{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:22:25Z","timestamp":1745986945216,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642362514"},{"type":"electronic","value":"9783642362521"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36252-1_59","type":"book-chapter","created":{"date-parts":[[2013,2,9]],"date-time":"2013-02-09T09:16:01Z","timestamp":1360401361000},"page":"631-641","source":"Crossref","is-referenced-by-count":1,"title":["An Overview on Node Behavior Trust Evaluation in Ad Hoc Network"],"prefix":"10.1007","author":[{"given":"Min","family":"Yin","sequence":"first","affiliation":[]},{"given":"Jing","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Tang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"59_CR1","unstructured":"Zhan, G., Shi, W., Deng, J.: A Resilient Trust Model for WSNs. In: 7th International Conference on Embedded Networked Sensor Systems, Berkeley, California, USA, pp. 411\u2013412 (November 2009)"},{"key":"59_CR2","doi-asserted-by":"crossref","unstructured":"Zhang, M., Yang, B., Qi, Y.: Using Trust Metric to Detect Malicious Behaviors in WSNs. In: 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing, Qingdao, China, pp. 104\u2013108 (2007)","DOI":"10.1109\/SNPD.2007.562"},{"issue":"1","key":"59_CR3","first-page":"13","volume":"6","author":"C. Lin","year":"2008","unstructured":"Lin, C., Wang, Y., Tian, L.: Development of Trusted Network and Challenges It Faces. ZTE Communications\u00a06(1), 13\u201317 (2008)","journal-title":"ZTE Communications"},{"issue":"4","key":"59_CR4","first-page":"1329","volume":"3","author":"L. Tian","year":"2007","unstructured":"Tian, L., Lin, C., Ji, T.: Kind of Quantitative Evaluation of User Behaviour Trust Using AHP. Journal of Computational Information Systems\u00a03(4), 1329\u20131334 (2007)","journal-title":"Journal of Computational Information Systems"},{"key":"59_CR5","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decent Ralized Trust Agement. In: IEEE Symposium on Security and Privacy, Washington, pp. 164\u2013173 (1996)"},{"issue":"1","key":"59_CR6","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1504\/IJSSE.2008.018135","volume":"1","author":"E. Aivaloglou","year":"2008","unstructured":"Aivaloglou, E., Gritzalis, S.: Trust Establishment in Sensor Networks: Behaviour-based, Certificate-based and a Combinational Approach. International Journal of System of Systems Engineering\u00a01(1), 128\u2013148 (2008)","journal-title":"International Journal of System of Systems Engineering"},{"key":"59_CR7","doi-asserted-by":"publisher","first-page":"4343","DOI":"10.1016\/j.comcom.2008.05.007","volume":"31","author":"A. Boukerche","year":"2008","unstructured":"Boukerche, A., Ren, Y.: A Trust-based Security System for Ubiquitous and Pervasive Computing Environments. Computer Communications\u00a031, 4343\u20134351 (2008)","journal-title":"Computer Communications"},{"key":"59_CR8","doi-asserted-by":"crossref","unstructured":"Boukerche, A.: Algorithms and Protocols for Wireless Sensor Networks. Wiley-IEEE Press (October 2008) ISBN: 978-0-471-79813-2","DOI":"10.1002\/9780470396360"},{"issue":"3","key":"59_CR9","first-page":"82","volume":"31","author":"X.-B. Zhao","year":"2010","unstructured":"Zhao, X.-B., You, Z.-Y., Zhao, Z.-F.: Availability Based Trust Evaluation Model for MANET. Journal of Communications\u00a031(3), 82\u201388 (2010)","journal-title":"Journal of Communications"},{"key":"59_CR10","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: A Distributed Trust Model. In: New Security Paradigms Workshop, New York, pp. 48\u201360 (1998)","DOI":"10.1145\/283699.283739"},{"issue":"4","key":"59_CR11","first-page":"1","volume":"3","author":"T. Grandison","year":"2000","unstructured":"Grandison, T., Sloman, M.: A Survey of Trust in Internet Appllications. IEEE Communitions Surveys and Tutorials\u00a03(4), 1\u201315 (2000)","journal-title":"IEEE Communitions Surveys and Tutorials"},{"issue":"5","key":"59_CR12","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1049\/iet-com.2008.0324","volume":"3","author":"I. Maarouf","year":"2009","unstructured":"Maarouf, I., Baroudi, U., Naseer, A.R.: Efficient Monitoring Approach for Reputation System-based Trust-aware Routing in Wireless Sensor Networks. IET Communications\u00a03(5), 846\u2013858 (2009)","journal-title":"IET Communications"},{"key":"59_CR13","doi-asserted-by":"crossref","unstructured":"Tian, L.-Q., Ni, Y., Lin, C.: Node Behavior Trust Evaluation Based on Behavior Evidence in WSNs. In: 2nd International Conference on Future Computer and Communication (ICFCC), pp. V1-312\u2013V1-317 (2010)","DOI":"10.1109\/ICFCC.2010.5497781"},{"key":"59_CR14","doi-asserted-by":"crossref","unstructured":"Halim, I.T.A., Fahmy, H.M.A., El-Din, A.M.B., El-Shafey, M.H.: Agent-based Trusted On-Demand Routing Protocol for Mobile Ad-hoc Networks. In: 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), pp. 1\u20138 (2010)","DOI":"10.1109\/WICOM.2010.5601200"},{"issue":"4","key":"59_CR15","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1049\/iet-ifs.2009.0140","volume":"4","author":"X. Li","year":"2010","unstructured":"Li, X., Jia, Z., Zhang, P., Zhang, R., Wang, H.: Trust-based On-demand Multipath Routing in Mobile Ad Hoc Network. IET Information Security\u00a04(4), 212\u2013232 (2010)","journal-title":"IET Information Security"},{"key":"59_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"478","DOI":"10.1007\/11814856_46","volume-title":"Wireless Algorithms, Systems, and Applications","author":"C. Weifang","year":"2006","unstructured":"Weifang, C., Xiangke, L., Changxiang, S., Shanshan, L., Shaoliang, P.: A Trust-Based Routing Framework in Energy-Constrained Wireless Sensor Networks. In: Cheng, X., Li, W., Znati, T. (eds.) WASA 2006. LNCS, vol.\u00a04138, pp. 478\u2013489. Springer, Heidelberg (2006)"},{"key":"59_CR17","unstructured":"Pirzada, A., McDonald, C.: Establishing Trust in Pure Ad-Hoc Nnetworks. In: 27th Australasian Conference on Computer Science (ACSC 2004), pp. 54\u201363 (2004)"},{"key":"59_CR18","doi-asserted-by":"crossref","unstructured":"Yu, L., Qian, C., Liu, Z., Wang, K., Dai, B.: Ad-hoc Multi-dimensional Trust Evaluation Model Based on Classification of Service. In: 5th International ICST Conference on Communications and Networking in China (CHINACOM), pp. 1\u20135 (2010)","DOI":"10.4108\/chinacom.2010.37"},{"key":"59_CR19","doi-asserted-by":"crossref","unstructured":"Karthik, N., Dhulipala, V.R.S.: Trust Calculation in Wireless Sensor Networks. In: 3rd International Conference on Electronics Computer Technology (ICECT), pp. 376\u2013380 (2011)","DOI":"10.1109\/ICECTECH.2011.5941924"},{"key":"59_CR20","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., Srivastava, M.B.: Reputation-Based Framework for High Integrity Sensor Networks. In: ACM Workshop Security of Ad Hoc and Sensor Networks (SASN 2004), pp. 66\u201367 (October 2004)","DOI":"10.1145\/1029102.1029115"},{"key":"59_CR21","doi-asserted-by":"crossref","unstructured":"Zhou, Q., Li, L., Wang, S., Xu, S., Tan, W.: A Novel Approach to Manage Trust in Ad Hoc Networks. In: International Conference on Convergence Information Technology, pp. 295\u2013300 (2007)","DOI":"10.1109\/ICCIT.2007.118"},{"key":"59_CR22","doi-asserted-by":"crossref","unstructured":"Arijit, U.: Secure Trust Management in Distributed Computing Systems. In: 6th IEEE International Symposium on Electronic Design, Test and Application (DELTA), pp. 116\u2013121 (2011)","DOI":"10.1109\/DELTA.2011.29"},{"issue":"2","key":"59_CR23","first-page":"305","volume":"24","author":"Y. Sun","year":"2006","unstructured":"Sun, Y., Yu, W., Han, Z., Ray Liu, K.J.: Information Theoretic Framework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks\u00a024(2), 305\u2013317 (2006)","journal-title":"IEEE JSAC Special Issue on Security in Wireless Ad Hoc Networks"},{"key":"59_CR24","doi-asserted-by":"crossref","unstructured":"Ishmanov, F., Kim, S.W.: A Secure Trust Establishment in Wireless Sensor Networks. In: International Conference on Electrical Engineering and Informatics (ICEEI), pp. 1\u20136 (2011)","DOI":"10.1109\/ICEEI.2011.6021517"},{"issue":"7","key":"59_CR25","doi-asserted-by":"publisher","first-page":"1716","DOI":"10.3724\/SP.J.1001.2008.01716","volume":"19","author":"Q. Jing","year":"2008","unstructured":"Jing, Q., Tang, L.-Y., Chen, Z.: Trust Management in Wireless Sensor Networks. Journal of Software\u00a019(7), 1716\u20131730 (2008)","journal-title":"Journal of Software"},{"key":"59_CR26","unstructured":"Yao, Z.Y., Kim, D.Y., Lee, I., et al.: A Securiy Framework with Trust Managent for Sensor Networks. In: 1st IEEE\/CREARE-NET Workshop on Security and Qos in Communication Networks, Athens, pp. 190\u2013198 (2005)"},{"key":"59_CR27","doi-asserted-by":"crossref","unstructured":"Probst, M.J., Kasera, S.K.: Statistiical Trust Establishment in Wireless Sensor Networks. In: 13th International Conference on Parallel and Distributed Systems, pp. 1\u20138 (2007)","DOI":"10.1109\/ICPADS.2007.4447736"},{"key":"59_CR28","doi-asserted-by":"crossref","unstructured":"Ni, Y., Tian, L., Shen, X., Guo, S.: Behavior Trust Evaluation for Node in WSNs with Fuzzy-ANP Method. In: 2nd International Conference on Computer Engineering and Technology (ICCET), pp.V1-299\u2013V1-303 (2010)","DOI":"10.1109\/ICCET.2010.5486146"},{"issue":"5","key":"59_CR29","first-page":"1","volume":"31","author":"S.-L. Chen","year":"2010","unstructured":"Chen, S.-L., Zhang, Y.-Q.: Robust Multi-dimensional Trust Model for Improving the Survivability of Ad Hoc Networks. Journal of Communications\u00a031(5), 1\u20139 (2010)","journal-title":"Journal of Communications"},{"key":"59_CR30","doi-asserted-by":"crossref","unstructured":"Bin, M.: Cross-layer Trust Model and Algorithm of Node Selection in Wireless Sensor Networks. In: International Conference on Communication Software and Networks, Washington, DC, pp. 812\u2013815 (2009)","DOI":"10.1109\/ICCSN.2009.67"},{"key":"59_CR31","doi-asserted-by":"crossref","unstructured":"Jiang, X., Lin, C., Yin, H., Chen, Z., Su, L.: Game-based Trust Establishment for Mobile Ad Hoc Networks. In: WRI International Conference on Communications and Mobile Computing (CMC 2009), pp. 475\u2013479 (2009)","DOI":"10.1109\/CMC.2009.21"},{"key":"59_CR32","doi-asserted-by":"crossref","unstructured":"Dai, H., Jia, Z., Dong, X.: An Entropy-based Trust Modeling and Evaluation for Wireless Sensor Networks. In: International Conference on Embedded Software and Systems, pp. 27\u201334 (2008)","DOI":"10.1109\/ICESS.2008.31"},{"issue":"2","key":"59_CR33","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","volume":"24","author":"G. Theodorakopoulos","year":"2006","unstructured":"Theodorakopoulos, G., Baras, S.: On Trust Models and Trust Evaluation Metrics for Ad hoc Networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 318\u2013328 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"4","key":"59_CR34","doi-asserted-by":"publisher","first-page":"805","DOI":"10.3724\/SP.J.1016.2009.00805","volume":"32","author":"C. Fu","year":"2009","unstructured":"Fu, C., Hong, L., Peng, B., Han, L.-S., Xu, L.-F.: Incomplete Information Nodes Risk Assessment in Mobile Ad Hoc Networks. Chinese Journal of Computers\u00a032(4), 805\u2013816 (2009)","journal-title":"Chinese Journal of Computers"},{"key":"59_CR35","unstructured":"Marmol, F.G., Perez, G.M.: Providing Trust in Wireless Sensor Networks Using a Bio-inspired Technique. In: Networking and Electronic Commerce Research Conference (NAEC 2008), Lake Garda, pp. 25\u201328 (2008)"},{"key":"59_CR36","doi-asserted-by":"crossref","unstructured":"Samavati, H., Ladani, B.T., Moodi, H.: AMLeT: Adaptive Multi Level Trust framework for MANETs. In: International Symposium on Computer Networks and Distributed Systems (CNDS), pp. 152\u2013157 (2011)","DOI":"10.1109\/CNDS.2011.5764563"},{"issue":"5","key":"59_CR37","first-page":"428","volume":"30","author":"T. Huang","year":"2010","unstructured":"Huang, T., Li, X.: An Trust Management Scheme for Sensor Networks. Journal of Guilin University of Electronic Technology\u00a030(5), 428\u2013431 (2010)","journal-title":"Journal of Guilin University of Electronic Technology"},{"issue":"5","key":"59_CR38","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1049\/iet-com.2008.0324","volume":"3","author":"I. Maarouf","year":"2009","unstructured":"Maarouf, I., Baroudi, U., Naseer, A.R.: Efficient Monitoring Approach for Reputation System-based Trust-aware Routing in Wireless Sensor Networks. IET Communications\u00a03(5), 846\u2013858 (2009)","journal-title":"IET Communications"}],"container-title":["Communications in Computer and Information Science","Advances in Wireless Sensor Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36252-1_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T20:30:42Z","timestamp":1745958642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36252-1_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642362514","9783642362521"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36252-1_59","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}