Open Access
ARTICLE
Constructing a Dynamic Trust Assessment Mechanism Combining Zero Knowledge Proof with Unsupervised Learning
1 Department of Information Management, National Taiwan University of Science and Technology, Taipei, Taiwan
2 Graduate Institute of Management, National Taiwan University of Science and Technology, Taipei, Taiwan
3 School of Management, National Taiwan University of Science and Technology, Taipei, Taiwan
4 Graduate Institute of A.I. Cross-Disciplinary Technology, National Taiwan University of Science and Technology, Taipei, Taiwan
* Corresponding Author: Chih-Chieh Chang. Email:
(This article belongs to the Special Issue: Machine learning and Blockchain for AIoT: Robustness, Privacy, Trust and Security)
Computer Modeling in Engineering & Sciences 2026, 147(1), 46 https://doi.org/10.32604/cmes.2026.077316
Received 06 December 2025; Accepted 24 February 2026; Issue published 27 April 2026
Abstract
The growing frequency of malicious attacks on Internet of Things (IoT) devices has rendered conventional approaches with static label-dependent risk assessment models obsolete, especially when coping with unknown and continuously evolving threats. To mitigate these challenges, a novel dynamic trust evaluation framework approach is proposed in this work. The proposed framework utilized unsupervised learning and zero-knowledge proofs to assess device risks in complex environments adaptively, with an accuracy rate of 98.96% for normal clustering and 95.39% for anomalies. K-means clustering algorithm is leveraged to distinguish risk patterns with an additional Decision Tree classification algorithm to analyze the distinguishing characteristics of the behaviors of normal and anomalous devices. The architecture is evaluated in a simulated environment based on real device interaction, with various malicious attacks proportions. In addition, Zero Trust Architecture is integrated into this novel framework to ensure no implicit trust exists between devices, which enforces trust assessment before any collaboration or data exchange.Keywords
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools