{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T00:43:28Z","timestamp":1758588208018,"version":"3.44.0"},"publisher-location":"Singapore","reference-count":37,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811674754"},{"type":"electronic","value":"9789811674761"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-7476-1_21","type":"book-chapter","created":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T11:09:50Z","timestamp":1635592190000},"page":"230-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Trust Evaluation Mechanism of Service Nodes Based on Blockchain"],"prefix":"10.1007","author":[{"given":"Wen","family":"Feng","sequence":"first","affiliation":[]},{"given":"Jieren","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Yuan","sequence":"additional","affiliation":[]},{"given":"Xinbin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yuqing","family":"Kou","sequence":"additional","affiliation":[]},{"given":"Yuanshen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiulai","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,31]]},"reference":[{"issue":"2020","key":"21_CR1","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.future.2020.01.023","volume":"106","author":"YH Liu","year":"2020","unstructured":"Liu, Y.H., Zhang, S.: Information security and storage of Internet of Things based on block chains. Future Gener. Comput. Syst. 106(2020), 296\u2013303 (2020)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"publisher","unstructured":"Sultan, S., Javaid, Q., Malik, A.J., et al.: Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks. Environ. Dev. Sustain. 1\u201319 (2021). https:\/\/doi.org\/10.1007\/s10668-021-01632-5","key":"21_CR2","DOI":"10.1007\/s10668-021-01632-5"},{"issue":"8","key":"21_CR3","doi-asserted-by":"publisher","first-page":"2139","DOI":"10.1109\/TIFS.2019.2894027","volume":"14","author":"SS Desai","year":"2019","unstructured":"Desai, S.S., Nene, M.J.: Node-level trust evaluation in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 14(8), 2139\u20132152 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"doi-asserted-by":"crossref","unstructured":"Wu, X., Liang, J.: A blockchain-based trust management method for internet of things. Pervasive Mob. Comput. 72, 101330 (2021)","key":"21_CR4","DOI":"10.1016\/j.pmcj.2021.101330"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1016\/j.future.2019.02.004","volume":"96","author":"RW Anwar","year":"2019","unstructured":"Anwar, R.W., Zainal, A., Outay, F., et al.: BTEM: belief based trust evaluation mechanism for wireless sensor networks. Future Gener. Comput. Syst. 96, 605\u2013616 (2019)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Desai, S.S., Nene, M.J.: Multihop trust evaluation using memory integrity in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 16, 4092\u20134100 (2021)","key":"21_CR6","DOI":"10.1109\/TIFS.2021.3101051"},{"issue":"1","key":"21_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13677-020-00202-w","volume":"9","author":"W Mo","year":"2020","unstructured":"Mo, W., Wang, T., Zhang, S., et al.: An active and verifiable trust evaluation approach for edge computing. J. Cloud Comput. 9(1), 1\u201319 (2020)","journal-title":"J. Cloud Comput."},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"184133","DOI":"10.1109\/ACCESS.2019.2960609","volume":"7","author":"TH Kim","year":"2019","unstructured":"Kim, T.H., Goyat, R., Rai, M.K., et al.: A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access 7, 184133\u2013184144 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"21_CR9","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1109\/TCSS.2019.2956629","volume":"7","author":"J Hu","year":"2020","unstructured":"Hu, J., Yang, K., Wang, K., et al.: A blockchain-based reward mechanism for mobile crowdsensing. IEEE Trans. Comput. Soc. Syst. 7(1), 178\u2013191 (2020)","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"doi-asserted-by":"publisher","unstructured":"Gan, C., Saini, A., Zhu, Q., et al.: Blockchain-based access control scheme with incentive mechanism for eHealth systems: patient as supervisor. Multimedia Tools Appl. 1\u201317 (2020).https:\/\/doi.org\/10.1007\/s11042-020-09322-6","key":"21_CR10","DOI":"10.1007\/s11042-020-09322-6"},{"issue":"7","key":"21_CR11","doi-asserted-by":"publisher","first-page":"5926","DOI":"10.1109\/JIOT.2020.3032544","volume":"8","author":"W Zhang","year":"2020","unstructured":"Zhang, W., Lu, Q., Yu, Q., et al.: Blockchain-based federated learning for device failure detection in industrial IoT. IEEE Internet Things J. 8(7), 5926\u20135937 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"21_CR12","doi-asserted-by":"publisher","first-page":"6553","DOI":"10.1109\/TII.2019.2963728","volume":"16","author":"J Huang","year":"2020","unstructured":"Huang, J., Kong, L., Dai, H.N., et al.: Blockchain-based mobile crowd sensing in industrial systems. IEEE Trans. Industr. Inf. 16(10), 6553\u20136563 (2020)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"1","key":"21_CR13","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TWC.2018.2885266","volume":"18","author":"M Liu","year":"2018","unstructured":"Liu, M., Yu, F.R., Teng, Y., et al.: Distributed resource allocation in blockchain-based video streaming systems with mobile edge computing. IEEE Trans. Wireless Commun. 18(1), 695\u2013708 (2018)","journal-title":"IEEE Trans. Wireless Commun."},{"doi-asserted-by":"crossref","unstructured":"Cui, Y., Qian, Q., Guo, C., et al.: Towards DDoS detection mechanisms in software-defined networking. J. Netw. Comput. Appl. 68 (2021)","key":"21_CR14","DOI":"10.1016\/j.jnca.2021.103156"},{"key":"21_CR15","first-page":"1","volume":"88","author":"M Wang","year":"2019","unstructured":"Wang, M., Lu, Y., Qin, J.: A dynamic MLP-based DDoS attack detection method using feature selection and feedback. Comput. Secur. 88, 1\u201314 (2019)","journal-title":"Comput. Secur."},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.compind.2021.103497","volume":"131","author":"M Kejriwal","year":"2021","unstructured":"Kejriwal, M., Shen, K., Ni, C.C., et al.: An evaluation and annotation methodology for product category matching in e-commerce. Comput. Ind. 131, 1\u201312 (2021)","journal-title":"Comput. Ind."},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2021.108005","volume":"191","author":"S Brotsis","year":"2021","unstructured":"Brotsis, S., Limniotis, K., Bendiab, G., et al.: On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance. Comput. Netw. 191, 1\u201329 (2021)","journal-title":"Comput. Netw."},{"key":"21_CR18","first-page":"1","volume":"191","author":"A Yw","year":"2021","unstructured":"Yw, A., Zw, B., Ym, C., et al.: Deep reinforcement learning for blockchain in industrial IoT: a Survey. Comput. Netw. 191, 1\u201315 (2021)","journal-title":"Comput. Netw."},{"doi-asserted-by":"crossref","unstructured":"Wang, H., He, D., Yu, J., et al.: RDIC: a blockchain-based remote data integrity checking scheme for IoT in 5G networks. J. Parallel Distrib. Comput. 152, 1\u201310 (2021)","key":"21_CR19","DOI":"10.1016\/j.jpdc.2021.02.012"},{"issue":"3","key":"21_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.im.2020.103316","volume":"58","author":"A Perdana","year":"2021","unstructured":"Perdana, A., Robb, A., Balachandran, V., et al.: Distributed ledger technology: its evolutionary path and the road ahead. Inf. Manage. 58(3), 1\u201315 (2021)","journal-title":"Inf. Manage."},{"doi-asserted-by":"crossref","unstructured":"Gimenez-Aguilar, M., Fuentes, J.M.D., Gonzalez-Manzano, L., et al.: Achieving cybersecurity in blockchain-based systems: a survey. Future Gener. Comput. Syst. 124(6), 91\u2013118 (2021)","key":"21_CR21","DOI":"10.1016\/j.future.2021.05.007"},{"key":"21_CR22","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.future.2021.05.025","volume":"124","author":"N Truong","year":"2021","unstructured":"Truong, N., Lee, G.M., Sun, K., et al.: A blockchain-based trust system for decentralised applications: when trustless needs trust. Future Generation Comput. Syst. 124, 68\u201379 (2021)","journal-title":"Future Generation Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Maesa, D., Mori, P.: Blockchain 3.0 applications survey. J. Parallel Distrib. Comput. 138, 99\u2013114 (2020)","key":"21_CR23","DOI":"10.1016\/j.jpdc.2019.12.019"},{"issue":"10","key":"21_CR24","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/j.comcom.2020.12.028","volume":"169","author":"AI Sanka","year":"2021","unstructured":"Sanka, A.I., Irfan, M., Huang, I., et al.: A survey of breakthrough in blockchain technology: adoptions, applications, challenges and future research. Comput. Commun. 169(10), 179\u2013201 (2021)","journal-title":"Comput. Commun."},{"doi-asserted-by":"crossref","unstructured":"Kumar, R.L., Pham, Q.V., Khan, F., et al.: Blockchain for securing aerial communications: potentials, solutions, and research directions. Phys. Commun. 47(9), (2021)","key":"21_CR25","DOI":"10.1016\/j.phycom.2021.101390"},{"key":"21_CR26","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.future.2021.05.035","volume":"124","author":"Z Zhou","year":"2021","unstructured":"Zhou, Z., Wang, M., Yang, C.N., et al.: Blockchain-based decentralized reputation system in E-commerce environment. Future Generation Comput. Syst. 124, 155\u2013167 (2021)","journal-title":"Future Generation Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Wang, J., Wei, B., Zhang, J., et al.: An optimized transaction verification method for trustworthy blockchain-enabled IIoT. Ad Hoc Netw. 119(1) (2021)","key":"21_CR27","DOI":"10.1016\/j.adhoc.2021.102526"},{"issue":"2","key":"21_CR28","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MCE.2018.2880806","volume":"8","author":"KR Ozyilmaz","year":"2019","unstructured":"Ozyilmaz, K.R., Yurdakul, A.: Designing a blockchain-based IoT with Ethereum, swarm, and LoRa: the software solution to create high availability with minimal security risks. IEEE Cons. Electron. Mag. 8(2), 28\u201334 (2019)","journal-title":"IEEE Cons. Electron. Mag."},{"doi-asserted-by":"crossref","unstructured":"Botello, J.V., Mesa, A.P., Rodr\u00edguez, F.A., et al.: BlockSIEM: protecting smart city services through a blockchain-based and distributed SIEM. Sensors 20(16) (2020)","key":"21_CR29","DOI":"10.3390\/s20164636"},{"key":"21_CR30","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.comcom.2021.03.008","volume":"172","author":"AL Vivar","year":"2021","unstructured":"Vivar, A.L., Orozco, A., Villalba, L.: A security framework for Ethereum smart contracts. Comput. Commun. 172, 119\u2013129 (2021)","journal-title":"Comput. Commun."},{"issue":"1","key":"21_CR31","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10916-018-1121-4","volume":"43","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Ding, S., Xu, Z., Zheng, H., Yang, S.S.: Blockchain-Based medical records secure storage and medical service framework. J. Med. Syst. 43(1), 5\u201314 (2019)","journal-title":"J. Med. Syst."},{"key":"21_CR32","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng, Z., Xie, S., Dai, H.-N., et al.: An overview on smart contracts: challenges, advances and platforms. Future Generation Comput. Syst. 105, 475\u2013491 (2020)","journal-title":"Future Generation Comput. Syst."},{"key":"21_CR33","first-page":"1","volume":"174","author":"A Vacca","year":"2020","unstructured":"Vacca, A., Sorbo, A.D., Visaggio, C.A., et al.: A systematic literature review of blockchain and smart contract development: techniques, tools, and open challenges. J. Syst. Softw. 174, 1\u201319 (2020)","journal-title":"J. Syst. Softw."},{"issue":"2","key":"21_CR34","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","volume":"6","author":"PJ Taylor","year":"2020","unstructured":"Taylor, P.J., Dargahi, T., Dehghantanha, A., et al.: A systematic literature review of blockchain cyber security. Digital Commun. Netw. 6(2), 147\u2013156 (2020)","journal-title":"Digital Commun. Netw."},{"doi-asserted-by":"crossref","unstructured":"Almasoud, A.S., Hussain, F.K., Hussain, O.K.: Smart contracts for blockchain-based reputation systems: a systematic literature review. J. Netw. Comput. Appl. 170 (2020)","key":"21_CR35","DOI":"10.1016\/j.jnca.2020.102814"},{"doi-asserted-by":"crossref","unstructured":"Sun, T., Yu, W.: A formal verification framework for security issues of blockchain smart contracts. Electronics 9(2), 1\u201323 (2020)","key":"21_CR36","DOI":"10.3390\/electronics9020255"},{"issue":"10","key":"21_CR37","doi-asserted-by":"publisher","first-page":"2705","DOI":"10.1109\/TIFS.2019.2903659","volume":"14","author":"NB Truong","year":"2019","unstructured":"Truong, N.B., Lee, G.M., Um, T.W., et al.: Trust evaluation mechanism for user recruitment in mobile crowd-sensing in the Internet of Things. IEEE Trans. Inf. Forensics Secur. 14(10), 2705\u20132719 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Communications in Computer and Information Science","Data Mining and Big Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-7476-1_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T22:02:54Z","timestamp":1758578574000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-7476-1_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811674754","9789811674761"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-7476-1_21","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"31 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DMBD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Mining and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dmbd2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/dmbd2021\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"258","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}