{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T04:35:28Z","timestamp":1747802128273,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319160856"},{"type":"electronic","value":"9783319160863"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16086-3_11","type":"book-chapter","created":{"date-parts":[[2015,3,10]],"date-time":"2015-03-10T15:56:20Z","timestamp":1426002980000},"page":"135-145","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Improving Reliability and Endurance Using End-to-End Trust in Distributed Low-Power Sensor Networks"],"prefix":"10.1007","author":[{"given":"Jan","family":"Kantert","sequence":"first","affiliation":[]},{"given":"Sergej","family":"Wildemann","sequence":"additional","affiliation":[]},{"given":"Georg","family":"von Zengen","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Edenhofer","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Tomforde","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Wolf","sequence":"additional","affiliation":[]},{"given":"J\u00f6rg","family":"H\u00e4hner","sequence":"additional","affiliation":[]},{"given":"Christian","family":"M\u00fcller-Schloer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,11]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Busching, F., Pottner, W., Brokelmann, D., Von Zengen, G., Hartung, R., Hinz, K., Wolf, L.: A demonstrator of the GINSENG-approach to performance and closed loop control in WSNs. In: 2012 Ninth International Conference on Networked Sensing Systems (INSS), pp. 1\u20132 (June 2012)","DOI":"10.1109\/INSS.2012.6240572"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"B\u00fcsching, F., Kulau, U., Wolf, L.: Architecture and evaluation of inga - an inexpensive node for general applications. In: 2012 IEEE Sensors, pp. 842\u2013845. IEEE, Taipei, Taiwan (oct (2012)","DOI":"10.1109\/ICSENS.2012.6411295"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Busching, F., Bottazzi, M., Pottner, W.B., Wolf, L.: DT-WBAN: Disruption tolerant wireless body area networks in healthcare applications. In: the International Workshop on e-Health Pervasive Wireless Applications and Services (eHPWAS 2013). Lyon, France (October 2013)","DOI":"10.1109\/WiMOB.2013.6673361"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-Cognitive and Computational Model, vol. 18. John Wiley & Sons (2010)","DOI":"10.1002\/9780470519851"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Clausen, T., Jacquet, P.: RFC3626 Optimized Link State Routing Protocol (OLSR) (2003)","DOI":"10.17487\/rfc3626"},{"key":"11_CR6","unstructured":"Couto, D.S.J.D.: High-Throughput Routing for Multi-Hop Wireless Networks. Ph.D. thesis, Massachusetts Institute of Technology (2004)"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Dunkels, A., Gronvall, B., Voigt, T.: Contiki - a lightweight and flexible operating system for tiny networked sensors. In: LCN 20\u201904 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, pp. 455\u2013462. IEEE Computer Society, Washington, DC, USA (2004)","DOI":"10.1109\/LCN.2004.38"},{"issue":"3","key":"11_CR8","doi-asserted-by":"publisher","first-page":"15:1","DOI":"10.1145\/1362542.1362546","volume":"4","author":"S Ganeriwal","year":"2008","unstructured":"Ganeriwal, S., Balzano, L.K., Srivastava, M.B.: Reputation-based Framework for High Integrity Sensor Networks. ACM Trans. Sen. Netw. 4(3), 15:1\u201315:37 (2008)","journal-title":"ACM Trans. Sen. Netw."},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Gnawali, O., Levis, P.: The Minimum Rank with Hysteresis Objective Function. RFC 6719 (Proposed Standard) (September 2012). http:\/\/www.ietf.org\/rfc\/rfc6719.txt","DOI":"10.17487\/rfc6719"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Guo, C., Zhong, L.C., Rabaey, J.: Low power distributed MAC for ad hoc sensor radio networks. In: GLOBECOM 2001 IEEE Global Telecommunications Conference, vol. 5, pp. 2944\u20132948 (2001)","DOI":"10.1109\/GLOCOM.2001.965967"},{"key":"11_CR11","unstructured":"IEEE: IEEE Standard for Local and metropolitan area networks- Part 15.4: Low-Rate Wireless Personal Area Networks (LR-WPANs) (2011)"},{"issue":"1","key":"11_CR12","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/JETCAS.2013.2243032","volume":"3","author":"M Lazarescu","year":"2013","unstructured":"Lazarescu, M.: Design of a WSN platform for long-term environmental monitoring for IoT applications. IEEE Journal on Emerging and Selected Topics in Circuits and Systems 3(1), 45\u201354 (2013)","journal-title":"IEEE Journal on Emerging and Selected Topics in Circuits and Systems"},{"key":"11_CR13","unstructured":"Leligou, N., Sarakis, L., Trakadas, P., Gay, V., Georouleas, K.: Design Principles of Trust-aware Routing Protocol supporting Virtualization (2011), Deliverable D4.1"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan, T., Brown, J., B\u00fcsching, F., Cardoso, A., Cecelio, J., do O, J., Furtado, P., Gil, P., Jugel, A., P\u00f6ttner, W.B., Roedig, U., sa Silva, J., Silva, R., Sreenan, C., Vassiliou, V., T. Voigt and, L.W., Zinonos, Z.: The GINSENG System for Wireless Monitoring and Control: Design and Deployment Experiences. ACM Transactions on Sensor Networks (TOSN) 10(1) (November 2013)","DOI":"10.1145\/2529975"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Papadopoulos, G., Beaudaux, J., Gallais, A., Noel, T.: T-AAD: Lightweight traffic auto-adaptations for low-power MAC protocols. In: 2014 13th Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), pp. 79\u201386 (June 2014)","DOI":"10.1109\/MedHocNet.2014.6849108"},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Perkins, C., Royer, E.: Ad-hoc on-demand distance vector routing. In: Proceedings of the WMCSA 1999 Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 90\u2013100 (February 1999)","DOI":"10.1109\/MCSA.1999.749281"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Thubert, P.: Objective Function Zero for the Routing Protocol for Low-Power and Lossy Networks (RPL). RFC 6552 (Proposed Standard) (March 2012). http:\/\/www.ietf.org\/rfc\/rfc6552.txt","DOI":"10.17487\/rfc6552"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Tomforde, S., Prothmann, H., Branke, J., H\u00e4hner, J., Mnif, M., M\u00fcller-Schloer, C., Richter, U., Schmeck, H.: Observation and Control of Organic Systems. In: Organic Computing - A Paradigm Shift for Complex Systems, pp. 325\u2013338. Birkh\u00e4user (2011)","DOI":"10.1007\/978-3-0348-0130-0_21"},{"key":"11_CR19","unstructured":"Wang, Y., Vassileva, J.: Trust-Based Community Formation in Peer-to-Peer File Sharing Networks. In: Proc. on Web Intelligence, pp. 341\u2013348 (September 2004)"},{"key":"11_CR20","unstructured":"Winter, T., Thubert, P., Brandt, A., Hui, J., Kelsey, R., Levis, P., Pister, K., Struik, R., Vasseur, J., Alexander, R.: RPL: IPv6 Routing Protocol for Low-Power and Lossy Networks. RFC 6550 (Proposed Standard) (March 2012). http:\/\/www.ietf.org\/rfc\/rfc6550.txt"},{"issue":"2","key":"11_CR21","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TDSC.2011.58","volume":"9","author":"G Zhan","year":"2012","unstructured":"Zhan, G., Shi, W., Deng, J.: Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs. IEEE Transactions on Dependable and Secure Computing 9(2), 184\u2013197 (2012)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"11_CR22","unstructured":"\u00d6sterlind, F.: A Sensor Network Simulator for the Contiki OS. Tech. rep, Swedish Institute of Computer Science (May 2006)"}],"container-title":["Lecture Notes in Computer Science","Architecture of Computing Systems \u2013 ARCS 2015"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16086-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T20:49:04Z","timestamp":1747774144000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16086-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319160856","9783319160863"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16086-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"11 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}