{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:52:05Z","timestamp":1742914325397,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031213847"},{"type":"electronic","value":"9783031213854"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21385-4_42","type":"book-chapter","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T05:03:52Z","timestamp":1670907832000},"page":"518-529","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Wolf Algorithm Based Routing and Adamic Adar Trust for Secured IOT Network"],"prefix":"10.1007","author":[{"given":"Shailendra Kumar","family":"Tiwari","sequence":"first","affiliation":[]},{"given":"Praveen Kumar","family":"Mannepalli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,14]]},"reference":[{"issue":"9","key":"42_CR1","doi-asserted-by":"publisher","first-page":"2013","DOI":"10.1109\/TIFS.2016.2570740","volume":"11","author":"Y Liu","year":"2016","unstructured":"Liu, Y., Dong, M., Ota, K., Liu, A.: ActiveTrust: secure and trustable routing in wireless sensor networks. IEEE Trans. Inform. Forensics Secur. 11(9), 2013\u20132027 (2016). https:\/\/doi.org\/10.1109\/TIFS.2016.2570740","journal-title":"IEEE Trans. Inform. Forensics Secur."},{"issue":"3","key":"42_CR2","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1109\/TITS.2020.2997377","volume":"22","author":"T Wang","year":"2021","unstructured":"Wang, T., Luo, H., Zeng, X., Zhiyong, Y., Liu, A., Sangaiah, A. K.: Mobility based trust evaluation for heterogeneous electric vehicles network in smart cities. IEEE Trans. Intell. Transp. Syst. 22(3), 1797\u20131806 (2021). https:\/\/doi.org\/10.1109\/TITS.2020.2997377","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"10","key":"42_CR3","doi-asserted-by":"publisher","first-page":"6663","DOI":"10.1109\/TII.2019.2962844","volume":"16","author":"T Wang","year":"2020","unstructured":"Wang, T., et al.: Privacy-enhanced data collection based on deep learning for internet of vehicles. IEEE Trans. Ind. Inform. 16(10), 6663\u20136672 (2020)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"42_CR4","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1016\/j.future.2019.09.010","volume":"110","author":"H Wang","year":"2020","unstructured":"Wang, H., Ma, S., Dai, H.N., Imran, M., Wang, T.: Blockchain-based data privacy management with nudge theory in open banking. Futur. Gener. Comput. Syst. 110, 812\u2013823 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"42_CR5","doi-asserted-by":"crossref","unstructured":"Li, T., Liu, W., Wang, T., Zhao, M., Li, X., Ma, M.: Trust data collections via vehicles joint with unmanned aerial vehicles in the smart internet of things. Trans. Emerg. Telecommun. Technol. (2020)","DOI":"10.1002\/ett.3956"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Zhuo, C., Luo, S., Gan, H., Hu, J., Shi, Z.: Noise-aware DVFS for efficient transitions on battery-powered IoT devices. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 2019 (2019)","DOI":"10.1109\/TCAD.2019.2917844"},{"issue":"7","key":"42_CR7","doi-asserted-by":"publisher","first-page":"3255","DOI":"10.1109\/TVT.2012.2205284","volume":"61","author":"A Liu","year":"2012","unstructured":"Liu, A., Zheng, Z., Zhang, C., Chen, Z., Shen, X.: Secure and energy-efficient disjoint multi-path routing for WSNs. IEEE Trans. Veh. Technol. 61(7), 3255\u20133265 (2012)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11","key":"42_CR8","doi-asserted-by":"publisher","first-page":"1218","DOI":"10.1016\/j.jpdc.2007.04.014","volume":"67","author":"B Xiao","year":"2007","unstructured":"Xiao, B., Yu, B., Gao, C.: CHEMAS: identify suspect nodes in selective forwarding attacks. J. Parallel Distributed Comput. 67(11), 1218\u20131230 (2007)","journal-title":"J. Parallel Distributed Comput."},{"issue":"2","key":"42_CR9","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1007\/s11277-016-3802-y","volume":"93","author":"Y Yu","year":"2017","unstructured":"Yu, Y., Jia, Z., Tao, W., Xue, B., Lee, C.: An efficient trust evaluation scheme for node behavior detection in the internet of things. Wireless Pers. Commun. 93(2), 571\u2013587 (2017)","journal-title":"Wireless Pers. Commun."},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Hellaoui, H., Bouabdallah, A., Koudil, M.: TAS-IoT: trust-based adaptive security in the IoT. In: Proceedings of the 41st IEEE Conference on Local Computer Networks, Dubai UAE, pp. 599\u2013602 (2016)","DOI":"10.1109\/LCN.2016.101"},{"issue":"4","key":"42_CR11","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.2298\/CSIS110303056C","volume":"8","author":"D Chen","year":"2011","unstructured":"Chen, D., Chang, G., Sun, D., Li, J., Jia, J., Wang, X.: TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput. Sci. Inf. Syst. 8(4), 1207\u20131228 (2011)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Elkhodr, M., Alsinglawi, B.: Data provenance and trust establishment in the Internet of Things. Secur. Priv. 1\u201311 (2020)","DOI":"10.1002\/spy2.99"},{"issue":"3","key":"42_CR13","first-page":"30","volume":"10","author":"V Suryani","year":"2017","unstructured":"Suryani, V., Sulistyo, S., Widyawan, W.: ConTrust: a trust model to enhance the privacy in internet of things. Int. J. Intell. Eng. Syst. 10(3), 30\u201337 (2017)","journal-title":"Int. J. Intell. Eng. Syst."},{"key":"42_CR14","unstructured":"Carolina, V.L.M., Jo\u00e3o, H.K.: Mitigating on-off attacks in the internet of things using a distributed trust management scheme. Int. J. of Distrib. Sens. Netw. 1\u20138 (2015)"},{"issue":"4","key":"42_CR15","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1109\/TPDS.2014.2317719","volume":"26","author":"Y Chae","year":"2015","unstructured":"Chae, Y., DiPippo, L.C., Sun, Y.L.: Trust management for defending on-off attacks. IEEE Trans. Parallel Distrib. Syst. 26(4), 1178\u20131191 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"42_CR16","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.cose.2013.09.001","volume":"39","author":"YB Saied","year":"2013","unstructured":"Saied, Y.B., Olivereau, A., Zeghlache, D., Laurent, M.: Trust management system design for the Internet of Things: a context- aware and multi-service approach. Comput. Secur. 39, 351\u2013365 (2013)","journal-title":"Comput. Secur."},{"key":"42_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/6063456","volume":"2018","author":"J Caminha","year":"2018","unstructured":"Caminha, J., Perkusich, A., Perkusich, M.: A smart trust management method to detect on-off attacks in the internet of things. Secur. Commun. Netw. 2018, 1\u201310 (2018). https:\/\/doi.org\/10.1155\/2018\/6063456","journal-title":"Secur. Commun. Netw."},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Ambili, K.N., Jose, J.: Trust based Intrusion detection system to detect insider attacks in IoT systems. Inf. Sci. Appl., Cryptology ePrint (2019)","DOI":"10.1007\/978-981-15-1465-4_62"},{"issue":"3","key":"42_CR19","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"LA Adamic","year":"2003","unstructured":"Adamic, L.A., Adar, E.: Friends and neighbors on the web. Soc. Netw. 25(3), 211\u2013230 (2003). https:\/\/doi.org\/10.1016\/S0378-8733(03)00009-1","journal-title":"Soc. Netw."},{"key":"42_CR20","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.advengsoft.2013.12.007","volume":"69","author":"S Mirjalili","year":"2014","unstructured":"Mirjalili, S., Mirjalili, S.M., Lewis, A.: Grey wolf optimizer. Adv. Eng. Softw. 69, 46\u201361 (2014)","journal-title":"Adv. Eng. Softw."},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Abdo, M., Kamel, S., Ebeed, M., Yu, J, Jurado, F.: Solving non-smooth optimal power flow problems using a developed grey wolf optimizer. Energies (2018)","DOI":"10.3390\/en11071692"},{"key":"42_CR22","doi-asserted-by":"crossref","unstructured":"Rani, P., Kavita, Verma, S., Nguyen, G.N.: Mitigation of black hole and gray hole attack using swarm inspired algorithm with artificial neural network. IEEE Access (16 Jul 2020)","DOI":"10.1109\/ACCESS.2020.3004692"},{"key":"42_CR23","series-title":"Studies in Big Data","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/978-981-15-6044-6_11","volume-title":"Fog Data Analytics for IoT Applications","author":"S Mahapatra","year":"2020","unstructured":"Mahapatra, S., Singh, A.: Application of IoT-based smart devices in health care using fog computing. In: Tanwar, S. (ed.) Fog Data Analytics for IoT Applications. SBD, vol. 76, pp. 263\u2013278. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-6044-6_11"}],"container-title":["Communications in Computer and Information Science","Artificial Intelligence and Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21385-4_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T15:30:02Z","timestamp":1691595002000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21385-4_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031213847","9783031213854"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21385-4_42","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Data Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaids2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icaids.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"195","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}