
          , Bucharest, Romania: IEEE, Jun.
          <year>2016</year>
          , pp.
          <fpage>261</fpage>
          -
          <lpage>266</lpage>
          , isbn:
          <fpage>978</fpage>
          -1-
          <fpage>4673</fpage>
          -8197-0.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <source>doi: 10</source>
          . 1109 / ICComm .
          <year>2016</year>
          .
          <volume>7528258</volume>
          . [Online].
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Fernandez-Gago</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Moyano</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Lopez</surname>
          </string-name>
          , “
          <article-title>Modelling trust dynamics in the internet of things,”</article-title>
          <source>Information Sciences</source>
          , vol.
          <volume>396</volume>
          , pp.
          <fpage>72</fpage>
          -
          <lpage>82</lpage>
          , Aug.
          <year>2017</year>
          , issn: 00200255. doi:
          <volume>10</volume>
          .1016/j.ins.
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          02 .
          <fpage>039</fpage>
          . [Online]. Available: https: / /linkinghub.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          elsevier.com/retrieve/pii/S0020025517305364 (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          <string-name>
            <surname>M. S. Haghighi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Ebrahimi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Garg</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Jolfaei</surname>
          </string-name>
          , “
          <article-title>Intelligent trust-based public-key management for IoT by linking edge devices in a fog architecture</article-title>
          ,
          <source>” IEEE Internet of Things Journal</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>16</issue>
          , pp.
          <volume>12</volume>
          <fpage>716</fpage>
          -
          <lpage>12</lpage>
          723, Aug.
          <volume>15</volume>
          ,
          <year>2021</year>
          , issn:
          <fpage>2327</fpage>
          -
          <lpage>4662</lpage>
          ,
          <fpage>2372</fpage>
          -
          <lpage>2541</lpage>
          . doi:
          <volume>10</volume>
          .1109/JIOT.
          <year>2020</year>
          .
          <volume>3027536</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [Online]. Available: https://ieeexplore.ieee.org/ document/9209045/ (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Ebrahimi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. H.</given-names>
            <surname>Tadayon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. S.</given-names>
            <surname>Haghighi</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Jolfaei</surname>
          </string-name>
          , “
          <article-title>A quantitative comparative study of data-oriented trust management schemes in internet of things,”</article-title>
          <source>ACM Transactions on Management Information Systems</source>
          , vol.
          <volume>13</volume>
          , no.
          <issue>3</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>30</lpage>
          , Sep.
          <volume>30</volume>
          ,
          <year>2022</year>
          , issn:
          <fpage>2158</fpage>
          -
          <lpage>656X</lpage>
          ,
          <fpage>2158</fpage>
          -
          <lpage>6578</lpage>
          . doi:
          <volume>10</volume>
          . 1145 / 3476248. [Online]. Available: https : / / dl . acm . org / doi / 10 . 1145 / 3476248 (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          <string-name>
            <given-names>W.</given-names>
            <surname>Alnumay</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Chatterjee</surname>
          </string-name>
          , “
          <article-title>A trust-based predictive model for mobile ad hoc network in internet of things,” Sensors</article-title>
          , vol.
          <volume>19</volume>
          , no.
          <issue>6</issue>
          , p.
          <fpage>1467</fpage>
          ,
          <string-name>
            <surname>Mar</surname>
          </string-name>
          .
          <volume>26</volume>
          ,
          <year>2019</year>
          , issn:
          <fpage>1424</fpage>
          -
          <lpage>8220</lpage>
          . doi:
          <volume>10</volume>
          . 3390 / s19061467. [Online]. Available: https : //www.mdpi.com/1424- 8220/19/6/1467 (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Sagar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mahmood</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q. Z.</given-names>
            <surname>Sheng</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Siddiqui</surname>
          </string-name>
          , “SCaRT-SIoT:
          <article-title>Towards a scalable and robust trust platform for social internet of things: Demo abstract</article-title>
          ,”
          <source>in Proceedings of the 18th Conference on Embedded Networked Sensor Systems, Virtual Event Japan: ACM, Nov. 16</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>635</fpage>
          -
          <lpage>636</lpage>
          , isbn:
          <fpage>978</fpage>
          -1-
          <fpage>4503</fpage>
          -7590-0. doi:
          <volume>10</volume>
          . 1145 / 3384419 .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>3430434. [Online]. Available: https : / / dl . acm .</mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          org / doi / 10 . 1145 / 3384419 . 3430434 (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>J.</given-names>
            <surname>An</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Gui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , J. Jiang, and
          <string-name>
            <given-names>J</given-names>
            .
            <surname>Yang</surname>
          </string-name>
          , “
          <article-title>Research on social relations cognitive model of mobile nodes in internet of things</article-title>
          ,
          <source>” Journal of Network and Computer Applications</source>
          , vol.
          <volume>36</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>799</fpage>
          -
          <lpage>810</lpage>
          , Mar.
          <year>2013</year>
          , issn: 10848045. doi: 10.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          1016 / j . jnca .
          <year>2012</year>
          .
          <volume>12</volume>
          . 004. [Online]. Available: https : / / linkinghub . elsevier. com / retrieve / pii / [24]
          <string-name>
            <surname>S1084804512002512</surname>
          </string-name>
          (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A. Meena</given-names>
            <surname>Kowshalya</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Valarmathi</surname>
          </string-name>
          , “
          <article-title>Trust management for reliable decision making among R. M.S</article-title>
          .,
          <string-name>
            <given-names>S.</given-names>
            <surname>Pattar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Buyya</surname>
          </string-name>
          , V. K.R.,
          <string-name>
            <given-names>S.</given-names>
            <surname>Iyengar</surname>
          </string-name>
          ,
          <article-title>and social objects in the social internet of things</article-title>
          ,” IET L. Patnaik, “
          <article-title>Social internet of things (SIoT): Foun- Networks</article-title>
          , vol.
          <volume>6</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>75</fpage>
          -
          <lpage>80</lpage>
          , Jul.
          <year>2017</year>
          , issn: dations, thrust areas,
          <source>systematic review and future</source>
          <year>2047</year>
          -
          <volume>4954</volume>
          ,
          <fpage>2047</fpage>
          -
          <lpage>4962</lpage>
          . doi:
          <volume>10</volume>
          .1049/iet-net.
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          directions,”
          <source>Computer Communications</source>
          , vol.
          <volume>139</volume>
          ,
          <fpage>0021</fpage>
          . [Online]. Available: https://onlinelibrary.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          pp.
          <fpage>32</fpage>
          -
          <lpage>57</lpage>
          , May
          <year>2019</year>
          , issn: 01403664. doi: 10 . wiley.com/doi/10.1049/iet-net.
          <year>2017</year>
          .
          <volume>0021</volume>
          (visited 1016 / j . comcom .
          <year>2019</year>
          .
          <volume>03</volume>
          . 009. [Online]. Avail- on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          able: https://linkinghub.elsevier.com/retrieve/pii/ [23]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Lin</surname>
          </string-name>
          , and X. Cheng, “MovS0140366418307655 (visited on 10/14/
          <year>2023</year>
          ).
          <article-title>ing target defense for internet of things based on the zero-determinant theory</article-title>
          ,
          <source>” IEEE Internet of Things Journal</source>
          , vol.
          <volume>7</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>661</fpage>
          -
          <lpage>668</lpage>
          , Jan.
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          2020, issn:
          <fpage>2327</fpage>
          -
          <lpage>4662</lpage>
          ,
          <fpage>2372</fpage>
          -
          <lpage>2541</lpage>
          . doi:
          <volume>10</volume>
          . 1109 / JIOT .
          <year>2019</year>
          .
          <volume>2943151</volume>
          . [Online]. Available: https : //ieeexplore.ieee.org/document/8847365/ (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          <string-name>
            <surname>Toutain</surname>
            , and
            <given-names>G. Z.</given-names>
          </string-name>
          <string-name>
            <surname>Papadopoulos</surname>
          </string-name>
          , “
          <article-title>MTD, where art thou? a systematic review of moving target defense techniques for IoT,”</article-title>
          <source>IEEE Internet of Things Journal</source>
          , vol.
          <volume>8</volume>
          , no.
          <issue>10</issue>
          , pp.
          <fpage>7818</fpage>
          -
          <lpage>7832</lpage>
          , May 15,
          <year>2021</year>
          , issn:
          <fpage>2327</fpage>
          -
          <lpage>4662</lpage>
          ,
          <fpage>2372</fpage>
          -
          <lpage>2541</lpage>
          . doi:
          <volume>10</volume>
          . 1109 / JIOT .
          <year>2020</year>
          .
          <volume>3040358</volume>
          . [Online]. Available: https : //ieeexplore.ieee.org/document/9270287/ (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Ge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.-H.</given-names>
            <surname>Cho</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Kim</surname>
          </string-name>
          , G. Dixit,
          <string-name>
            <given-names>and I.-R.</given-names>
            <surname>Chen</surname>
          </string-name>
          , “
          <article-title>Proactive defense for internet-of-things: Moving target defense with cyberdeception</article-title>
          ,
          <source>” ACM Transactions on Internet Technology</source>
          , vol.
          <volume>22</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>31</lpage>
          , Feb.
          <volume>28</volume>
          ,
          <year>2022</year>
          , issn:
          <fpage>1533</fpage>
          -
          <lpage>5399</lpage>
          ,
          <fpage>1557</fpage>
          -
          <lpage>6051</lpage>
          . doi:
          <volume>10</volume>
          . 1145 / 3467021. [Online]. Available: https : / / dl . acm . org / doi / 10 . 1145 / 3467021 (visited on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          [18] [19]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kochovski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gec</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Stankovski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bajec</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Drobintsev</surname>
          </string-name>
          , “
          <article-title>Trust management in a blockchain based fog computing platform with trustless smart oracles,” Future Generation Computer Systems</article-title>
          , vol.
          <volume>101</volume>
          , pp.
          <fpage>747</fpage>
          -
          <lpage>759</lpage>
          , Dec.
          <year>2019</year>
          , issn: 0167739X. doi:
          <volume>10</volume>
          .1016/j.future.
          <year>2019</year>
          .
          <volume>07</volume>
          .030.
        </mixed-citation>
      </ref>
      <ref id="ref39">
        <mixed-citation>
          com/retrieve/pii/S0167739X19301281 (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref40">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>H.</given-names>
            <surname>Taneja</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Kaur</surname>
          </string-name>
          , “
          <article-title>Fake feedback detection to enhance trust in cloud using supervised machine learning techniques</article-title>
          <source>,” in Proceedings of Data Analytics and Management</source>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gupta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Polkowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Khanna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Bhattacharyya</surname>
          </string-name>
          , and
          <string-name>
            <given-names>O.</given-names>
            <surname>Castillo</surname>
          </string-name>
          , Eds., vol.
          <volume>91</volume>
          ,
          <string-name>
            <surname>Series</surname>
            <given-names>Title</given-names>
          </string-name>
          <source>: Lecture Notes on Data Engineering and Communications Technologies</source>
          , Sin- [26] gapore: Springer Singapore,
          <year>2022</year>
          , pp.
          <fpage>789</fpage>
          -
          <lpage>796</lpage>
          , isbn:
          <fpage>9789811662843</fpage>
          <lpage>9789811662850</lpage>
          . doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-16-6285-0_
          <fpage>61</fpage>
          . [Online]. Available: https: //link.springer.com/10.1007/
          <fpage>978</fpage>
          - 981- 16- 6285- 0_61 (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref41">
        <mixed-citation>
          <string-name>
            <given-names>R. E.</given-names>
            <surname>Navas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Sandaker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Cuppens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Cuppens</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Toutain</surname>
          </string-name>
          , and
          <string-name>
            <given-names>G. Z.</given-names>
            <surname>Papadopoulos</surname>
          </string-name>
          , “
          <article-title>IANVS: A moving target defense framework for a resilient internet of things</article-title>
          ,” in
          <source>2020 IEEE Symposium on Computers and Communications (ISCC)</source>
          , Rennes, France: IEEE, Jul.
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , isbn:
          <fpage>978</fpage>
          -1-
          <fpage>72818</fpage>
          - [20]
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Hu</surname>
          </string-name>
          , and G. Qi, “
          <article-title>Blockchain and deep 086-1</article-title>
          . doi:
          <volume>10</volume>
          . 1109 / ISCC50000 .
          <year>2020</year>
          .
          <volume>9219728</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref42">
        <mixed-citation>
          <article-title>learning based trust management for internet of [Online]</article-title>
          . Available: https://ieeexplore.ieee.org/ vehicles,”
          <source>Simulation Modelling Practice and The- document/9219728/ (visited on 10/14/</source>
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref43">
        <mixed-citation>
          <string-name>
            <surname>ory</surname>
          </string-name>
          , vol.
          <volume>120</volume>
          , p.
          <fpage>102</fpage>
          <lpage>627</lpage>
          , Nov.
          <year>2022</year>
          , issn: 1569190X. [27]
          <string-name>
            <surname>J.-H. Cho</surname>
            ,
            <given-names>D. P.</given-names>
          </string-name>
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          <string-name>
            <surname>Alavizadeh</surname>
          </string-name>
          , et al.,
          <source>doi: 10</source>
          .1016/j.simpat.
          <year>2022</year>
          .
          <volume>102627</volume>
          . [Online]. Avail- “
          <article-title>Toward proactive, adaptive defense: A survey able</article-title>
          : https://linkinghub.elsevier.com/retrieve/pii/ on moving target defense,
          <source>” IEEE Communications S1569190X22001034 (visited on 10/14/</source>
          <year>2023</year>
          ).
          <source>Surveys &amp; Tutorials</source>
          , vol.
          <volume>22</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>709</fpage>
          -
          <lpage>745</lpage>
          , [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Alam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Zardari</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Noor</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ahmed</surname>
          </string-name>
          , and
          <string-name>
            <surname>H.</surname>
          </string-name>
          <year>2020</year>
          , issn:
          <fpage>1553</fpage>
          -
          <lpage>877X</lpage>
          ,
          <fpage>2373</fpage>
          -
          <lpage>745X</lpage>
          . doi:
          <volume>10</volume>
          .1109/ Mouratidis, “
          <article-title>Trust management in social internet COMST</article-title>
          .
          <year>2019</year>
          .
          <volume>2963791</volume>
          . [Online]. Available:
          <article-title>https: of things (SIoT): A survey,” IEEE Access</article-title>
          , vol.
          <volume>10</volume>
          , //ieeexplore.ieee.org/document/8949517/ (visited pp.
          <volume>108</volume>
          <fpage>924</fpage>
          -
          <lpage>108</lpage>
          954,
          <year>2022</year>
          , issn:
          <fpage>2169</fpage>
          -
          <lpage>3536</lpage>
          . doi: 10. on 10/13/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref44">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Zeitz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cantrell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Marchany</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Tront</surname>
          </string-name>
          , “
          <article-title>Changing the game: A micro moving target IPv6 defense for the internet of things,” IEEE Wireless Communications Letters</article-title>
          , vol.
          <volume>7</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>578</fpage>
          -
          <lpage>581</lpage>
          , Aug.
          <year>2018</year>
          , issn:
          <fpage>2162</fpage>
          -
          <lpage>2337</lpage>
          ,
          <fpage>2162</fpage>
          -
          <lpage>2345</lpage>
          . doi:
          <volume>10</volume>
          .1109/LWC.
          <year>2018</year>
          .
          <volume>2797916</volume>
          . [Online]. Available: https://ieeexplore.ieee.org/document/8269320/ (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref45">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Almohaimeed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gampa</surname>
          </string-name>
          , and G. Singh, “
          <article-title>Privacy-preserving IoT devices,” in 2019 IEEE Long Island Systems</article-title>
          , Applications and Technology Conference (LISAT), Farmingdale,
          <string-name>
            <surname>NY</surname>
          </string-name>
          , USA: IEEE, May
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          , isbn:
          <fpage>978</fpage>
          -1-
          <fpage>72812</fpage>
          -100-0. doi:
          <volume>10</volume>
          .1109/LISAT.
          <year>2019</year>
          .
          <volume>8817349</volume>
          . [Online]. Available: https://ieeexplore.ieee.org/document/8817349/ (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref46">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Kahla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Azab</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Mansour</surname>
          </string-name>
          , “Secure, resilient, and
          <article-title>self-configuring fog architecture for untrustworthy IoT environments</article-title>
          ,” in
          <source>2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science</source>
          And Engineering (TrustCom/BigDataSE), New York, NY, USA: IEEE, Aug.
          <year>2018</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>54</lpage>
          , isbn:
          <fpage>978</fpage>
          -1-
          <fpage>5386</fpage>
          -4388-4. doi:
          <volume>10</volume>
          .1109/TrustCom/ BigDataSE.
          <year>2018</year>
          .
          <volume>00018</volume>
          . [Online]. Available: https: //ieeexplore.ieee.org/document/8455886/ (visited on 10/14/
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>