{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:30:51Z","timestamp":1725496251894},"publisher-location":"Boston, MA","reference-count":21,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387736549"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73655-6_23","type":"book-chapter","created":{"date-parts":[[2007,11,23]],"date-time":"2007-11-23T06:41:46Z","timestamp":1195800106000},"page":"349-365","source":"Crossref","is-referenced-by-count":4,"title":["Trust based Approach for Improving Data Reliability in Industrial Sensor Networks"],"prefix":"10.1007","author":[{"given":"Tatyana","family":"Ryutov","sequence":"first","affiliation":[]},{"given":"Clifford","family":"Neuman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"R. Adler, P. Buonadonna, J. Chhabra, M. Flanigan, L. Krishnamurthy, N. Kushalnagar, L. Nachman, M. Yarvis. Design and Deployment of Industrial Sensor Networks: Experiences from the North Sea and a Semiconductor Plant, Sensys 2005."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"C. M. Bishop, Neural Networks for Pattern Recognition, Oxford University Press, ISBN: 0198538642, 1995.","DOI":"10.1093\/oso\/9780198538493.001.0001"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"M. Bohge and W. Trappe. An Authentication Framework for Hierarchical Ad Hoc Sensor Networks. In Proc. of ACM workshop on Wireless Security, 2003.","DOI":"10.1145\/941311.941324"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, A. Khalili, A Pairwise Key Predistribution Scheme for Wireless Sensor Networks. The ACM Transactions on Information and System Security, 2005.","DOI":"10.1145\/1065545.1065548"},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"E. Elnahrawy, and B. Nath. Context-aware sensors. In Lecture Notes in Computer Science, H. Karl, A. Willig, and A. Wolisz, Eds. Vol. 2920. Springer-Verlag, 77\u201393, 2004.","DOI":"10.1007\/978-3-540-24606-0_6"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"S. Ganeriwal and M. B. Srivastava, Reputation-based framework for high integrity sensor networks. In Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, 66\u201377, 2004.","DOI":"10.1145\/1029102.1029115"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"G. Gaubatz, J.-P. Kaps, and B. Sunar. Public key cryptography in sensor networks revisited, 1st European Workshop on Security in Ad-Hoc and Sensor Networks, LNCS 3313, 2004.","DOI":"10.1007\/978-3-540-30496-8_2"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"M. Krasniewski, P. Varadharajan, B. Rabeler, S. Bagchi, Y. C. Hu. TibFit: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. In Proceedings of the International Conference on Dependable Systems and Networks, 2005.","DOI":"10.1109\/DSN.2005.92"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"B. Krishnamachari and S. Iyengar, Distributed Bayesian algorithms for faulttolerant event region detection in wireless sensor networks. IEEE Transactions on Computers, Vol. 53, No. 3, 2004.","DOI":"10.1109\/TC.2004.1261832"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"B. Krishnamachari, S. Iyengar. Efficient and Fault-Tolerant Feature Extraction in Wireless Sensor Networks, Proceedings of Information Processing in Sensor Networks, 2003.","DOI":"10.1007\/3-540-36978-3_33"},{"key":"23_CR11","unstructured":"L. B. Larkey and A. A. Hagberg and L. M. A. Bettencourt. In-Situ Data Quality Assurance for Environmental Applications of Wireless Sensor Networks, Report LA-UR-06-1117, 2006."},{"key":"23_CR12","unstructured":"D. Liu, Peng Ning and W. Du. Attack-Resistant Location Estimation in Sensor Networks. In Proceedings of The Fourth International Conference on Information Processing in Sensor Networks, 2005."},{"issue":"5","key":"23_CR13","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A. Perrig","year":"2002","unstructured":"A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks, Wireless Networks Journal, 8(5):521\u2013534, 2002.","journal-title":"Wireless Networks Journal"},{"key":"23_CR14","unstructured":"Pirzada and C. McDonald. Establishing trust in pure ad-hoc networks, In Proceedings of the 27th Australasian Computer Science Conference, 47\u201354, 2004."},{"key":"23_CR15","first-page":"81","volume":"1","author":"J. R. Quinlan","year":"1986","unstructured":"J. R. Quinlan. Induction of decision trees. Machine Learning 1:81\u2013106, 1986.","journal-title":"Machine Learning"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"T. Ryutov, L. Zhou, N. Foukia, C. Neuman, T. Leithead, K. E. Seamons. Adaptive Trust Negotiation and Access Control for Grids. In proceedings of the Grid 6th IEEE\/ACM International Workshop on Grid Computing, 2005.","DOI":"10.1109\/GRID.2005.1542724"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. Seamons. Adaptive Trust Negotiation and Access Control. In Proceedings of SACMAT, 2005.","DOI":"10.1145\/1063979.1064004"},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"W. Trappe, Y Zhang, and B. Nath. MIAMI: Methods and Infrastructure for the Assurance of Measurement Information, In DMSN, 2005.","DOI":"10.1145\/1080885.1080888"},{"key":"23_CR19","unstructured":"S. Q. Zhang, S J Jin, F. L Yang, X Q Wang and Q. Y. Bai. Crucial Technologies of Oil Transporting Pipe Leak Detection and Location Based on Wavelet and Chaos, 7th ISMTII2005(UK), 2005."},{"key":"23_CR20","unstructured":"S. Zhu, S. Setia, S. Jajodia, and P. Ning. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks, Proceedings of IEEE Symposium on Security and Privacy, 2004."},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"C. Zouridaki, B. L. Mark, M. Hejmo, R. K. Thomas. A quantitative trust establishment framework for reliable data packet delivery in MANETs, SASN 2005.","DOI":"10.1145\/1102219.1102222"}],"container-title":["IFIP International Federation for Information Processing","Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73655-6_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,19]],"date-time":"2024-02-19T14:10:38Z","timestamp":1708351838000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73655-6_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387736549"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73655-6_23","relation":{},"subject":[]}}