{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:20Z","timestamp":1763468120635},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642397004"},{"type":"electronic","value":"9783642397011"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39701-1_14","type":"book-chapter","created":{"date-parts":[[2013,7,4]],"date-time":"2013-07-04T14:19:31Z","timestamp":1372947571000},"page":"163-174","source":"Crossref","is-referenced-by-count":2,"title":["A Trustworthiness Evaluation Method for Wireless Sensor Nodes Based on D-S Evidence Theory"],"prefix":"10.1007","author":[{"given":"Chenglin","family":"Miao","sequence":"first","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Weijie","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hongli","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Tolle, G., Polastre, J., Szewczyk, R., Turner, N., Tu, K., Burgess, S., Gay, D.: A Macroscope in the Redwoods. In: SenSys. 2005 (2005)","DOI":"10.1145\/1098918.1098925"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Xing, K., Liu, F., Cheng, X., Du, D.H.C.: Real-time detection of clone attacks in wireless sensor networks. In: Proceedings of IEEE ICDCS, Beijing, China (2008)","DOI":"10.1109\/ICDCS.2008.55"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Magistretti, E., Gurewitz, O., Knightly, E.: Inferring and mitigating a links hindering transmissions in managed 802.11 wireless networks. In: Proceedings of ACM MobiCom, Chicago, Illinois, USA (2010)","DOI":"10.1145\/1859995.1860030"},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1109\/TNET.2011.2170584","volume":"20","author":"X. Wang","year":"2011","unstructured":"Wang, X., Fu, L., Hu, C.: Multicast performance with hierarchical cooperation. IEEE\/ACM Transactions on Networking\u00a020, 917\u2013930 (2011)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1138127.1138128","volume":"2","author":"T. He","year":"2006","unstructured":"He, T., et al.: VigilNet. An Integrated Sensor Network System for Energy-Efficient Surveillance. ACM Transactions on Sensor Networks\u00a02, 1\u201338 (2006)","journal-title":"ACM Transactions on Sensor Networks"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"38","author":"Dempster","year":"1967","unstructured":"Dempster: Upper and lower probabilities induced by multivalued mapping. Annals of Mathematical Statistics\u00a038(2), 325\u2013339 (1967)","journal-title":"Annals of Mathematical Statistics"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Shafer, Glenn: A Mathematical Theory of Evidence. Princeton University Press (1976)","DOI":"10.1515\/9780691214696"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Momani, M., Challa, S., Alhmouz, R.: Bayesian Fusion Algorithm for Inferring Trust in Wireless Sensor Networks. Journal of Networks\u00a05(7) (July 2010)","DOI":"10.4304\/jnw.5.7.815-822"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Ma, Q., Liu, K., Miao, X., Liu, Y.: Sherlock is Around: Detecting Network Failures with Local Evidence Fusion. In: INFOCOM (2012)","DOI":"10.1109\/INFCOM.2012.6195826"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Momani, M., Aboura, K., Challa, S.: RBATMWSN. Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks. In: The Third International Conference on Intelligent Sensors, Sensor Networks and Information, Melbourne, Australia (2007)","DOI":"10.1109\/ISSNIP.2007.4496868"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Ba, S., Pavlou, P.A.: Evidence of the effect of trust building technology in electronic markets: price premiums and buyer behavior. MIS Quarterly\u00a026 (2002)","DOI":"10.2307\/4132332"},{"key":"14_CR12","unstructured":"Marsh, S.: Formalising Trust as a Computational Concept. In: Departmet of Computer Science and Mathematics. PhD, University of Stirling, p. 184 (1994)"},{"key":"14_CR13","unstructured":"McKnight, D.H., Chervany, N.L.: Conceptualizing Trust: A Typology and Ecommerce Customer Relationships Model. Presented at Proceedings of the 34th Hawaii International Conference on System Sciences (2001)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Srinivasan, A., Teitelbaum, J., Wu, J.: DRBTS. Distributed Reputation-based Beacon Trust System. In: 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing (2006)","DOI":"10.1109\/DASC.2006.28"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1145\/1066100.1066103","volume":"52","author":"N.H. Li","year":"2005","unstructured":"Li, N.H., Mitchell, J.C., Winsborough, W.H.: Beyond Proof-of-Compliance: Security Analysis in Trust Management. J. ACM\u00a052, 474\u2013514 (2005)","journal-title":"J. ACM"},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.csi.2010.01.003","volume":"32","author":"F.G. Marmol","year":"2010","unstructured":"Marmol, F.G., Perez, G.M.: Towards Pre-standardization of Trust and Reputation Models for Distributed and Heterogeneous Systems. Comput. Stand. Interfaces\u00a032, 185\u2013196 (2010)","journal-title":"Comput. Stand. Interfaces"},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1016\/j.comcom.2010.02.006","volume":"33","author":"J. Lopez","year":"2010","unstructured":"Lopez, J., Roman, R., Agudo, I.: Trust Management Systems for Wireless Sensor Networks: Best Practices. Comput. Commun.\u00a033, 1086\u20131093 (2010)","journal-title":"Comput. Commun."},{"key":"14_CR18","first-page":"2786","volume":"31","author":"J.L. Li","year":"2009","unstructured":"Li, J.L., Gu, L.Z., Yang, Y.X.: A New Trust Management Model for P2P Networks with Time Self-Decay and Subjective Expect. J. Electron. Inf. Technol.\u00a031, 2786\u20132790 (2009)","journal-title":"J. Electron. Inf. Technol."},{"key":"14_CR19","unstructured":"http:\/\/www.ncdc.noaa.gov\/oa\/climate\/research\/ushcn\/daily.html"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39701-1_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,27]],"date-time":"2022-02-27T10:42:18Z","timestamp":1645958538000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39701-1_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642397004","9783642397011"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39701-1_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}