{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T00:10:02Z","timestamp":1746144602301,"version":"3.40.4"},"publisher-location":"New Delhi","reference-count":16,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132217671"},{"type":"electronic","value":"9788132217688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-81-322-1768-8_49","type":"book-chapter","created":{"date-parts":[[2014,3,4]],"date-time":"2014-03-04T00:11:09Z","timestamp":1393891869000},"page":"553-564","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Bio-inspired Trusted Clustering for Mobile Pervasive Environment"],"prefix":"10.1007","author":[{"given":"Madhu Sharma","family":"Gaur","sequence":"first","affiliation":[]},{"given":"Bhaskar","family":"Pant","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,4]]},"reference":[{"issue":"3","key":"49_CR1","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser, M.: The computer for the 21st century. Sci. Am. 265(3), 94\u2013104 (1991)","journal-title":"Sci. Am."},{"issue":"4","key":"49_CR2","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","volume":"13","author":"H Cho","year":"2011","unstructured":"Cho, H., Swami, A., Chen, I.R.: A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13(4), 562\u2013583 (2011)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"49_CR3","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-specific protocol architecture for wireless mi-crosensor networks. IEEE Trans. Wireless Commun. 1(4), 660\u2013670 (2002)","journal-title":"IEEE Trans. Wireless Commun."},{"key":"49_CR4","unstructured":"Almenare, F., Marin, A., Campo, C., Garcia, R.C.: PTM: a pervasive trust management model for dynamic open environments. In: Proceedings of the 1st Workshop on Pervasive Security, Privacy and Trust, Boston, August 2004"},{"key":"49_CR5","doi-asserted-by":"crossref","unstructured":"Almenarez, F., Marin, A., Campo, C., Garcia, R.C.: TrustAC: trust-based access control for pervasive devices. In: Proceedings of the 2nd International Conference on Security in Pervasive Computing. pp. 225\u2013238, Boppard, Germany, April 2005","DOI":"10.1007\/11414360_22"},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Almenarez, F., Marin, A., Diaz, D., Sanchez, J.: Developing a model for trust management in pervasive devices. In: Proceedings of 4th IEEE Annual International Conference on Pervasive Computing and Communications. pp. 267\u2013271, Pisa, Italy, March 2006","DOI":"10.1109\/PERCOMW.2006.41"},{"key":"49_CR7","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1016\/j.comcom.2010.02.006","volume":"33","author":"J Lopez","year":"2010","unstructured":"Lopez, J., Roman, R., Agudo, I., Fernandez, C.G.: Trust Management Systems for Wireless Sensor Networks: Best Practices. Comput. Commun. 33, 1086\u20131093 (2010)","journal-title":"Comput. Commun."},{"issue":"2","key":"49_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"Bao, F., Chen, R., Chang, M., Cho, J.H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manage. 9(2), 169\u2013183 (2012)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"49_CR9","doi-asserted-by":"publisher","first-page":"2385","DOI":"10.1016\/j.comcom.2007.04.008","volume":"30","author":"MY Hsieh","year":"2007","unstructured":"Hsieh, M.Y., Huang, Y.M., Chao, H.C.: adaptive security design with malicious node detection in cluster-based sensor net-works. Comput. Commun. 30, 2385\u20132400 (2007)","journal-title":"Comput. Commun."},{"key":"49_CR10","doi-asserted-by":"publisher","first-page":"452","DOI":"10.1016\/j.jfranklin.2006.06.001","volume":"344","author":"O Bozorg Haddad","year":"2007","unstructured":"Bozorg Haddad, O., Afshar, A., Mari\u0144o, M.A., Adams, B.J.: Honey-bee mating optimization (HBMO) algorithm for optimal reservoir operation. J. Franklin Inst. 344, 452\u2013462 (2007)","journal-title":"J. Franklin Inst."},{"key":"49_CR11","doi-asserted-by":"publisher","first-page":"1502","DOI":"10.1016\/j.amc.2007.02.029","volume":"190","author":"M Fathian","year":"2007","unstructured":"Fathian, M., Amiri, B., Maroosi, A.: Application with honey-bee mating optimization algorithm on clustering. Appl. Math. Comput. 190, 1502\u20131513 (2007)","journal-title":"Appl. Math. Comput."},{"key":"49_CR12","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/S1005-8885(08)60271-X","volume":"32","author":"JL Li","year":"2009","unstructured":"Li, J.L., Gu, L.Z., Yang, Y.X.: A new trust management model for P2P networks. J. Beijing Univ. Posts Telecommun. 32, 71\u201374 (2009)","journal-title":"J. Beijing Univ. Posts Telecommun."},{"key":"49_CR13","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.csi.2010.01.003","volume":"32","author":"FG Marmol","year":"2010","unstructured":"Marmol, F.G., Perez, G.M.: Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Comput. Stand. Interfaces 32, 185\u2013196 (2010)","journal-title":"Comput. Stand. Interfaces"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Heinzelman, WR., Chandrakasan, A., Balakrishnan, H.: Energy-efficient communication protocol for wireless micro-sensor net-works. In: Proceedings of 33rd Hawaii International Conference on System Sciences. pp. 1\u201310 (2000)","DOI":"10.1109\/HICSS.2000.926982"},{"key":"49_CR15","unstructured":"IEEE Commun. Surv. Tutor. 562\u2013583 (2011)"},{"key":"49_CR16","unstructured":"M Wireless Conference (RAWCON\u201998), pp. 55\u201358 Aug 1998"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Third International Conference on Soft Computing for Problem Solving"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-1768-8_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T23:52:23Z","timestamp":1746143543000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-81-322-1768-8_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9788132217671","9788132217688"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-1768-8_49","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"4 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}