{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:25:04Z","timestamp":1725809104217},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319116280"},{"type":"electronic","value":"9783319116297"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11629-7_5","type":"book-chapter","created":{"date-parts":[[2014,11,14]],"date-time":"2014-11-14T05:24:01Z","timestamp":1415942641000},"page":"34-40","source":"Crossref","is-referenced-by-count":0,"title":["Acknowledgement-Based Trust Framework for Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"X.","family":"Anita","sequence":"first","affiliation":[]},{"given":"J. Martin Leo","family":"Manickam","sequence":"additional","affiliation":[]},{"given":"M. A.","family":"Bhagyaveni","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"5_CR1","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/SURV.2009.090205","volume":"11","author":"X. Chen","year":"2009","unstructured":"Chen, X., Makki, K., Yen, K., Pissinou, N.: Sensor Network Security: A Survey. IEEE Communications Surveys & Tutorials\u00a011(2), 52\u201373 (2009)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"2","key":"5_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.2006.315852","volume":"8","author":"Y. Wang","year":"2006","unstructured":"Wang, Y., Attebury, G., Ramamurthy, B.: A Survey of Security Issues in Wireless Sensor Networks. IEEE Communication Surveys and Tutorials\u00a08(2), 2\u201323 (2006)","journal-title":"IEEE Communication Surveys and Tutorials"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Yu, Y., Li, K., Zhou, W., Li, P.: Trust Mechanisms in Wireless Sensor Networks: Attack Analysis and Countermeasures. Journal of Network and Computer Applications, 867\u2013880 (2012)","DOI":"10.1016\/j.jnca.2011.03.005"},{"issue":"1","key":"5_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1592451.1592452","volume":"42","author":"K. Hoffman","year":"2009","unstructured":"Hoffman, K., Zage, D., Rotaru, C.N.: A Survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys\u00a042(1), 1\u201331 (2009)","journal-title":"ACM Computing Surveys"},{"issue":"2-3","key":"5_CR5","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C. Karlof","year":"2003","unstructured":"Karlof, C., Wagner, D.: Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures. Journal on Elsevier\u2019s Ad Hoc Networks, Special Issue on Sensor Network Applications and Protocols\u00a01(2-3), 293\u2013315 (2003)","journal-title":"Journal on Elsevier\u2019s Ad Hoc Networks, Special Issue on Sensor Network Applications and Protocols"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Momani, M., Challa, S., Alhmouz, R.: Can We Trust Trusted Nodes in Wireless Sensor Networks? In: Proceedings of the International Conference on Computer and Communication Engineering, pp. 1227\u20131232 (2008)","DOI":"10.1109\/ICCCE.2008.4580801"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Srivatsava, M.B.: Reputation-Based Framework for High Integrity Sensor Networks. In: Proc. ACM Workshop Security of Ad Hoc and Sensor Networks, p. 66 (2004)","DOI":"10.1145\/1029102.1029115"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"2413","DOI":"10.1016\/j.comcom.2007.04.022","volume":"30","author":"A. Boukerche","year":"2007","unstructured":"Boukerche, A., Li, X., EL-Khatib, K.: Trust-Based Security for Wireless Ad Hoc and Sensor Networks. Computer Comm.\u00a030, 2413\u20132427 (2007)","journal-title":"Computer Comm."},{"issue":"11","key":"5_CR9","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"R. Ahmed","year":"2009","unstructured":"Ahmed, R., Jameel, H., d\u2019Auriol, B.J., Lee, H., Lee, S., Song, Y.-J.: Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks. IEEE Transactions on Parallel and Distributed Systems\u00a020(11), 1698\u20131712 (2009)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Rahhali, H.A., Ali, I.A., Shaheen, S.I.: A Novel Trust-Based Cross-Layer Model for Wireless Sensor Networks. In: 28th National Radio Science Conference, vol.\u00a0C5, pp. 1\u201310 (2011)","DOI":"10.1109\/NRSC.2011.5873629"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Perkin, C.E., Royer, E.M.: Ad Hoc On Demand Distance Vector Routing. In: Second IEEE Workshop on Mobile Computing, Systems and Applications, pp. 90\u2013100 (1999)","DOI":"10.1109\/MCSA.1999.749281"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Signal Processing and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11629-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T12:17:58Z","timestamp":1559045878000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11629-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319116280","9783319116297"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11629-7_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2014]]}}}