{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:33:23Z","timestamp":1743089603107,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319195773"},{"type":"electronic","value":"9783319195780"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-19578-0_33","type":"book-chapter","created":{"date-parts":[[2015,5,12]],"date-time":"2015-05-12T04:07:21Z","timestamp":1431403641000},"page":"406-415","source":"Crossref","is-referenced-by-count":16,"title":["On-Off Attacks Mitigation against Trust Systems in Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Nabila","family":"Labraoui","sequence":"first","affiliation":[]},{"given":"Mourad","family":"Gueroui","sequence":"additional","affiliation":[]},{"given":"Larbi","family":"Sekhri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"8","key":"33_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MCOM.2002.1024422","volume":"40","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Weilian, S., Sankarasubramaniam, Y., Cayirci, E.: A survey on sensor networks. IEEE Communications Magazine\u00a040(8), 102\u2013114 (2002)","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"33_CR2","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.istr.2008.10.011","volume":"13","author":"C. Krau","year":"2008","unstructured":"Krau, C., Schneider, M., Eckert, C.: On handling insider attacks in wireless sensor networks. Information Security Technical Report\u00a013(3), 165\u2013172 (2008)","journal-title":"Information Security Technical Report"},{"issue":"3","key":"33_CR3","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.jcss.2013.06.014","volume":"80","author":"G. Han","year":"2014","unstructured":"Han, G., Jiang, J., Shu, L., Niu, J., Chao, H.C.: Management and applications of trust in Wireless Sensor Networks: A survey. Journal of Computer and System Sciences\u00a080(3), 602\u2013617 (2014)","journal-title":"Journal of Computer and System Sciences"},{"issue":"1","key":"33_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s11235-013-9712-3","volume":"54","author":"N. Labraoui","year":"2013","unstructured":"Labraoui, N., Gueroui, M., Aliouat, M., Petit, J.: Reactive and adaptive monitoring to secure aggregation in wireless sensor networks. Telecommunication Systems\u00a054(1), 3\u201317 (2013)","journal-title":"Telecommunication Systems"},{"key":"33_CR5","doi-asserted-by":"publisher","first-page":"4343","DOI":"10.1016\/j.comcom.2008.05.007","volume":"31","author":"A. Boukerche","year":"2008","unstructured":"Boukerche, A., Ren, Y.: A trust-based security system for ubiquitous and pervasive computing environments. Computer Communications\u00a031, 4343\u20134351 (2008)","journal-title":"Computer Communications"},{"issue":"2","key":"33_CR6","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s11235-010-9281-7","volume":"46","author":"F.G. M\u00e1rmol","year":"2010","unstructured":"M\u00e1rmol, F.G., P\u00e9rez, G.M.: Providing trust in wireless sensor networks using a bio-inspired technique. Telecommunication Systems\u00a046(2), 163\u2013180 (2010)","journal-title":"Telecommunication Systems"},{"issue":"9","key":"33_CR7","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1016\/j.comcom.2010.02.006","volume":"33","author":"J. Lopez","year":"2010","unstructured":"Lopez, J., Roman, R., Agudo, I., Fernandez-Gago, C.: Trust management systems for wireless sensor networks: Best Practices. Computer Communications\u00a033(9), 1086\u20131093 (2010)","journal-title":"Computer Communications"},{"key":"33_CR8","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1007\/978-3-642-38323-6_5","volume-title":"Trust Management VII","author":"H. Alzaid","year":"2013","unstructured":"Alzaid, H., Alfaraj, M., Ries, S., J\u00f8sang, A., Albabtain, M., Abuhaimed, A.: Reputation-based trust systems for wireless sensor networks: A comprehensive review. In: Fern\u00e1ndez-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) Trust Management VII. IFIP AICT, vol.\u00a0401, pp. 66\u201382. Springer, Heidelberg (2013)"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. ACM Transactions on Sensor Networks (TOSN)\u00a04(3) (2008)","DOI":"10.1145\/1362542.1362546"},{"issue":"2","key":"33_CR10","first-page":"21","volume":"3","author":"H. Chen","year":"2009","unstructured":"Chen, H.: Task-based trust management for wireless sensor networks. International Journal of Security and Its Applications\u00a03(2), 21\u201326 (2009)","journal-title":"International Journal of Security and Its Applications"},{"issue":"11","key":"33_CR11","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"R.A. Shaikh","year":"2009","unstructured":"Shaikh, R.A., Jameel, H., d\u2019Auriol, B.J., Lee, H., Lee, S., Song, Y.J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems\u00a020(11), 1698\u20131712 (2009)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"4","key":"33_CR12","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/TITB.2012.2194788","volume":"16","author":"H. Daojing","year":"2012","unstructured":"Daojing, H., Chun, C., Chan, S., Bu, J., Vasilakos, A.V.: ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedecine\u00a016(4), 623\u2013632 (2012)","journal-title":"IEEE Transactions on Information Technology in Biomedecine"},{"issue":"2","key":"33_CR13","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.peva.2007.04.001","volume":"65","author":"Z. Liang","year":"2008","unstructured":"Liang, Z., Shi, W.: Analysis of recommendations on trust inference in open environment. Performance Evaluation\u00a065(2), 99\u2013128 (2008)","journal-title":"Performance Evaluation"},{"issue":"10","key":"33_CR14","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1109\/JPROC.2010.2059690","volume":"98","author":"H. Yu","year":"2010","unstructured":"Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D.: Survey of trust and reputation management systems in wireless communications. Proceeding of IEEE\u00a098(10), 1755\u20131772 (2010)","journal-title":"Proceeding of IEEE"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Bao, F., Chen, I.R., Chang, M.J., Cho, J.: Trust-Based Intrusion Detection in Wireless Sensor Networks. In: Proceedings of IEEE International Conference on Communications (ICC), pp. 1\u20136 (2011)","DOI":"10.1109\/icc.2011.5963250"},{"key":"33_CR16","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MCOM.2008.4473092","volume":"46","author":"Y.L. Sun","year":"2008","unstructured":"Sun, Y.L., Zhu, H., Liu, K.J.R.: Defense of Trust management vulnerabilities in distributed networks. IEEE Communication Magazine\u00a046, 112\u2013119 (2008)","journal-title":"IEEE Communication Magazine"}],"container-title":["IFIP Advances in Information and Communication Technology","Computer Science and Its Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-19578-0_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T23:37:20Z","timestamp":1558481840000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-19578-0_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319195773","9783319195780"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-19578-0_33","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]}}}