A Web of Things Architecture Focusing on Trust / (Record no. 615910)

000 -LEADER
fixed length control field 04240nam a22001697a 4500
003 - CONTROL NUMBER IDENTIFIER
control field NUST
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.1,JAV
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Javaid, Sabeen
9 (RLIN) 124505
245 ## - TITLE STATEMENT
Title A Web of Things Architecture Focusing on Trust /
Statement of responsibility, etc. Sabeen Javaid
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Rawalpindi,
Name of publisher, distributor, etc. MCS (NUST),
Date of publication, distribution, etc. 2019
300 ## - PHYSICAL DESCRIPTION
Extent xiii, 135 p
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Trust has a significant impact on our personal and business relations. It is noteworthy that<br/>in the era of things based services, people trust in various companies/organizations for personal<br/>and business purposes. They receive their services and consequently, ‘data including<br/>personal and business’ is accessible to these service providers which sometimes bring undesirable<br/>results. An example of things-based services is remote health monitoring system. In<br/>this case also, the sensitive data is accessible to known and occasionally unknown entities.<br/>Since health-related services are life-critical, therefore, the quality of such services in term<br/>of trust should not be compromised, and the context of the services should be the same as<br/>required. Hence, it is fairly said that maintaining trust in the environment of this dominating<br/>technology is a tedious task.<br/>Web of Things (WoT) simplifies the development of things based services by providing an<br/>application layer. It is identified that the existing work focuses on building blocks of WoT<br/>architecture. However, the aspect of trust has got less attention in the area of WoT. Consequently,<br/>this research proposes a WoT architecture focusing on Trust. It has five layers<br/>which are not like those layers defined in the OSI (Open System Interconnection) model.<br/>Instead these layers facilitate i) in making things part of the cyber world with the help of the<br/>Web technologies, ii) monitoring and evaluating trust at a central trust management layer,<br/>iii) receiving and providing recommendations through social relations, iv) and help in discovering<br/>and selecting the required services by managing their trustworthiness at user level.<br/>For trust monitoring and management, a methodology is introduced in which entities are<br/>evaluated on the basis of multi-criteria such as context and Quality of Service (QoS). For<br/>this purpose, several attributes related to context and QoS are identified which can affect the trustworthiness of the entities. Direct and indirect experiences are the sources of evidence of<br/>trustworthiness. Moreover, third-party recommendations are also considered. To complete<br/>these tasks, algorithms are also designed. The research also proposes a methodology for the<br/>identification of service-related attacks which are carried out to malign the trust level of the<br/>entities present in the system.<br/>To validate the proposed architecture, a prototype is implemented which is for the real-time<br/>monitoring of a poultry farm in Pakistan. It demonstrates an instance of the architecture<br/>presenting the five layers of the architecture. The test results show the effectiveness of the<br/>architecture in maintaining the healthy environment of the poultry farm. In addition, to<br/>demonstrate the effectiveness of proposed algorithms, two specially designed environments<br/>are implemented where two real datasets are used for experimental purpose. In the first<br/>group of experiments, the algorithms for service discovery, selection, and ranking are tested<br/>along with query augmentation. In the second group of experiments, a classification approach<br/>along with the proposed algorithms is used to identify various types of attacks on the<br/>basis of feedbacks. During two kinds of experiments, the proposed algorithms demonstrate<br/>their effectiveness in discovering and ranking the services. In addition, identification of the<br/>attacks is also demonstrated. The results show that the system outperforms the existing related<br/>approaches in terms of the comparative analysis on the basis of performance metrics<br/>(such as precision, sensitivity, and accuracy) and parametric metrics (such as availability,<br/>interoperability, context-awareness, scalability, and QoS).
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element PhD Computer Software Engineering Thesis
9 (RLIN) 132801
651 ## - SUBJECT ADDED ENTRY--GEOGRAPHIC NAME
Geographic name PhD CSE Thesis
9 (RLIN) 132802
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Supervised by Dr. Hammad Afzal
9 (RLIN) 132892
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Thesis
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type Public note
          Military College of Signals (MCS) Military College of Signals (MCS) Thesis 01/26/2026   005.1,JAV MCSPhD CS-08 01/26/2026 01/26/2026 Thesis Almirah No.68, Shelf No.5
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.