Trust Evaluation Techniques for 6G Networks: A Comprehensive Survey with Fuzzy Algorithm Approach
Abstract
:1. Introduction
- Comprehensive analysis of trust concepts;
- Systematic examination of trust assessment algorithms;
- Evaluation of fuzzy logic approaches.
2. Trust Concepts
2.1. Trust Management Model
2.2. Level of Trust Assessment
Objectives
3. Methodology
4. Trust Assessment Using Various Approaches
4.1. Statistical Methods: Weighted Sum
4.2. Machine Learning Methods
4.3. Reasoning Methods
4.4. Decentralized: Blockchain
4.5. Comparative Analysis of Trust Assessment Methods
5. Fuzzy Logic Approaches in Trust Management
- Fuzzification: This initial step involves defining input and output variables, such as reliability and behavior, with linguistic terms (e.g., high, medium, low). This linguistic approach captures the inherent vagueness and imprecision in trust-related data.
- Rule Base Construction: Building a rule base entails formulating linguistic rules that connect input variables to output, expressing relationships between trust factors (e.g., if reliability is high and behavior is consistent, then trust is high).
- Fuzzy Inference: By applying these rules and fuzzy logic operators (e.g., AND, OR), the system computes a degree of trust based on inputs, considering their linguistic terms and associated rules. This process enables nuanced and flexible evaluations.
- Defuzzification: Converting the fuzzy output into a crisp value (e.g., low, medium, high trust) facilitates practical use or decision making, ensuring that the final trust level is comprehensible and actionable.
- Advantages of Fuzzy Logic: Fuzzy logic methodology offers several advantages for assessing trust in 6G networks. It enables trust evaluation based on experience, plausibility, and location accuracy, crucial components in trust assessment. Moreover, fuzzy logic systems have found extensive applications in various fields like web services, cloud computing, and social networks, showcasing their adaptability and utility. Additionally, fuzzy logic facilitates the development of classification criteria for assessing trust, resulting in a structured approach to trust evaluation and enhanced detection capabilities.
- Disadvantages of Fuzzy Logic: Despite its utility in other network applications, employing fuzzy logic for trust assessment in 6G networks presents certain drawbacks. Challenges arise in precisely characterizing and interpreting language variables and fuzzy rules, potentially leading to uncertainty and imprecision in trust assessment. Furthermore, fuzzy logic may introduce computing overhead and complexity, impacting the real-time decision-making capabilities crucial for 6G networks. Careful consideration is necessary to address these challenges and ensure reliable and robust trust management in 6G networks, particularly when incorporating fuzzy algorithms into IoT trust management techniques.
5.1. Exploring the Application of Fuzzy Logic Algorithms in Trust Assessment across Diverse Network Environments
5.1.1. IoT
5.1.2. Cloud Network
5.1.3. Ad Hoc Networks
5.1.4. Wireless Sensor Networks
5.1.5. Mobile Network
5.2. Effective Metrics and Comparative Analysis of Methods Based on These Metrics
5.2.1. Comparative Analysis Based on Metrics
- Scalability: The CET-AoTM model exhibited scalability in trust evaluation by leveraging a cloud-edge-terminal collaborative architecture. This architecture allows for the distribution of trust evaluation tasks among different layers, enabling the system to scale efficiently as the number of smart terminals and interactions increases.
- Integrity: The trust evaluation algorithm in the CET-AoTM model focuses on maintaining the integrity of trust values by considering factors such as historical interactions, cumulative experience attributes, and fuzzy-logic-based trust attributes. This approach helps to ensure the reliability and integrity of trust evaluations for smart terminals in AIoT networks.
- Availability: The demand-driven cloud–edge–terminal collaboration mechanism in the CET-AoTM model enhances availability by adapting a trust evaluation based on specific computing service requirements. This mechanism ensures that trust evaluations are available when required for different types of tasks, balancing availability with the demands of AIoT services.
- Dynamicity: The CET-AoTM model acknowledges the dynamic nature of AIoT environments by utilizing a fuzzy attribute trust algorithm to address uncertainty and adapt to changing conditions. This dynamic approach allows the trust evaluation system to adjust to the evolving trust requirements and environmental dynamics in AIoT networks.
- Context Awareness: The demand-driven collaboration mechanism in the CET-AoTM model demonstrates context awareness in trust evaluation by considering the specific requirements of computing tasks in the AIoT. By adapting trust evaluation based on task demands, the model exhibits awareness of the context in which trust assessments are made, enhancing the relevance and effectiveness of trust evaluations.
- Scalability: Although the scalability of the proposed method is not explicitly discussed in the provided excerpts, the use of a fuzzy comprehensive evaluation method suggests a systematic approach that could potentially be scalable to larger networks or systems.
- Integrity: By considering credit and reputation in trust quantification, this approach appears to address the integrity of trust assessments by incorporating past interactions and evaluations.
- Dynamicity: The authors discuss the dynamism of trust, credit, and reputation, indicating that the proposed method accounts for changes in trust relationships over time, aligning with the dynamic nature of trust management.
- Scalability: The FDTM-IoT model demonstrates scalability by applying it to various network sizes, from small- to large-scale IoT environments. The dynamic and hierarchical structure of the model allows for the addition or removal of dimensions and sub-dimensions, making it adaptable to different network scales.
- Integrity: The trust calculations and fuzzy logic used in the FDTM-IoT model contribute to maintaining data integrity within the IoT network. By considering multiple dimensions, such as quality of service and contextual information, the model ensures that trust evaluations are comprehensive and reliable, enhancing overall data integrity.
- Availability: The FDTM-IoT model is integrated into the RPL routing protocol as FDTM-RPL aims to improve network availability by enhancing security mechanisms and performance. The model’s resistance to attacks such as BLACK-HOLE, SYBIL, and RANK attacks contributes to maintaining network availability under challenging conditions.
- Privacy: While this article primarily focuses on trust-based routing security, the FDTM-IoT model’s consideration of contextual information and the quality of peer-to-peer communication can indirectly contribute to privacy protection within IoT networks.
- Dynamicity: The FDTM-IoT model is designed to be dynamic, allowing for real-time monitoring of the behavior of IoT and continuous trust evaluation. The adaptability of the model to changing environmental conditions and behaviors enhances its dynamicity, making it suitable for dynamic IoT environments.
- Context Awareness: The FDTM-IoT model incorporates contextual information as a key dimension of trust evaluation. By considering contextual factors such as the mobility of things, security capabilities, and device intelligence capacity, the model demonstrates context awareness in assessing trustworthiness among IoT entities.
- Scalability: While this article primarily focuses on trust evaluation within this specific context, it provides a foundation for scalability by addressing the trustworthiness of interconnected IoMT devices. However, the scalability of the mechanism to larger IoMT networks or different deployment scenarios requires further investigation.
- Integrity: The trust evaluation process in the FTM-IoMT includes assessing the integrity of nodes as one of the trust attributes. By considering integrity as a key factor in trust assessment, the mechanism aims to ensure the integrity of communication and interaction within the IoMT network.
- Availability: By evaluating trust attributes and identifying compromised or Sybil nodes, the mechanism contributes to maintaining the availability of trustworthy services in the IoMT environment.
- Dynamicity: The fuzzy-based trust management mechanism in the FTM-IoMT utilizes fuzzy logic processing to dynamically assess the trustworthiness of nodes based on attributes such as receptivity and compatibility. This dynamic evaluation contributes to adapting to changes in the IoMT network and addressing potential threats.
- Scalability: The use of fuzzy logic and the Harmony Search Algorithm (HHO) in the routing protocol allows for scalable trust evaluation by considering multiple factors such as energy, distance, delay, overhead, QoS, and trust. This approach enables the system to handle a large number of nodes and effectively adapt to changing network conditions.
- Integrity: By incorporating trust as one of the evaluation criteria in the routing protocol, the article ensures that data integrity is maintained during the routing process. Trust evaluation helps identify trustworthy nodes for data transmission, thereby enhancing the overall integrity of the network.
- Availability: The trust evaluation mechanism based on fuzzy logic and the HHO algorithm ensures the availability of reliable routes for data transmission in IoT networks. By selecting optimal routes that consider trust levels, the system enhances the availability of communication paths within the network.
- Dynamicity: The use of fuzzy logic and optimization algorithms allows for a dynamic trust evaluation in response to changing network conditions and node behaviors. The system can adapt to dynamic environments and adjust the trust levels based on real-time data and feedback.
- Context Awareness: The trust evaluation process considers various contextual factors, such as energy consumption, distance, delay, QoS requirements, and the trustworthiness of nodes. By incorporating these contextual parameters into the evaluation criteria, the system demonstrates the level of context awareness in trust evaluation.
- Scalability: This study proposes a secure trust-based multipath routing system that can potentially scale large MANETs by incorporating optimal fuzzy logic for route selection. However, specific scalability aspects, such as the ability to handle a large number of nodes or network size, are not explicitly discussed in the provided excerpts.
- Integrity: The use of secure trust mechanisms and fuzzy logic for route selection indicates a focus on maintaining the data integrity within the network. By evaluating trust values based on various criteria, the system aims to ensure the integrity of the data transmission and routing decisions.
- Dynamicity: The dynamic nature of MANETs, characterized by node mobility and changing network conditions, was considered in this study. The use of fuzzy logic for trust evaluation and multipath routing suggests an adaptive approach to handling dynamic network environments.
- Scalability: The detection accuracy of the model increases with network size, indicating that the scheme can effectively handle larger FANETs while maintaining trust and security.
- Integrity: The TBCS model focuses on evaluating the trustworthiness of nodes based on their behavior, which contributes to maintaining the integrity of the network. By segregating malicious nodes and selecting secure Cluster Heads, the model enhances the overall integrity of communication in FANETs.
- Privacy: This article emphasizes the importance of trust in segregating noncooperative and malicious nodes, which indirectly contributes to enhancing privacy in communication within FANETs. By identifying and isolating malicious nodes, the TBCS model helps to protect the privacy of legitimate network participants.
- Dynamicity: The scheme’s performance is highlighted as better than that of existing models when dealing with high-speed nodes and an increasing number of malicious nodes, demonstrating its adaptability to dynamic network conditions.
- Scalability: This article discusses the scalability of the FUBA model by having each drone evaluate the trustworthiness of adjacent drones and relay this information to a ground control station. This approach efficiently restricts the dissemination of trust data and evenly distributes the computational load, thereby enabling the deployment of scalable FUBA.
- Integrity: The FUBA model aims to differentiate between legitimate and malicious drone actions, enhancing the integrity of the network by effectively evaluating and understanding node behaviors in FANETs.
- Dynamicity: The FUBA model leverages fuzzy logic to handle uncertain and dynamic data related to UAV behavior in FANETs. This approach allows for adaptability and responsiveness to evolving tactics used by malicious drones, indicating a level of dynamicity in the trust evaluation process.
- Context awareness: The FUBA model incorporates contextual information, such as weather conditions, signal strength, and historical data, to make more accurate decisions about the legitimacy of a drone’s presence. This demonstrates the level of context awareness in the trust evaluation process, enabling the model to adapt to diverse operating environments and scenarios.
- Scalability: The scheme incorporates a lazy update and dynamic storage structures to support the mobility of on-board units (OBUs), which can enhance scalability by reducing the computational overhead for road-side units (RSUs).
- Integrity: By utilizing fuzzy theory and behavioral big data for trust evaluation, the scheme aims to ensure the integrity of the trustworthiness assessment in VANETs, enhancing the reliability of communication and message authenticity.
- Availability: The mutual authentication process and incentive mechanisms in the scheme contribute to ensuring the availability of trust evaluation services in VANETs and promoting continuous and reliable communication among participants.
- Privacy: The scheme provides mutual authentication with conditional anonymity between the RSU and OBU, protecting the privacy of participants while maintaining traceability in the case of disputes, thus addressing privacy concerns in trust evaluation.
- Dynamicity: The scheme considers the mobility of vehicles in VANETs and incorporates mechanisms such as lazy updates and dynamic storage structures to adapt to the dynamic nature of the network, enhancing the system’s ability to handle changes and updates efficiently.
- Scalability: TrustBlock’s use of a double-layer blockchain architecture and adaptive historical trust weight demonstrates considerations for scalability by providing a framework for managing trust values at the network scale.
- Integrity: The use of blockchain technology in TrustBlock ensures the integrity of the trust data, providing tamper-proof and irrefutable storage of trust values, which contributes to maintaining the integrity of the trust evaluation process.
- Availability: TrustBlock’s approach to trust evaluation, utilizing blockchain for secure and effective trust value storage and sharing, contributes to ensuring the availability of trust-related information in SDN.
- Privacy: While this article primarily focuses on trust evaluation and security aspects, the use of blockchain technology in TrustBlock can potentially contribute to privacy preservation through secure and authenticated data storage and sharing.
- Dynamicity: TrustBlock’s adaptive historical trust weight and comprehensive evaluation model reflect considerations for dynamic trust assessment, allowing for the adjustment of trust values over time based on node behavior and interactions.
- Context Awareness: The trust evaluation model in TrustBlock considers the context of node interactions and behaviors, incorporating direct, indirect, and historical trust perspectives to provide a comprehensive assessment of node trustworthiness within the context of SDN networks.
- Scalability: Although the scalability aspect is not explicitly mentioned in the provided excerpts, the use of fuzzy trust calculations and the consideration of online and offline information suggest a scalable approach to managing trust and privacy in a network with a large number of users.
- Integrity: The Trust2Privacy mechanism focuses on preserving the integrity of users’ information by allowing them to set privacy levels and encrypt sensitive data according to their preferences. This approach ensures that users have control over the integrity of their personal information even after it is shared on social platforms.
- Availability: Using cryptographic tools to protect different levels of sensitive information, the mechanism aims to balance privacy preservation with the availability of information for users.
- Privacy: Privacy preservation is a central aspect of the Trust2Privacy mechanism. By establishing a relationship between trust and privacy based on users’ privacy policies and using cryptographic tools for information protection, the mechanism aims to provide users with control over their privacy settings and to ensure the confidentiality of their data.
- Dynamicity: By updating trust values based on interactions and considering changes in user relationships over time, the Trust2Privacy mechanism demonstrates a level of dynamicity in managing trust and privacy in a mobile social context.
- Scalability: The TACIoT system is designed to be implemented on both constrained and nonconstrained IoT devices. The Trust Manager component can be deployed on devices with varying hardware capabilities, indicating the level of scalability of the system.
- Integrity: By incorporating pieces of evidence and security-related mechanisms into trust calculations, the system enhances the integrity of access control decisions and the interactions between IoT devices.
- Availability: The implementation and testing of TACIoT on real devices in a testbed environment demonstrates the feasibility of the system for practical use.
- Dynamicity: The flexibility and adaptability of the access control mechanism in TACIoT, along with the customization options for fuzzy rules and weights, suggest a level of dynamicity in the system. IoT devices can dynamically adjust their access control decisions based on changes in trust values and environmental conditions.
- Context Awareness: The trust model in TACIoT considers multiple dimensions such as reputation, quality of service, security aspects, and social relationships. By considering these contextual factors, the system demonstrates the degree of context awareness when evaluating the trust values for IoT devices.
- Integrity: The methodology aims to enhance the integrity of trust management in 6G networks by employing GAN-based autoencoders for trust decision making and incorporating synergetic detection schemes. The system can detect and respond to potential threats or integrity breaches, thereby ensuring the reliability of the trust evaluations.
- Availability: By leveraging AI techniques and fuzzy logic for trust evaluation, this methodology aims to maintain the availability of network services and data delivery.
- Dynamicity: The dynamic nature of 6G wireless networks is considered using GAN-based autoencoders that can adapt to evolving trust scenarios. The ability of the methodology to learn and analyze trust information in real time enhances its capability to address dynamic changes in network behavior and trustworthiness.
- Context Awareness: The integration of fuzzy logic for trust evaluation and adversarial learning for decision making enables the methodology to be context-aware in assessing trust levels based on specific network contexts and behaviors. Context awareness enhances the accuracy and relevance of trust evaluations in diverse network environments.
- Scalability: The proposed framework was designed to be scalable, allowing it to handle large-scale 5G networks with multiple domains and tenants.
- Integrity: The framework includes a trust management module that monitors, evaluates, and updates the trust chain generated among different network entities, thereby ensuring the integrity of the network.
- Availability: This framework includes an intra-domain module that monitors the domain network for potential threats or ongoing attacks, mitigating them if needed and if possible, and ensuring the availability of the network.
- Privacy: The framework includes a trust management module that ensures the privacy of sensitive data by monitoring and evaluating the trustworthiness of network entities.
- Dynamicity: The framework is designed to address the dynamicity of 5G infrastructure threats and multitenancy security risks, providing solutions to ensure secure and trustworthy communication in multitenant environments.
- Context awareness: The framework includes an intra-domain module that uses dynamic traffic analysis to identify attacks and vulnerabilities within the 5G infrastructure, as well as in a multi-tenant/multi-domain environment, demonstrating context awareness in trust evaluation.
- Scalability: This approach allows for a scalable framework in which decision makers can customize the trust evaluation criteria based on specific application contexts, thereby enhancing the scalability of the model.
- Integrity: By incorporating probabilistic linguistic term sets and the MULTIMOORA method, the model aims to provide accurate and reliable trust assessments, thereby upholding integrity in the decision-making processes.
- Dynamicity: This model accounts for the dynamic reliability of opinions provided by recommenders and the evolving nature of trust assessments in different contexts. By incorporating dynamic trustworthiness criteria and adapting them to changing trust-related attributes, the model demonstrates the level of dynamicity in trust evaluation.
- Context awareness: By allowing the trustor to define trustworthiness criteria based on specific application scenarios, the model exhibits context awareness and tailors trust assessments according to the unique requirements of different contexts.
- Scalability: By utilizing fuzzy trust evaluation and outlier detection mechanisms, the protocol can scale effectively to accommodate a large number of sensor nodes while maintaining efficient cluster formation and secure communication.
- Integrity: By incorporating fuzzy logic, transmission overhearing, and outlier detection, the protocol enhances the integrity of the network by ensuring that trustworthy nodes are assigned leadership roles within the clusters, thereby maintaining data integrity and security.
- Availability: By balancing energy savings and security assurance in cluster head selection, the protocol optimizes resource utilization and prolongs the network’s lifetime, enhancing overall availability.
- Dynamicity: The adaptive trust thresholds, outlier detection, and fuzzy-based trust evaluation methods of the protocol enable dynamic adjustments to trust levels based on changing network conditions and node behaviors. This dynamicity allows the protocol to adapt to evolving threats and uncertainties in the network environment, thereby enhancing its responsiveness and effectiveness.
- Context Awareness: The fuzzy trust evaluation method considers multiple factors and parameters, such as past interactions, QoS metrics, and energy levels, to assess the trust levels among nodes. By incorporating contextual information into the trust evaluation process, the protocol demonstrated a level of context awareness that enhanced the accuracy and relevance of trust assessments in diverse network scenarios.
- Integrity: The scheme focuses on maintaining the integrity of trust management processes by utilizing fuzzy logic for accurate decision making and by considering both direct and indirect trust factors. This ensured that the trustworthiness of the sensor nodes was evaluated in terms of integrity and precision.
- Dynamicity: The scheme’s utilization of real-time past experience, credit-based calculations, and peer recommendations for trust evaluation reflects a dynamic approach to trust management, allowing for adaptation to changing network conditions and the dynamic behavior of sensor nodes.
- Context awareness: The hierarchical trust evaluation approach and the use of fuzzy logic in the scheme demonstrate a level of context awareness by considering the feedback from cluster heads of different clusters and the past reputation of cluster heads given by others. This context-aware approach contributes to a more informed trust assessment.
- Integrity: This method focuses on detecting dishonest recommendation attacks and ensuring the integrity of trust values exchanged between nodes. Using the FTM and ABC algorithms, the approach aims to maintain the integrity of trust evaluations and identify malicious nodes that may compromise network integrity.
- Dynamicity: This methodology accounts for the dynamic nature of sensor networks by considering factors such as node mobility, environmental changes, and node behavior variations.
- Scalability: This is defined as the ability of a cloud system to function well when changes occur in the volume or size to satisfy user needs. By incorporating scalability as a factor in trust evaluation, the models aim to ensure that cloud resources can be scaled effectively to accommodate varying workloads.
- Integrity: By evaluating factors such as security, performance, and user feedback, the models contribute to maintaining the integrity of cloud resources and access control mechanisms.
- Availability: In the context of cloud computing, users can access resources in the correct format and location. By assessing availability as a parameter, the models aim to ensure that cloud services are accessible and reliable for users.
- Dynamicity: By incorporating dynamic trust evaluation mechanisms, the models adapt to changing conditions and user interactions, thereby enhancing the responsiveness and adaptability of access control in cloud environments.
- Scalability: This model is designed to handle large-scale computing problems in multi-cloud environments, making it scalable.
- Integrity: The inclusion of a feedback evaluation component in the framework helps identify and rectify fake feedback, enhancing the integrity of trust values.
- Availability: The trust negotiation component of the framework facilitates the generation of service level agreements (SLAs) based on trust values, thereby enhancing the availability of cloud computing services.
- Dynamicity: This model incorporates fuzzy logic principles to handle the dynamic and uncertain nature of trust-related parameters and feedback data in multi-cloud environments, making it dynamic.
- Scalability: By utilizing fuzzy logic and incentive mechanisms, the model can be scaled to accommodate varying numbers of edge devices and adapt to changes in the network environment, making it suitable for scalable trust evaluation in CEEC networks.
- Integrity: By incorporating an incentive mechanism and a negative decay mechanism, the model promotes honest and cooperative behavior among edge devices, thereby contributing to the integrity of trust evaluations in the CEEC environment.
- Availability: The model encourages continuous engagement through rewards and penalties, ensuring that trust evaluations are consistently updated and available for decision making in real-time scenarios, thus improving the availability of trust data in the CEEC network.
- Dynamicity: The fuzzy-based trust evaluation model is designed to adapt to the dynamic nature of edge-computing environments. By incorporating fuzzy logic to handle uncertainty and variability in trust factors as well as the incentive negative decay mechanism to address intermittent selfish behavior, the model can effectively respond to changes in trust dynamics and promote continuous cooperation among edge devices, demonstrating dynamicity in trust evaluation.
- Context awareness: By incorporating context-specific trust factors and incentives tailored to the CEEC network model, the model demonstrates awareness of the unique characteristics and requirements of trust evaluation in edge computing contexts, thereby enhancing context awareness in trust assessment.
- Scalability: By utilizing algorithms that consider user preferences and criteria, the framework can be scaled to handle diverse user requirements and fog service offerings.
- Integrity: By ensuring confidentiality and authentication in fog services, the framework contributes to maintaining the integrity of the data and transactions within the fog computing environment.
- Availability: The framework aims to provide reliable and available fog services to users by monitoring factors such as the transmission rate, response time, and usability.
- Dynamicity: This framework can dynamically match users with trustworthy fog services by adapting to changing user requirements and fog service conditions.
- Context awareness: By tailoring fog service selection based on user-specific criteria and priorities, the framework provides an understanding of the context in which fog services are utilized.
5.2.2. Simulation Environment
6. Open Issues
7. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Ahmad, I.; Yau, K.-L.A.; Ling, M.H.; Keoh, S.L. Trust and reputation management for securing collaboration in 5g access networks: The road ahead. IEEE Access 2020, 8, 62542–62560. [Google Scholar] [CrossRef]
- Wang, Y.; Kang, X.; Li, T.; Wang, H.; Chu, C.-K.; Lei, Z.; Cheng, C. SIX-Trust for 6G: Towards a Secure and Trustworthy Future Network. IEEE Access 2023, 11, 107657–107668. [Google Scholar] [CrossRef]
- Li, H.; Zhu, J.; Qiu, H.; Wang, Q.; Zhou, T.; Li, H. The new threat to internet: DNP attack with the attacking flows strategizing technology. Int. J. Commun. Syst. 2015, 28, 1126–1139. [Google Scholar] [CrossRef]
- Kang, D.W.; Oh, J.H.; Im, C.T.; Yi, W.S.; Won, Y.J. A practical attack on mobile data network using IP spoofing. Appl. Math. Inf. Sci. 2013, 7, 2345–2353. [Google Scholar] [CrossRef]
- Li, W.; Meng, W. BCTrustFrame: Enhancing trust management via blockchain and IPFS in 6G era. IEEE Netw. 2022, 36, 120–125. [Google Scholar] [CrossRef]
- Ylianttila, M.; Kantola, R.; Gurtov, A.; Mucchi, L.; Oppermann, I.; Yan, Z.; Nguyen, T.H.; Liu, F.; Hewa, T.; Liyanage, M.; et al. 6G white paper: Research challenges for trust, security and privacy. arXiv 2020, arXiv:2004.11665. [Google Scholar]
- Putra, G.D.; Dedeoglu, V.; Kanhere, S.S.; Jurdak, R. Toward blockchain-based trust and reputation management for trust-worthy 6G networks. IEEE Netw. 2022, 36, 112–119. [Google Scholar] [CrossRef]
- Huawei 6G Research Team; Liu, F.; Sun, R.; Wang, D.; Javali, C.; Liu, P. 6G Native Trustworthiness. 2022. Available online: https://www.huawei.com/en/huaweitech/future-technologies/6g-native-trustworthiness (accessed on 24 July 2024).
- Shafi, M.; Jha, R.K.; Jain, S. Intelligent Trust Ranking Security Preserving Model for B5G/6G. IEEE Trans. Netw. Serv. Manag. 2023, 20, 3549–3561. [Google Scholar] [CrossRef]
- Ayoub, O.; Troia, S.; Andreoletti, D.; Bianco, A.; Tornatore, M.; Giordano, S.; Rottondi, C. Towards explainable artificial intelligence in optical networks: The use case of lightpath QoT estimation. J. Opt. Commun. Netw. 2022, 15, A26–A38. [Google Scholar] [CrossRef]
- Veith, B.; Krummacker, D.; Schotten, H.D. The road to trustworthy 6G: A survey on trust anchor technologies. IEEE Open J. Commun. Soc. 2023, 4, 581–595. [Google Scholar] [CrossRef]
- Hakeem, S.A.A.; Hussein, H.H.; Kim, H. Security requirements and challenges of 6G technologies and applications. Sensors 2022, 22, 1969. [Google Scholar] [CrossRef] [PubMed]
- Sharma, V. Functional Security and Trust in Ultra-Connected 6G Ecosystem. EAI Endorsed Trans. Ind. Netw. Intell. Syst. 2022, 9, e5. [Google Scholar] [CrossRef]
- Wang, J.; Ling, X.; Le, Y.; Huang, Y.; You, X. Blockchain-enabled wireless communications: A new paradigm towards 6G. Natl. Sci. Rev. 2021, 8, nwab069. [Google Scholar] [CrossRef] [PubMed]
- Chen, X.; Feng, W.; Ge, N.; Zhang, Y. Zero trust architecture for 6G security. IEEE Netw. 2023, 38, 224–232. [Google Scholar] [CrossRef]
- Yan, Z.; Yang, L.T.; Li, T.; Miche, Y.; Yu, S.; Yau, S.S. Guest Editorial: Trust, Security and Privacy of 6G. IEEE Netw. 2022, 36, 100–102. [Google Scholar] [CrossRef]
- Letaief, K.B.; Chen, W.; Shi, Y.; Zhang, J.; Zhang, Y.-J.A. The roadmap to 6G: AI empowered wireless networks. IEEE Commun. Mag. 2019, 57, 84–90. [Google Scholar] [CrossRef]
- Porambage, P.; Gür, G.; Osorio, D.P.M.; Liyanage, M.; Gurtov, A.; Ylianttila, M. The roadmap to 6G security and privacy. IEEE Open J. Commun. Soc. 2021, 2, 1094–1122. [Google Scholar] [CrossRef]
- Shala, B.; Trick, U.; Lehmann, A.; Ghita, B.; Shiaeles, S. Blockchain and trust for secure, end-user-based and decentralized IoT service provision. IEEE Access 2020, 8, 119961–119979. [Google Scholar] [CrossRef]
- Mitra, P.; Bhattacharjee, R.; Chatterjee, T.; De, S.; Karmakar, R.; Ghosh, A.; Adhikari, T. Towards 6G communications: Architecture, 926 challenges, and future directions. In Proceedings of the 2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kharagpur, India, 6–8 July 2021; pp. 1–7. [Google Scholar]
- Gui, G.; Liu, M.; Tang, F.; Kato, N.; Adachi, F. 6G: Opening new horizons for integration of comfort, security, and intelligence. IEEE Wirel. Commun. 2020, 27, 126–132. [Google Scholar] [CrossRef]
- Yang, Y.; Ma, M.; Wu, H.; Yu, Q.; Zhang, P.; You, X.; Wu, J.; Peng, C.; Yum, T.-S.P.; Shen, S.; et al. 6G network AI architecture for everyone-centric customized services. IEEE Netw. 2022, 37, 71–80. [Google Scholar] [CrossRef]
- Letaief, K.B.; Shi, Y.; Lu, J.; Lu, J. Edge artificial intelligence for 6G: Vision, enabling technologies, and applications. IEEE J. Sel. Areas Commun. 2021, 40, 5–36. [Google Scholar] [CrossRef]
- Kamath, H.S.; Bhandari, A.; Shekhar, S.; Ghosh, S. A Survey on Enabling Technologies and Recent Advancements in 6G Communication. Proc. J. Phys. Conf. Ser. 2023, 2466, 012005. [Google Scholar] [CrossRef]
- Ziegler, V.; Schneider, P.; Viswanathan, H.; Montag, M.; Kanugovi, S.; Rezaki, A. Security and Trust in the 6G Era. IEEE Access 2021, 9, 142314–142327. [Google Scholar] [CrossRef]
- Chowdhury, M.Z.; Shahjalal, M.; Ahmed, S.; Jang, Y.M. 6G wireless communication systems: Applications, requirements, technologies, challenges, and research directions. IEEE Open J. Commun. Soc. 2020, 1, 957–975. [Google Scholar] [CrossRef]
- Tu, Z.; Zhou, H.; Li, K.; Song, H.; Quan, W. Blockchain-based differentiated authentication mechanism for 6G heterogeneous networks. Peer-to-Peer Netw. Appl. 2023, 16, 727–748. [Google Scholar] [CrossRef]
- Bernabe, J.B.; Ramos, J.L.H.; Gomez, A.F.S. TACIoT: Multidimensional trust-aware access control system for the Internet of Things. Soft Comput. 2016, 20, 1763–1779. [Google Scholar] [CrossRef]
- Hashemi, S.Y.; Aliee, F.S. Fuzzy, dynamic and trust based routing protocol for IoT. J. Netw. Syst. Manag. 2020, 28, 1248–1278. [Google Scholar] [CrossRef]
- Yu, C.; Xia, G.; Song, L.; Peng, W.; Chen, J.; Zhang, D.; Li, H. CET-AoTM: Cloud-Edge-Terminal Collaborative Trust Evaluation Scheme for AIoT Networks. In International Conference on Service-Oriented Computing; Springer: Cham, Switzerland, 2023; pp. 143–158. [Google Scholar]
- Almogren, A.; Mohiuddin, I.; Din, I.U.; Almajed, H.; Guizani, N. Ftm-iomt: Fuzzy-based trust management for preventing sybil attacks in internet of medical things. IEEE Internet Things J. 2020, 8, 4485–4497. [Google Scholar] [CrossRef]
- Aravind, K.; Maddikunta, P.K.R. Optimized Fuzzy Logic based Energy-Efficient Geographical Data Routing in Internet of Things. IEEE Access 2024, 12, 18913–18930. [Google Scholar] [CrossRef]
- Kesarwani, A.; Khilar, P.M. Development of trust based access control models using fuzzy logic in cloud computing. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 1958–1967. [Google Scholar] [CrossRef]
- Rahman, F.H.; Au, T.-W.; Newaz, S.S.; Suhaili, W.S.; Lee, G.M. Find my trustworthy fogs: A fuzzy-based trust evaluation framework. Futur. Gener. Comput. Syst. 2020, 109, 562–572. [Google Scholar] [CrossRef]
- Soleymani, M.; Abapour, N.; Taghizadeh, E.; Siadat, S.; Karkehabadi, R. Fuzzy rule-based trust management model for the security of cloud computing. Math. Probl. Eng. 2021, 2021, 6629449. [Google Scholar] [CrossRef]
- Xia, G.; Yu, C.; Chen, J. A Fuzzy-Based Co-Incentive Trust Evaluation Scheme for Edge Computing in CEEC Environment. Appl. Sci. 2022, 12, 12453. [Google Scholar] [CrossRef]
- Rajashanthi, M.; Valarmathi, K. A secure trusted multipath routing and optimal fuzzy logic for enhancing QoS in MANETs. Wirel. Pers. Commun. 2020, 112, 75–90. [Google Scholar] [CrossRef]
- Singh, K.; Verma, A.K. TBCS: A trust based clustering scheme for secure communication in flying ad-hoc networks. Wirel. Pers. Commun. 2020, 114, 3173–3196. [Google Scholar] [CrossRef]
- Benfriha, S.; Labraoui, N.; Bensaid, R.; Salameh, H.B.; Saidi, H. FUBA: A fuzzy-based unmanned aerial vehicle behaviour analytics for trust management in flying ad-hoc networks. IET Netw. 2023, 13, 208–220. [Google Scholar] [CrossRef]
- Miao, T.; Shen, J.; Lai, C.F.; Ji, S.; Wang, H. Fuzzy-based trustworthiness evaluation scheme for privilege management in vehicular ad hoc networks. IEEE Trans. Fuzzy Syst. 2020, 29, 137–147. [Google Scholar] [CrossRef]
- Pang, B.; Teng, Z.; Sun, H.; Du, C.; Li, M.; Zhu, W. A malicious node detection strategy based on fuzzy trust model and the abc algorithm in wireless sensor network. IEEE Wirel. Commun. Lett. 2021, 10, 1613–1617. [Google Scholar] [CrossRef]
- Das, R.; Dash, D.; Sarkar, M.K. HTMS: Fuzzy based hierarchical trust management scheme in WSN. Wirel. Pers. Commun. 2020, 112, 1079–1112. [Google Scholar] [CrossRef]
- Yang, L.; Lu, Y.Z.; Yang, S.X.; Guo, T.; Liang, Z.F. A Secure Clustering Protocol with Fuzzy Trust Evaluation and Outlier Detection for Industrial Wireless Sensor Networks. IEEE Trans. Ind. Inform. 2021, 17, 4837–4847. [Google Scholar] [CrossRef]
- Ma, S.; He, J.; Shuai, X. Application of fuzzy comprehensive evaluation method in trust quantification. Int. J. Comput. Intell. Syst. 2011, 4, 768–776. [Google Scholar]
- Wang, Y.; Tian, L.; Wu, Z. Trust modeling based on probabilistic linguistic term sets and the MULTIMOORA method. Expert Syst. Appl. 2021, 165, 113817. [Google Scholar] [CrossRef]
- Zhao, B.; Liu, Y.; Li, X.; Li, J.; Zou, J. TrustBlock: An adaptive trust evaluation of SDN network nodes based on double-layer blockchain. PLoS ONE 2020, 15, e0228844. [Google Scholar] [CrossRef] [PubMed]
- Xu, G.; Liu, B.; Jiao, L.; Li, X.; Feng, M.; Liang, K.; Ma, L.; Zheng, X. Trust2Privacy: A novel fuzzy trust-to-privacy mechanism for mobile social networks. IEEE Wirel. Commun. 2020, 27, 72–78. [Google Scholar] [CrossRef]
- Valero, J.M.J.; Sánchez, P.M.S.; Lekidis, A.; Hidalgo, J.F.; Gil Pérez, M.; Siddiqui, M.S.; Celdrán, A.H.; Pérez, G.M. Design of a security and trust framework for 5G multi-domain scenarios. J. Netw. Syst. Manag. 2022, 30, 7. [Google Scholar] [CrossRef]
- Yang, L.; Li, Y.; Yang, S.X.; Lu, Y.; Guo, T.; Yu, K. Generative adversarial learning for intelligent trust management in 6G wireless networks. IEEE Netw. 2022, 36, 134–140. [Google Scholar] [CrossRef]
- Yin, Y.; Fang, H. A Novel Multiple Role Evaluation Fusion-Based Trust Management Framework in Blockchain-Enabled 6G Network. Sensors 2023, 23, 6751. [Google Scholar] [CrossRef] [PubMed]
- Sedjelmaci, H.; Ansari, N. Zero trust architecture empowered attack detection framework to secure 6G edge computing. IEEE Netw. 2023, 38, 196–202. [Google Scholar] [CrossRef]
- Siddiqui, S.A.; Mahmood, A.; Sheng, Q.Z.; Suzuki, H.; Ni, W. Trust in vehicles: Toward context-aware trust and attack resistance for the internet of vehicles. IEEE Trans. Intell. Transp. Syst. 2023, 24, 9546–9560. [Google Scholar] [CrossRef]
- Feng, X.; Yuan, Z. A novel trust evaluation mechanism for edge device access of the Internet of things. Wirel. Commun. Mob. Comput. 2022, 2022, 3015206. [Google Scholar] [CrossRef]
- Sagar, S.; Mahmood, A.; Sheng, M.; Zaib, M.; Zhang, W. Towards a machine learning-driven trust evaluation model for social Internet of Things: A time-aware approach. In Proceedings of the MobiQuitous 2020—17th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, Darmstadt, Germany, 7–9 December 2020; pp. 283–290. [Google Scholar]
- Gao, Y.; Li, X.; Li, J.; Gao, Y.; Philip, S.Y. Info-trust: A multi-criteria and adaptive trustworthiness calculation mechanism for information sources. IEEE Access 2019, 7, 13999–14012. [Google Scholar] [CrossRef]
- Nasir, S.U.; Kim, T.-H. Trust computation in online social networks using co-citation and transpose trust propagation. IEEE Access 2020, 8, 41362–41371. [Google Scholar] [CrossRef]
- Puspita, R.H.; Ali, J.; Roh, B.h. An Intelligent Admission Control Scheme for Dynamic Slice Handover Policy in 5G Network Slicing. Comput. Mater. Contin. CMC 2023, 75, 4612–4631. [Google Scholar]
- Li, X.; Feng, D. Markov chain based trust management scheme for wireless sensor networks. J. Netw. 2014, 9, 3263. [Google Scholar] [CrossRef]
- Bahaa, A.; Shehata, M.; Gasser, S.M.; El-Mahallawy, M.S. Call failure prediction in ip multimedia subsystem (ims) networks. Appl. Sci. 2022, 12, 8378. [Google Scholar] [CrossRef]
- Zhu, Y.; Liu, C.; Zhang, Y.; You, W. Research on 5G Core Network Trust Model Based on NF Interaction Behavior. KSII Trans. Internet Inf. Syst. 2022, 16, 3333–3354. [Google Scholar]
- Morocho-Cayamcela, M.E.; Lee, H.; Lim, W. Machine learning for 5G/B5G mobile and wireless communications: Potential, limitations, and future directions. IEEE Access 2019, 7, 137184–137206. [Google Scholar] [CrossRef]
- Yang, G.; Zhang, L.; Tan, Z.; Yu, H.; Li, S. A new method of trust inference based on Markov model for peer-to-peer network. In Proceedings of the 2012 IEEE 12th International Conference on Computer and Information Technology, Chengdu, China, 27–29 October 2012; pp. 349–354. [Google Scholar]
- Dutta, U. Sampling Random Graphs with Specified Degree Sequences. Ph.D. Thesis, University of Colorado at Boulder, Boulder, CO, USA, 2022. [Google Scholar]
- Berkhout, J.; Heidergott, B.F. Analysis of Markov influence graphs. Oper. Res. 2019, 67, 892–904. [Google Scholar] [CrossRef]
- Chen, X.; Leng, S.; He, J.; Zhou, L. Deep-learning-based intelligent intervehicle distance control for 6G-enabled cooperative autonomous driving. IEEE Internet Things J. 2020, 8, 15180–15190. [Google Scholar] [CrossRef]
- Zhou, X.; Liang, W.; She, J.; Yan, Z.; Wang, K.I.-K. Two-layer federated learning with heterogeneous model aggregation for 6g supported internet of vehicles. IEEE Trans. Veh. Technol. 2021, 70, 5308–5317. [Google Scholar] [CrossRef]
- Patel, N.J.; Jhaveri, R.H. Detecting packet dropping nodes using machine learning techniques in Mobile ad-hoc network: A 832 survey. In Proceedings of the 2015 International Conference on Signal Processing and Communication Engineering Systems, Guntur, India, 2–3 January 2015; pp. 468–472. [Google Scholar]
- Fantacci, R.; Picano, B. A D2D-Aided Federated Learning Scheme with Incentive Mechanism in 6G Networks. IEEE Access 2022, 11, 107–117. [Google Scholar] [CrossRef]
- Zhao, K.; Pan, L. A machine learning based trust evaluation framework for online social networks. In Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China, 24–26 September 2014; pp. 69–74. [Google Scholar]
- Yi, B.; Cao, H.; Song, X.; Wang, J.; Guo, W.; Huang, Z. Measurement and Real-Time Recognition of Driver Trust in Conditionally Automated Vehicles: Using Multimodal Feature Fusions Network. Transp. Res. Rec. 2023, 2677, 311–330. [Google Scholar] [CrossRef]
- Singh, K.; Verma, A.K.; Aggarwal, P. Analysis of various trust computation methods: A step toward secure FANETs. In Computer and Cyber Security; Auerbach Publications: Boca Raton, FL, USA, 2018; pp. 171–193. [Google Scholar]
- Koeppe, A.; Bamer, F.; Selzer, M.; Nestler, B.; Markert, B. Explainable artificial intelligence for mechanics: Physics-informing neural networks for constitutive models. arXiv 2021, arXiv:2104.10683. [Google Scholar] [CrossRef]
- Apparaju, A.; Arandjelović, O. Towards new generation, biologically plausible deep neural network learning. Sci 2022, 4, 46. [Google Scholar] [CrossRef]
- Alhadad, N.; Busnel, Y.; Serrano-Alvarado, P.; Lamarre, P. Trust evaluation of a system for an activity with subjective logic. In International Conference on Trust, Privacy and Security in Digital Business; Springer: Cham, Switzerland, 2014; pp. 48–59. [Google Scholar]
- Alemneh, E.; Senouci, S.M.; Brunet, P.; Tegegne, T. A two-way trust management system for fog computing. Future Gener. Comput. Syst. 2020, 106, 206–220. [Google Scholar] [CrossRef]
- Sohail, M.; Wang, L.; Jiang, S.; Zaineldeen, S.; Ashraf, R.U. Multi-hop interpersonal trust assessment in vehicular ad-hoc networks using three-valued subjective logic. IET Inf. Secur. 2019, 13, 223–230. [Google Scholar] [CrossRef]
- Yuan, J.; Zhou, H.; Chen, H. Subjective logic-based anomaly detection framework in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2012, 8, 482191. [Google Scholar] [CrossRef]
- Kurdi, H.; Alfaries, A.; Al-Anazi, A.; Alkharji, S.; Addegaither, M.; Altoaimy, L.; Ahmed, S.H. A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments. J. Supercomput. 2019, 75, 3534–3554. [Google Scholar] [CrossRef]
- Henrique, P.S.R.; Prasad, R. Bayesian Neural Networks for 6G CONASENSE Services. In Proceedings of the 2022 25th Inter-national Symposium on Wireless Personal Multimedia Communications (WPMC), Herning, Denmark, 30 October–2 November 2022; pp. 291–296. [Google Scholar]
- Feng, R.; Han, X.; Liu, Q.; Yu, N. A credible Bayesian-based trust management scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015, 11, 678926. [Google Scholar] [CrossRef]
- Hosseinnezhad, M.; Azgomi, M.A.; Dishabi, M.R.E. A probabilistic trust model for cloud services using Bayesian networks. Soft Comput. 2024, 28, 509–526. [Google Scholar] [CrossRef]
- Ye, J.; Kang, X.; Liang, Y.-C.; Sun, S. A trust-centric privacy-preserving blockchain for dynamic spectrum management in IoT networks. IEEE Internet Things J. 2022, 9, 13263–13278. [Google Scholar] [CrossRef]
- Rahman, A.; Khan, M.S.I.; Montieri, A.; Islam, M.J.; Karim, M.R.; Hasan, M.; Kundu, D.; Nasir, M.K.; Pescapè, A. BlockSD-5GNet: Enhancing security of 5G network through blockchain-SDN with ML-based bandwidth prediction. Trans. Emerg. Telecommun. Technol. 2024, 35, e4965. [Google Scholar] [CrossRef]
- Al-Ansi, A.; Al-Ansi, A.M.; Muthanna, A.; Koucheryavy, A. Blockchain technology integration in service migration to 6gcommunication networks: A comprehensive review. Indones. J. Electr. Eng. Comput. Sci 2024, 34, 1654–1664. [Google Scholar]
- Gao, F.; Chen, D.L.; Weng, M.H.; Yang, R.Y. Revealing development trends in blockchain-based 5g network technologies through patent analysis. Sustainability 2021, 13, 2548. [Google Scholar] [CrossRef]
- Muntaha, S.T.; Lazaridis, P.I.; Hafeez, M.; Ahmed, Q.Z.; Khan, F.A.; Zaharis, Z.D. Blockchain for Dynamic Spectrum Access and Network Slicing: A Review. IEEE Access 2023, 11, 17922–17944. [Google Scholar] [CrossRef]
- Ranaweera, C.; Lim, C.; Tao, Y.; Edirisinghe, S.; Song, T.; Wosinska, L.; Nirmalathas, A. Design and deployment of optical x-haul for 5G, 6G, and beyond: Progress and challenges. J. Opt. Commun. Netw. 2023, 15, D56–D66. [Google Scholar] [CrossRef]
- Feng, R.; Xu, X.; Zhou, X.; Wan, J. A trust evaluation algorithm for wireless sensor networks based on node behaviors and ds evidence theory. Sensors 2011, 11, 1345–1360. [Google Scholar] [CrossRef]
- Baccour, E.; Allahham, M.S.; Erbad, A.; Mohamed, A.; Hussein, A.R.; Hamdi, M. Zero touch realization of pervasive artificial intelligence as a service in 6G networks. IEEE Commun. Mag. 2023, 61, 110–116. [Google Scholar] [CrossRef]
- Nguyen, T.; Tran, N.; Loven, L.; Partala, J.; Kechadi, M.T.; Pirttikangas, S. Privacy-aware blockchain innovation for 6G: Challenges and opportunities. In Proceedings of the 2020 2nd 6G Wireless Summit (6G SUMMIT), Levi, Finland, 17–20 March 2020; pp. 1–5. [Google Scholar]
- Tian, J.; Zhang, J.; Zhang, P.; Ma, X. Dynamic trust model based on extended subjective logic. KSII Trans. Internet Inf. Syst. (TIIS) 2018, 12, 3926–3945. [Google Scholar]
- Lewis, C.; Li, N.; Varadharajan, V. Targeted Context based Attacks on Trust Models in IoT Systems. Authorea Prepr. 2023. [Google Scholar]
Category | Techniques | Advantages | Disadvantages |
---|---|---|---|
Statistics | Weighted sum |
|
|
Reasoning | Bayesian |
|
|
Subjective logic |
|
| |
Machine learning | Markov chain |
|
|
Support Vector Machines |
|
| |
Artificial Neural Networks |
|
| |
Decentralized | Blockchain |
|
|
Category | Type | Technology | Ref. | Scalability | Integrity | Availability | Privacy | Dynamicity | Context Awareness |
---|---|---|---|---|---|---|---|---|---|
IoT Networks | AIoT 1 | FL and Neural Network | [30] | yes | yes | yes | - | yes | yes |
IoT 7 | FL and TRM and Security | [44] | yes | yes | yes | - | yes | Some degree | |
IoT | FL | [29] | yes | yes | yes | - | yes | yes | |
IoMT 6 | FL | [31] | - | yes | yes | - | yes | - | |
IoT | FL and HHO | [32] | yes | yes | yes | - | yes | yes | |
Ad-Hoc Networks | MANETs 9 | FL and Security | [37] | - | yes | - | - | yes | - |
FANETs 5 | FL and ontology | [38] | definitely yes | yes | - | Some degree | yes | - | |
FANETs | FL and ML and BC | [39] | yes | yes | - | - | yes | yes | |
VANETs 10 | FL and Subjective | [40] | yes | yes | yes | yes | yes | - | |
Mobile Networks | SDN | FL and BC | [46] | yes | yes | yes | yes | - | - |
5G | FL | [47] | - | yes | yes | yes | yes | - | |
5G | FL and TRM | [28] | - | yes | - | - | yes | - | |
6GWN 12 | FL and GAN | [49] | - | yes | yes | - | yes | yes | |
5G | FL and TLA | [48] | yes | yes | yes | yes | yes | yes | |
5G | FL and Multimoora | [45] | yes | yes | - | - | yes | yes | |
Wireless Sensor Networks | IWSN 8 | FL | [43] | - | yes | yes | - | yes | yes |
WSN 11 | FL and TRM | [42] | - | yes | - | - | yes | Some degree | |
WSN | FL and ABC | [41] | - | yes | - | - | yes | - | |
Cloud Networks | CN 3 | FL and ontology | [33] | yes | yes | yes | - | yes | - |
CN | FL and Subjective | [35] | yes | yes | yes | - | yes | yes | |
CEEC 2 | FL | [36] | yes | yes | yes | - | yes | yes | |
FCN 4 | FL and broker-based | [34] | - | yes | yes | yes | yes | - |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Saeedi Taleghani, E.; Maldonado Valencia, R.I.; Sandoval Orozco, A.L.; García Villalba, L.J. Trust Evaluation Techniques for 6G Networks: A Comprehensive Survey with Fuzzy Algorithm Approach. Electronics 2024, 13, 3013. https://doi.org/10.3390/electronics13153013
Saeedi Taleghani E, Maldonado Valencia RI, Sandoval Orozco AL, García Villalba LJ. Trust Evaluation Techniques for 6G Networks: A Comprehensive Survey with Fuzzy Algorithm Approach. Electronics. 2024; 13(15):3013. https://doi.org/10.3390/electronics13153013
Chicago/Turabian StyleSaeedi Taleghani, Elmira, Ronald Iván Maldonado Valencia, Ana Lucila Sandoval Orozco, and Luis Javier García Villalba. 2024. "Trust Evaluation Techniques for 6G Networks: A Comprehensive Survey with Fuzzy Algorithm Approach" Electronics 13, no. 15: 3013. https://doi.org/10.3390/electronics13153013
APA StyleSaeedi Taleghani, E., Maldonado Valencia, R. I., Sandoval Orozco, A. L., & García Villalba, L. J. (2024). Trust Evaluation Techniques for 6G Networks: A Comprehensive Survey with Fuzzy Algorithm Approach. Electronics, 13(15), 3013. https://doi.org/10.3390/electronics13153013