
International Journal For Multidisciplinary Research
E-ISSN: 2582-2160
•
Impact Factor: 9.24
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal
Home
Research Paper
Submit Research Paper
Publication Guidelines
Publication Charges
Upload Documents
Track Status / Pay Fees / Download Publication Certi.
Editors & Reviewers
View All
Join as a Reviewer
Get Membership Certificate
Current Issue
Publication Archive
Conference
Publishing Conf. with IJFMR
Upcoming Conference(s) ↓
WSMCDD-2025
GSMCDD-2025
Conferences Published ↓
RBS:RH-COVID-19 (2023)
ICMRS'23
PIPRDA-2023
Contact Us
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 3
May-June 2025
Indexing Partners



















Trust-Centric Security Architecture For The Internet of Things: Models, Algorithms, and Applications
Author(s) | Ms. Sweetlin Devamanohari Stephenson, Dr. Prathapchandran Kannimuthu, Ms. BanuPriya Dhandapani, Mr. Samuel David Dhas |
---|---|
Country | India |
Abstract | The Internet of Things (IoT) has emerged as a transformative technology, enabling seamless connectivity among devices and facilitating intelligent decision-making across numerous domains. However, the widespread deployment of IoT networks has introduced significant security concerns due to the heterogeneous and resource-constrained nature of IoT devices. Traditional security methods are often inadequate in addressing these challenges. This paper explores the application of trust management algorithms as a novel approach to securing IoT networks. By quantifying trust based on behavior, interaction, and historical data, trust management frameworks enhance resilience against common security threats, including malicious node activity, data tampering, and insider attacks. The paper presents a comparative analysis of prominent trust management algorithms, proposes an integrated trust-based security framework, and discusses potential future research directions. |
Keywords | Internet of Things, IoT security, trust management, network security, trust algorithms |
Field | Computer Applications |
Published In | Volume 7, Issue 2, March-April 2025 |
Published On | 2025-04-27 |
DOI | https://doi.org/10.36948/ijfmr.2025.v07i02.43171 |
Short DOI | https://doi.org/g9gvk7 |
Share this

E-ISSN 2582-2160

CrossRef DOI is assigned to each research paper published in our journal.
IJFMR DOI prefix is
10.36948/ijfmr
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.
