Trust and Reciprocity: Internet of Things for Food Security and Safety

碩士 === 國立成功大學 === 電腦與通信工程研究所 === 104 === The Internet of Things attracts attention recently because of popularity of mobile devices. The idea of Internet of Things is to connect all cyber things, physical things and people together. They can exchange data and achieve their own goals more effectively...

Full description

Bibliographic Details
Main Authors: Yu-WeiShen, 沈育緯
Other Authors: Hewi-Jin Jiau
Format: Others
Language:en_US
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/ucr64q
Description
Summary:碩士 === 國立成功大學 === 電腦與通信工程研究所 === 104 === The Internet of Things attracts attention recently because of popularity of mobile devices. The idea of Internet of Things is to connect all cyber things, physical things and people together. They can exchange data and achieve their own goals more effectively with these exchanged data. The fundamental of Internet of Things is collaboration. While Collaboration depends on trust, all things must trust each other. In the context of Internet of Things, large amount of things can connect at anytime. It is difficult to discriminate between trustworthy things and untrustworthy things. In this thesis, a four phase model of Internet of Things is provided. The four phases are interconnection phase, interaction phase, mutual trust phase and reciprocity phase in sequence. A system called Trustworthy Food Information System (TFIS) was built for maintaining food security and safety. It follows the four phase model of Internet of Things and apply a new reputation calculation algorithm proposed in this thesis to help users build mutual trust in the system. The algorithm calculates all users’ reputation scores and trustworthiness of provided data according to behavior history and ratings made by each other. TFIS restricts the low-reputation users to provide any data and gives high-reputation users rewards. It helps all users establish trust on each other. Two simulations are performed to evaluate the effectiveness of the algorithm. The result shows the algorithm can discriminate the users and helps users to build mutual trust.