{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:06:29Z","timestamp":1767261989969,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030962982"},{"type":"electronic","value":"9783030962999"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-96299-9_64","type":"book-chapter","created":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T17:09:04Z","timestamp":1645463344000},"page":"675-684","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Trust Management Model in IoT: A Comprehensive Survey"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Saeed","sequence":"first","affiliation":[]},{"given":"Muhammad","family":"Aftab","sequence":"additional","affiliation":[]},{"given":"Rashid","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Deepika","family":"Koundal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,2,22]]},"reference":[{"key":"64_CR1","doi-asserted-by":"crossref","unstructured":"Sfar, A.R., et al.: A roadmap for security challenges in the internet of things. Digital Commun. Netw. 4(2), 118\u2013137 (2018)","DOI":"10.1016\/j.dcan.2017.04.003"},{"key":"64_CR2","doi-asserted-by":"crossref","unstructured":"Awan, K.A., et al.: Robusttrust\u2013a pro-privacy robust distributed trust management mechanism for the internet of things. IEEE Access 7, 62095\u201362106 (2019)","DOI":"10.1109\/ACCESS.2019.2916340"},{"key":"64_CR3","doi-asserted-by":"crossref","unstructured":"Conti, M., et al.: Internet of Things Security and Forensics: Challenges and Opportunities. Elsevier (2018)","DOI":"10.1016\/j.future.2017.07.060"},{"key":"64_CR4","doi-asserted-by":"crossref","unstructured":"Din, I.U., et al.: The internet of things: A review of enabled technologies and future challenges. IEEE Access 7, 7606\u20137640 (2018)","DOI":"10.1109\/ACCESS.2018.2886601"},{"key":"64_CR5","doi-asserted-by":"crossref","unstructured":"Ammar, M., Russello, G., Crispo, B.: Internet of things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 38, 8\u201327 (2018)","DOI":"10.1016\/j.jisa.2017.11.002"},{"key":"64_CR6","doi-asserted-by":"publisher","unstructured":"Alhogail, A., Alshahrani, M.: Building consumer trust to improve internet of things (IoT) technology adoption. In: International Conference on Applied Human Factors and Ergonomics. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-94866-9_33","DOI":"10.1007\/978-3-319-94866-9_33"},{"key":"64_CR7","doi-asserted-by":"publisher","unstructured":"Chang, K.-D., Chen, J.-L.: A survey of trust management in WSNS, internet of things and future internet. KSII Trans. Internet Inf. Syst. 6(1) (2012). https:\/\/doi.org\/10.3837\/tiis.2012.01.001","DOI":"10.3837\/tiis.2012.01.001"},{"key":"64_CR8","doi-asserted-by":"crossref","unstructured":"Zhang, Q., et al.: An adaptive dropout deep computation model for industrial IoT big data learning with crowdsourcing to cloud computing. IEEE Trans. Ind. Inf. 15(4), 2330\u20132337 (2018)","DOI":"10.1109\/TII.2018.2791424"},{"key":"64_CR9","doi-asserted-by":"crossref","unstructured":"Awan, K.A., et al.: Holitrust-a holistic cross-domain trust management mechanism for service-centric internet of things. IEEE Access 7, 52191\u201352201 (2019)","DOI":"10.1109\/ACCESS.2019.2912469"},{"key":"64_CR10","doi-asserted-by":"crossref","unstructured":"Fang, W., et al.: FETMS: Fast and efficient trust management scheme for information-centric networking in internet of things. IEEE Access 7, 13476\u201313485 (2019)","DOI":"10.1109\/ACCESS.2019.2892712"},{"key":"64_CR11","doi-asserted-by":"crossref","unstructured":"Alshehri, M.D., Hussain, F.K., Hussain, O.K.: Clustering-driven intelligent trust management methodology for the internet of things (CITM-IOT). Mobile Netw. Appl. 23(3), 419\u2013431 (2018)","DOI":"10.1007\/s11036-018-1017-z"},{"key":"64_CR12","doi-asserted-by":"crossref","unstructured":"Kowshalya, A.M., Valarmathi, M.: Trust management for reliable decision making among social objects in the social internet of things. IET Netw. 6(4), 75\u201380 (2017)","DOI":"10.1049\/iet-net.2017.0021"},{"key":"64_CR13","doi-asserted-by":"publisher","unstructured":"Das, R., Singh, M., Majumder, K.: SGSQOT: A community-based trust management scheme in internet of things. In: Proceedings of International Ethical Hacking Conference 2018. Springer (2019). https:\/\/doi.org\/10.1007\/978-981-13-1544-2_18","DOI":"10.1007\/978-981-13-1544-2_18"},{"key":"64_CR14","doi-asserted-by":"publisher","unstructured":"Alshehri, M.D., Hussain, F.K.: A centralized trust management mechanism for the internet of things (CTM-IOT). In: International Conference on Broadband and Wireless Computing, Communication and Applications. Springer (2017). https:\/\/doi.org\/10.1007\/978-3-319-69811-3_48","DOI":"10.1007\/978-3-319-69811-3_48"},{"key":"64_CR15","doi-asserted-by":"crossref","unstructured":"Fernandez-gago, C., Moyano, F., Lopez, J.: Modelling trust dynamics in the internet of things. Inf. Sci. 396, 72\u201382 (2017)","DOI":"10.1016\/j.ins.2017.02.039"},{"key":"64_CR16","doi-asserted-by":"crossref","unstructured":"Hui, T.K., Sherratt, R.S., S\u00e1nchez, D.D.: Major requirements for building smart homes in smart cities based on internet of things technologies. Future Gener. Comput. Syst. 76, 358\u2013369 (2017)","DOI":"10.1016\/j.future.2016.10.026"},{"key":"64_CR17","unstructured":"Valera, A.J.J., Zamora, M.A., Skarmeta, A.F.: An architecture based on internet of things to support mobility and security in medical environments. In 2010 7th IEEE Consumer Communications and Networking Conference. IEEE (2010)"}],"container-title":["Lecture Notes in Networks and Systems","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-96299-9_64","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,21]],"date-time":"2022-02-21T17:18:09Z","timestamp":1645463889000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-96299-9_64"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030962982","9783030962999"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-96299-9_64","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 February 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IBICA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations in Bio-Inspired Computing and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ibica2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mirlabs.net\/ibica21\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}