{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T00:12:55Z","timestamp":1776384775675,"version":"3.51.2"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T00:00:00Z","timestamp":1544400000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00607-018-0685-7","type":"journal-article","created":{"date-parts":[[2018,12,9]],"date-time":"2018-12-09T20:35:56Z","timestamp":1544387756000},"page":"791-818","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":77,"title":["A fuzzy security protocol for trust management in the internet of things (Fuzzy-IoT)"],"prefix":"10.1007","volume":"101","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9520-330X","authenticated-orcid":false,"given":"Mohammad Dahman","family":"Alshehri","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1513-8072","authenticated-orcid":false,"given":"Farookh Khadeer","family":"Hussain","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,10]]},"reference":[{"issue":"12","key":"685_CR1","doi-asserted-by":"publisher","first-page":"6962","DOI":"10.1109\/JSEN.2015.2468576","volume":"15","author":"A Ahmed","year":"2015","unstructured":"Ahmed A, Bakar KA, Channa MI, Haseeb K, Khan AW (2015) TERP: a trust and energy aware routing protocol for wireless sensor network. IEEE Sens J 15(12):6962\u20136972. \n                    https:\/\/doi.org\/10.1109\/JSEN.2015.2468576","journal-title":"IEEE Sens J"},{"issue":"4","key":"685_CR2","doi-asserted-by":"publisher","first-page":"2347","DOI":"10.1109\/COMST.2015.2444095","volume":"17","author":"A Al-Fuqaha","year":"2015","unstructured":"Al-Fuqaha A, Guizani M, Mohammadi M, Aledhari M, Ayyash M (2015) Internet of things: a survey on enabling technologies, protocols, and applications. IEEE Commun Surv Tutor 17(4):2347\u20132376. \n                    https:\/\/doi.org\/10.1109\/COMST.2015.2444095","journal-title":"IEEE Commun Surv Tutor"},{"key":"685_CR3","doi-asserted-by":"publisher","unstructured":"Alshehri MD, Hussain FK (2017) A centralized trust management mechanism for the internet of things (CTM-IoT). In: International conference on broadband and wireless computing, communication and applications. Springer, Cham, pp 533\u2013543. \n                    https:\/\/doi.org\/10.1007\/978-3-319-69811-3_48","DOI":"10.1007\/978-3-319-69811-3_48"},{"key":"685_CR4","doi-asserted-by":"publisher","unstructured":"Alshehri MD, Hussain FK (2015) A comparative analysis of scalable and context-aware trust management approaches for internet of things. In: International conference on neural information processing, 2015. Springer, pp 596-605. \n                    https:\/\/doi.org\/10.1007\/978-3-319-26561-2_70","DOI":"10.1007\/978-3-319-26561-2_70"},{"key":"685_CR5","doi-asserted-by":"publisher","unstructured":"Alshehri MD, Hussain FK, Hussain OK (2018) Clustering-driven intelligent trust management methodology for the internet of things (CITM-IoT). Mobile networks and applications, 1\u201313. \n                    https:\/\/doi.org\/10.1007\/s11036-018-1017-z","DOI":"10.1007\/s11036-018-1017-z"},{"issue":"1","key":"685_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1504\/IJSSC.2017.084123","volume":"7","author":"A Alsumayt","year":"2017","unstructured":"Alsumayt A, Haggerty J, Lotfi A (2017) Using trust to detect denial of service attacks in the internet of things over MANETs. Int J Space-Based Situated Comput 7(1):43\u201356. \n                    https:\/\/doi.org\/10.1504\/IJSSC.2017.10004987","journal-title":"Int J Space-Based Situated Comput"},{"key":"685_CR7","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.jisa.2017.11.002","volume":"38","author":"M Ammar","year":"2018","unstructured":"Ammar M, Russello G, Crispo B (2018) Internet of things: a survey on the security of IoT frameworks. J Inf Secur Appl 38:8\u201327. \n                    https:\/\/doi.org\/10.1016\/j.jisa.2017.11.002","journal-title":"J Inf Secur Appl"},{"issue":"2","key":"685_CR8","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1504\/IJSSC.2017.086821","volume":"7","author":"R Arridha","year":"2017","unstructured":"Arridha R, Sukaridhoto S, Pramadihanto D, Funabiki N (2017) Classification extension based on IoT-big data analytic for smart environment monitoring and analytic in real-time system. Int J Space-Based Situated Comput 7(2):82\u201393. \n                    https:\/\/doi.org\/10.1504\/IJSSC.2017.10008038","journal-title":"Int J Space-Based Situated Comput"},{"issue":"3","key":"685_CR9","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJSSC.2015.070945","volume":"5","author":"D Chasaki","year":"2015","unstructured":"Chasaki D, Mansour C (2015) Security challenges in the internet of things. Int J Space-Based Situated Comput 5(3):141\u2013149. \n                    https:\/\/doi.org\/10.1504\/IJSSC.2015.070945","journal-title":"Int J Space-Based Situated Comput"},{"issue":"4","key":"685_CR10","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.2298\/CSIS110303056C","volume":"8","author":"D Chen","year":"2011","unstructured":"Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207\u20131228. \n                    https:\/\/doi.org\/10.2298\/CSIS110303056C","journal-title":"Comput Sci Inf Syst"},{"issue":"1","key":"685_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1504\/IJGUC.2017.082139","volume":"8","author":"L Chen","year":"2017","unstructured":"Chen L, Qi X, Liu L, Zheng G (2017) A security routing protocol based on convergence degree and trust. Int J Grid Utility Comput 8(1):38\u201345. \n                    https:\/\/doi.org\/10.1504\/IJGUC.2017.10003008","journal-title":"Int J Grid Utility Comput"},{"issue":"3","key":"685_CR12","doi-asserted-by":"publisher","first-page":"1294","DOI":"10.1109\/COMST.2015.2388550","volume":"17","author":"J Granjal","year":"2015","unstructured":"Granjal J, Monteiro E, Silva JS (2015) Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun Surv Tutor 17(3):1294\u20131312. \n                    https:\/\/doi.org\/10.1109\/COMST.2015.2388550","journal-title":"IEEE Commun Surv Tutor"},{"key":"685_CR13","doi-asserted-by":"publisher","unstructured":"Hossain MM, Fotouhi M, Hasan R (2015) Towards an analysis of security issues, challenges, and open problems in the internet of things. In: Services (SERVICES), 2015 IEEE World Congress on, 2015. IEEE, pp 21\u201328. \n                    https:\/\/doi.org\/10.1109\/SERVICES.2015.12","DOI":"10.1109\/SERVICES.2015.12"},{"issue":"1","key":"685_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1504\/IJGUC.2015.066397","volume":"6","author":"S Javanmardi","year":"2014","unstructured":"Javanmardi S, Shojafar M, Shariatmadari S, Ahrabi SS (2014) Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int J Grid Util Comput 6(1):57\u201366. \n                    https:\/\/doi.org\/10.1504\/IJGUC.2015.066397","journal-title":"Int J Grid Util Comput"},{"issue":"1","key":"685_CR15","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJITCA.2018.090158","volume":"1","author":"K Kotis","year":"2018","unstructured":"Kotis K, Athanasakis I, Vouros GA (2018) Semantically enabling IoT trust to ensure and secure deployment of IoT entities. Int J Internet Things Cyber-Assur 1(1):3\u201321. \n                    https:\/\/doi.org\/10.1504\/IJITCA.2018.090158","journal-title":"Int J Internet Things Cyber-Assur"},{"key":"685_CR16","doi-asserted-by":"publisher","unstructured":"Lee J-Y, Lin W-C, Huang Y-H (2014) A lightweight authentication protocol for internet of things. In: Next-generation electronics (ISNE), 2014 international symposium on, 2014. IEEE, pp 1\u20132. \n                    https:\/\/doi.org\/10.1109\/ISNE.2014.6839375","DOI":"10.1109\/ISNE.2014.6839375"},{"issue":"5","key":"685_CR17","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin J, Yu W, Zhang N, Yang X, Zhang H, Zhao W (2017) A survey on internet of things: architecture, enabling technologies, security and privacy, and applications. IEEE Internet Things J 4(5):1125\u20131142. \n                    https:\/\/doi.org\/10.1109\/JIOT.2017.2683200","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"685_CR18","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/CC.2014.6821746","volume":"11","author":"G Lize","year":"2014","unstructured":"Lize G, Jingpei W, Bin S (2014) Trust management mechanism for internet of things. China Commun 11(2):148\u2013156. \n                    https:\/\/doi.org\/10.1109\/CC.2014.6821746","journal-title":"China Commun"},{"key":"685_CR19","doi-asserted-by":"publisher","unstructured":"Mahalle PN, Thakre PA, Prasad NR, Prasad R (2013) A fuzzy approach to trustbased access control in internet of things. In: Wireless communications, vehicular technology, information theory and aerospace and electronic systems (VITAE), 2013 3rd international conference on, IEEE, pp 1\u20135. \n                    https:\/\/doi.org\/10.1109\/VITAE.2013.6617083","DOI":"10.1109\/VITAE.2013.6617083"},{"key":"685_CR20","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.comnet.2016.03.011","volume":"102","author":"L Malina","year":"2016","unstructured":"Malina L, Hajny J, Fujdiak R, Hosek J (2016) On perspective of security and privacy-preserving solutions in the internet of things. Comput Netw 102:83\u201395. \n                    https:\/\/doi.org\/10.1016\/j.comnet.2016.03.011","journal-title":"Comput Netw"},{"key":"685_CR21","doi-asserted-by":"publisher","unstructured":"Mishra S (2015) Network security protocol for constrained resource devices in internet of things. In: India conference (INDICON), 2015 annual IEEE, 2015. IEEE, pp 1\u20136. \n                    https:\/\/doi.org\/10.1109\/INDICON.2015.7443737","DOI":"10.1109\/INDICON.2015.7443737"},{"issue":"4","key":"685_CR22","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1109\/TETC.2016.2606384","volume":"5","author":"A Mosenia","year":"2017","unstructured":"Mosenia A, Jha NK (2017) A comprehensive study of security of internet-of-things. IEEE Trans Emerg Top Comput 5(4):586\u2013602. \n                    https:\/\/doi.org\/10.1109\/TETC.2016.2606384","journal-title":"IEEE Trans Emerg Top Comput"},{"key":"685_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.adhoc.2015.01.006","volume":"32","author":"KT Nguyen","year":"2015","unstructured":"Nguyen KT, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17\u201331. \n                    https:\/\/doi.org\/10.1016\/j.adhoc.2015.01.006","journal-title":"Ad Hoc Netw"},{"key":"685_CR24","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.comnet.2014.03.023","volume":"67","author":"BR Ray","year":"2014","unstructured":"Ray BR, Abawajy J, Chowdhury M (2014) Scalable RFID security framework and protocol supporting internet of things. Comput Netw 67:89\u2013103. \n                    https:\/\/doi.org\/10.1016\/j.comnet.2014.03.023","journal-title":"Comput Netw"},{"issue":"12","key":"685_CR25","doi-asserted-by":"publisher","first-page":"2654","DOI":"10.1002\/sec.406","volume":"7","author":"S Raza","year":"2014","unstructured":"Raza S, Duquennoy S, H\u00f6glund J, Roedig U, Voigt T (2014) Secure communication for the internet of thing: a comparison of link-layer security and IPsec for 6LoWPAN. Secur Commun Netw 7(12):2654\u20132668. \n                    https:\/\/doi.org\/10.1002\/sec.406","journal-title":"Secur Commun Netw"},{"key":"685_CR26","doi-asserted-by":"publisher","unstructured":"Renubala S, Dhanalakshmi K (2014) Trust based secure routing protocol using fuzzy logic in wireless sensor networks. In: Computational intelligence and computing research (ICCIC), 2014 IEEE international conference on, 2014. IEEE, pp 1\u20135. \n                    https:\/\/doi.org\/10.1109\/ICCIC.2014.7238435","DOI":"10.1109\/ICCIC.2014.7238435"},{"key":"685_CR27","doi-asserted-by":"publisher","unstructured":"Sirisala N, Bindu CS (2015) Uncertain rule based fuzzy logic QoS trust model in manets. In: Advanced computing and communications (ADCOM), 2015 international conference on, Chennai. IEEE, pp 55\u201360. \n                    https:\/\/doi.org\/10.1109\/ADCOM.2015.17","DOI":"10.1109\/ADCOM.2015.17"},{"key":"685_CR28","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.jpdc.2017.05.021","volume":"109","author":"G Tuna","year":"2017","unstructured":"Tuna G, Kogias DG, Gungor VC, Gezer C, Ta\u015fk\u0131n E, Ayday E (2017) A survey on information security threats and solutions for machine to machine (M2M) communications. J Parallel Distrib Comput 109:142\u2013154. \n                    https:\/\/doi.org\/10.1016\/j.jpdc.2017.05.021","journal-title":"J Parallel Distrib Comput"},{"issue":"2","key":"685_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/CC.2018.8300267","volume":"15","author":"X Wang","year":"2018","unstructured":"Wang X, Zhou H, Su J, Wang B, Xing Q, Li P (2018) T-IP: a self-trustworthy and secure internet protocol. China Commun 15(2):1\u201314. \n                    https:\/\/doi.org\/10.1109\/CC.2018.8300267","journal-title":"China Commun"},{"issue":"1","key":"685_CR30","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJGUC.2017.082135","volume":"8","author":"X Yao","year":"2017","unstructured":"Yao X, Wang L (2017) Design and implementation of IOT gateway based on embedded \n                    \n                      \n                    \n                    $$\\mu $$\n                    \n                      \n                        \u03bc\n                      \n                    \n                  Tenux operating system. Int J Grid Util Comput 8(1):22\u201328. \n                    https:\/\/doi.org\/10.1504\/IJGUC.2017.10003004","journal-title":"Int J Grid Util Comput"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0685-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0685-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0685-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T19:18:54Z","timestamp":1575919134000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0685-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,10]]},"references-count":30,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["685"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0685-7","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"value":"0010-485X","type":"print"},{"value":"1436-5057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,10]]},"assertion":[{"value":"28 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}