A Neural-Symbolic Approach to Extract Trust Patterns in IoT Scenarios
Fabrizio Messina,
Domenico Rosaci () and
Giuseppe M. L. Sarnè
Additional contact information
Fabrizio Messina: Department of Mathematics and Informatics, University of Catania, 95125 Catania, Italy
Domenico Rosaci: Department DIIES, University “Mediterranea” of Reggio Calabria, 89122 Reggio Calabria, Italy
Giuseppe M. L. Sarnè: Department of Psychology, University of Milan-Bicocca, 20126 Milan, Italy
Future Internet, 2025, vol. 17, issue 3, 1-19
Abstract:
Trust and reputation relationships among objects represent key aspects of smart IoT object communities with social characteristics. In this context, several trustworthiness models have been presented in the literature that could be applied to IoT scenarios; however, most of these approaches use scalar measures to represent different dimensions of trust, which are then integrated into a single global trustworthiness value. Nevertheless, this scalar approach within the IoT context holds a few limitations that emphasize the need for models that can capture complex trust relationships beyond vector-based representations. To overcome these limitations, we already proposed a novel trust model where the trust perceived by one object with respect to another is represented by a directed, weighted graph. In this model, called T-pattern, the vertices represent individual trust dimensions, and the arcs capture the relationships between these dimensions. This model allows the IoT community to represent scenarios where an object may lack direct knowledge of a particular trust dimension, such as reliability, but can infer it from another dimension, like honesty. The proposed model can represent trust structures of the type described, where multiple trust dimensions are interdependent. This work represents a further contribution by presenting the first real implementation of the T-pattern model, where a neural-symbolic approach has been adopted as inference engine. We performed experiments that demonstrate the capability in inferring trust of both the T-pattern and this specific implementation.
Keywords: Internet of Things; reputation; security simulation; T-pattern model (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2025
References: View references in EconPapers View complete reference list from CitEc
Citations:
Downloads: (external link)
https://www.mdpi.com/1999-5903/17/3/116/pdf (application/pdf)
https://www.mdpi.com/1999-5903/17/3/116/ (text/html)
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:17:y:2025:i:3:p:116-:d:1606464
Access Statistics for this article
Future Internet is currently edited by Ms. Grace You
More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().