{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T09:47:21Z","timestamp":1774518441181,"version":"3.50.1"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["2149969"],"award-info":[{"award-number":["2149969"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Centers of Academic Excellence in Cybersecurity, housed in the Division of Cybersecurity Education, Innovation and Outreach, at the National Security Agency","award":["H98230-20-1-0329, H98230-20-1-0414, H98230-21-1-0262, H98230-21-1-0262, and H98230-22-1-0329"],"award-info":[{"award-number":["H98230-20-1-0329, H98230-20-1-0414, H98230-21-1-0262, H98230-21-1-0262, and H98230-22-1-0329"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10586-024-05050-w","type":"journal-article","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T10:45:58Z","timestamp":1756550758000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Enhanced trust in IoT environments: utilizing perfect Bayesian equilibrium, exponential smoothing, and machine learning"],"prefix":"10.1007","volume":"28","author":[{"given":"Himan","family":"Namdari","sequence":"first","affiliation":[]},{"given":"Victor","family":"Morales Avalos","sequence":"additional","affiliation":[]},{"given":"Amal","family":"Alshehri","sequence":"additional","affiliation":[]},{"given":"Cihan","family":"Tunc","sequence":"additional","affiliation":[]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,30]]},"reference":[{"issue":"02","key":"5050_CR1","first-page":"77","volume":"9","author":"RARA Mouha","year":"2021","unstructured":"Mouha, R.A.R.A., et al.: Internet of things (IoT). J. Data Anal. Inf. Process. 9(02), 77 (2021)","journal-title":"J. Data Anal. Inf. Process."},{"issue":"15","key":"5050_CR2","first-page":"1","volume":"80","author":"K Rose","year":"2015","unstructured":"Rose, K., Eldridge, S., Chapin, L.: The internet of things: an overview. Internet Soc. (ISOC) 80(15), 1\u201353 (2015)","journal-title":"Internet Soc. (ISOC)"},{"key":"5050_CR3","unstructured":"Howarth, J.: 80+ amazing iot statistics (2024\u20132030) [Online] (2024). https:\/\/explodingtopics.com\/blog\/iot-stats. Accessed 20 Jun 2024"},{"key":"5050_CR4","doi-asserted-by":"crossref","unstructured":"Abdulameer, A.A., Oubida, R.K.: The impact of iot on real-world future decisions. In: AIP Conference Proceedings, vol. 2591, no. 1. AIP Publishing (2023)","DOI":"10.1063\/5.0119572"},{"key":"5050_CR5","unstructured":"Topics, E.: 35 iot statistics, facts & trends [2023 update] [Online] (2023). https:\/\/explodingtopics.com\/blog\/iot-stats"},{"key":"5050_CR6","doi-asserted-by":"crossref","unstructured":"Namdari, H., Tunc, C., Dantu, R.: Phoenix: Iot trust evaluation using game theory with second chance protocol. In: 2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), pp. 117\u2013124. IEEE (2023)","DOI":"10.1109\/IOTSMS59855.2023.10325703"},{"key":"5050_CR7","unstructured":"Team, C.: Malware statistics: You need to know in 2024 [Online] (2024). https:\/\/www.cyberarrow.io\/blog\/malware-statistics-you-need-to-know-in-2024\/. Accessed 20 Jun 2024"},{"issue":"1","key":"5050_CR8","first-page":"27","volume":"12","author":"N Priya","year":"2022","unstructured":"Priya, N.: Cybersecurity considerations for industrial iot in critical infrastructure sector. Int. J. Comput. Org. Trends 12(1), 27\u201336 (2022)","journal-title":"Int. J. Comput. Org. Trends"},{"key":"5050_CR9","unstructured":"IoT World Congress: 5 infamous iot hacks and vulnerabilities [Online] (2024). https:\/\/www.iotsworldcongress.com\/5-infamous-iot-hacks-and-vulnerabilities\/. Accessed 24 Jun 2024"},{"key":"5050_CR10","unstructured":"Cloudflare: Inside mirai\u2014the infamous iot botnet: a retrospective analysis [Online] (2024). https:\/\/blog.cloudflare.com\/inside-mirai-the-infamous-iot-botnet-a-retrospective-analysis. Accessed 10 Jul 2024"},{"key":"5050_CR11","unstructured":"Point, T.: The 5 worst examples of iot hacking and vulnerabilities in recorded history (2023). https:\/\/www.iotforall.com\/5-worst-iot-hacking-vulnerabilities. Accessed 1 Feb 2024"},{"key":"5050_CR12","doi-asserted-by":"publisher","first-page":"79523","DOI":"10.1109\/ACCESS.2019.2920763","volume":"7","author":"X Liu","year":"2019","unstructured":"Liu, X., Qian, C., Hatcher, W.G., Xu, H., Liao, W., Yu, W.: Secure internet of things (iot)-based smart-world critical infrastructures: survey, case study and research opportunities. IEEE Access 7, 79523\u201379544 (2019)","journal-title":"IEEE Access"},{"issue":"12","key":"5050_CR13","doi-asserted-by":"publisher","first-page":"4102","DOI":"10.3390\/app10124102","volume":"10","author":"L Tawalbeh","year":"2020","unstructured":"Tawalbeh, L., Muheidat, F., Tawalbeh, M., Quwaider, M.: Iot privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)","journal-title":"Appl. Sci."},{"key":"5050_CR14","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","volume":"148","author":"WH Hassan","year":"2019","unstructured":"Hassan, W.H., et al.: Current research on internet of things (iot) security: a survey. Comput. Netw. 148, 283\u2013294 (2019)","journal-title":"Comput. Netw."},{"key":"5050_CR15","unstructured":"Balte, A., Kashid, A., Patil, B.: Security issues in internet of things (IoT): a survey. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(4) (2015)"},{"issue":"19","key":"5050_CR16","doi-asserted-by":"publisher","first-page":"7433","DOI":"10.3390\/s22197433","volume":"22","author":"PK Sadhu","year":"2022","unstructured":"Sadhu, P.K., Yanambaka, V.P., Abdelgawad, A.: Internet of things: security and solutions survey. Sensors 22(19), 7433 (2022)","journal-title":"Sensors"},{"key":"5050_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2022.100467","volume":"44","author":"E Schiller","year":"2022","unstructured":"Schiller, E., Aidoo, A., Fuhrer, J., Stahl, J., Zi\u00f6rjen, M., Stiller, B.: Landscape of iot security. Comput. Sci. Rev. 44, 100467 (2022)","journal-title":"Comput. Sci. Rev."},{"key":"5050_CR18","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press (1991)"},{"issue":"6","key":"5050_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102308","volume":"57","author":"C Esposito","year":"2020","unstructured":"Esposito, C., Tamburis, O., Su, X., Choi, C.: Robust decentralised trust management for the internet of things by using game theory. Inf. Process. Manag. 57(6), 102308 (2020)","journal-title":"Inf. Process. Manag."},{"issue":"9","key":"5050_CR20","doi-asserted-by":"publisher","first-page":"309","DOI":"10.3390\/fi15090309","volume":"15","author":"T Tadj","year":"2023","unstructured":"Tadj, T., Arablouei, R., Dedeoglu, V.: On evaluating iot data trust via machine learning. Fut. Internet 15(9), 309 (2023)","journal-title":"Fut. Internet"},{"issue":"12","key":"5050_CR21","doi-asserted-by":"publisher","first-page":"4405","DOI":"10.1109\/TITS.2018.2885054","volume":"20","author":"AR Sfar","year":"2019","unstructured":"Sfar, A.R., Challal, Y., Moyal, P., Natalizio, E.: A game theoretic approach for privacy preserving model in IoT-based transportation. IEEE Trans. Intell. Transp. Syst. 20(12), 4405\u20134414 (2019)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"5050_CR22","doi-asserted-by":"crossref","unstructured":"Siddiqui, S., Khan, A.A., Nait-Abdesselam, F., Dey, I.: A Bayesian game model for dynamic channel sensing intervals in internet of things. In: 2021 IEEE Global Communications Conference (GLOBECOM) (2021)","DOI":"10.1109\/GLOBECOM46510.2021.9685789"},{"key":"5050_CR23","unstructured":"Harsanyi, J.C., Selten, R.: A General Theory of Equilibrium selection in games, vol. 1. MIT Press Books (1988)"},{"key":"5050_CR24","first-page":"234","volume":"20","author":"G Guru","year":"2022","unstructured":"Guru, G., Specialist, H.: Support vector machines for security applications. Secur. ML 20, 234\u2013245 (2022)","journal-title":"Secur. ML"},{"key":"5050_CR25","first-page":"330","volume":"1","author":"G Shafer","year":"1992","unstructured":"Shafer, G.: Dempster-shafer theory. Encycl. Artif. Intell. 1, 330\u2013331 (1992)","journal-title":"Encycl. Artif. Intell."},{"issue":"11","key":"5050_CR26","doi-asserted-by":"publisher","first-page":"11250","DOI":"10.1109\/JIOT.2020.2996671","volume":"7","author":"MS Abdalzaher","year":"2020","unstructured":"Abdalzaher, M.S., Muta, O.: A game-theoretic approach for enhancing security and data trustworthiness in iot applications. IEEE Internet Things J. 7(11), 11250\u201311261 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"5050_CR27","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MCOM.2015.7010515","volume":"53","author":"N Kumar","year":"2015","unstructured":"Kumar, N., Chilamkurti, N., Misra, S.C.: Bayesian coalition game for the internet of things: an ambient intelligence-based evaluation. IEEE Commun. Mag. 53(1), 48\u201355 (2015)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"5050_CR28","doi-asserted-by":"publisher","first-page":"50","DOI":"10.3390\/iot2010004","volume":"2","author":"C Marche","year":"2021","unstructured":"Marche, C., Nitti, M.: A binary trust game for the internet of things. IoT 2(1), 50\u201370 (2021)","journal-title":"IoT"},{"issue":"8","key":"5050_CR29","doi-asserted-by":"publisher","first-page":"1951","DOI":"10.1007\/s12369-020-00705-1","volume":"13","author":"MF Mahani","year":"2021","unstructured":"Mahani, M.F., Jiang, L., Wang, Y.: A Bayesian trust inference model for human-multi-robot teams. Int. J. Soc. Robot. 13(8), 1951\u20131965 (2021)","journal-title":"Int. J. Soc. Robot."},{"issue":"22","key":"5050_CR30","doi-asserted-by":"publisher","first-page":"22061","DOI":"10.1109\/JIOT.2021.3082272","volume":"9","author":"P Singh","year":"2021","unstructured":"Singh, P., Kaur, A., Batth, R.S., Aujla, G.S., Masud, M.: Service versus protection: a Bayesian learning approach for trust provisioning in edge of things environment. IEEE Internet Things J. 9(22), 22061\u201322070 (2021)","journal-title":"IEEE Internet Things J."},{"issue":"5","key":"5050_CR31","doi-asserted-by":"publisher","first-page":"8421","DOI":"10.1109\/JIOT.2019.2917763","volume":"6","author":"R Rani","year":"2019","unstructured":"Rani, R., Kumar, S., Dohare, U.: Trust evaluation for light weight security in sensor enabled internet of things: game theory oriented approach. IEEE Internet Things J. 6(5), 8421\u20138432 (2019)","journal-title":"IEEE Internet Things J."},{"key":"5050_CR32","unstructured":"Al-Garadi, M.A., Mohamed, A., Al-Ali, A., Du, X., Guizani, M.: A survey of machine and deep learning methods for internet of things (IoT) security [Online] (2018). arXiv:1807.11023"},{"key":"5050_CR33","unstructured":"Arablouei, R., Dedeoglu, V., Tadj, T.: Iot data trust evaluation via machine learning. arXiv:2308.11638 (2023)"},{"issue":"2","key":"5050_CR34","first-page":"659","volume":"10","author":"V Dedeoglu","year":"2023","unstructured":"Dedeoglu, V., Arablouei, R., Tadj, T.: Evaluating trustworthiness in iot networks using machine learning and Bayesian methods. IEEE Trans. Netw. Sci. Eng. 10(2), 659\u2013670 (2023)","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"issue":"8","key":"5050_CR35","doi-asserted-by":"publisher","first-page":"1198","DOI":"10.3390\/e25081198","volume":"25","author":"X Zhou","year":"2023","unstructured":"Zhou, X., Tang, J., Dang, S., Chen, G.: A lightweight trust mechanism with attack detection for iot. Entropy 25(8), 1198 (2023)","journal-title":"Entropy"},{"issue":"1","key":"5050_CR36","volume":"2020","author":"R Bi","year":"2020","unstructured":"Bi, R., Chen, Q., Chen, L., Xiong, J.,  Wu, D.:  A privacy\u2010preserving personalized service framework through bayesian game in social IoT. Wirel. Commun. Mob. Com. 2020(1), 8891889 (2020)","journal-title":"Wirel. Commun. Mob. Com."},{"key":"5050_CR37","unstructured":"International Energy Agency: Smart grids [Online] (2024). https:\/\/www.iea.org\/energy-system\/electricity\/smart-grids. Accessed 24 Jun 2024"},{"key":"5050_CR38","doi-asserted-by":"crossref","unstructured":"Abderrahim, O.B., Elhdhili, M.H., Saidane, L.: Tmcoi-siot: a trust management system based on communities of interest for the social internet of things. In: 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 747\u2013752 (2017)","DOI":"10.1109\/IWCMC.2017.7986378"},{"issue":"14","key":"5050_CR39","doi-asserted-by":"publisher","first-page":"12867","DOI":"10.1109\/JIOT.2023.3259340","volume":"10","author":"C Boudagdigue","year":"2023","unstructured":"Boudagdigue, C., Benslimane, A., Kobbane, A., Liu, J.: Trust-based certificate management for industrial iot networks. IEEE Internet Things J. 10(14), 12867\u201312885 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5050_CR40","unstructured":"Osborne, M., Rubinstein, A.: A Course in Game Theory, Ser. A Course in Game Theory. MIT Press (1994)"},{"key":"5050_CR41","unstructured":"Myerson, R.: Game Theory: Analysis of Conflict. Harvard University Press (1991)"},{"key":"5050_CR42","first-page":"443","volume":"2","author":"RG Brown","year":"1959","unstructured":"Brown, R.G.: Statistical forecasting for inventory control. McGraw-Hill Google Schola 2, 443\u2013473 (1959)","journal-title":"McGraw-Hill Google Schola"},{"key":"5050_CR43","unstructured":"Brown, R.G.: Smoothing, forecasting and prediction of discrete time series. Courier Corporation (2004)"},{"issue":"3","key":"5050_CR44","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1287\/mnsc.6.3.324","volume":"6","author":"PR Winters","year":"1960","unstructured":"Winters, P.R.: Forecasting sales by exponentially weighted moving averages. Manag. Sci. 6(3), 324\u2013342 (1960)","journal-title":"Management science"},{"issue":"2","key":"5050_CR45","first-page":"147","volume":"50","author":"C Chatfield","year":"2001","unstructured":"Chatfield, C., Koehler, A.B., Ord, J.K., Snyder, R.D.: A new look at models for exponential smoothing. J. R. Stat. Soc.: Ser. D (Stat.) 50(2), 147\u2013159 (2001)","journal-title":"J. R. Stat. Soc.: Ser. D (Stat.)"},{"issue":"4","key":"5050_CR46","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1016\/j.ijforecast.2006.03.005","volume":"22","author":"ES Gardner Jr","year":"2006","unstructured":"Gardner, E.S., Jr.: Exponential smoothing: the state of the art-part II. Int. J. Forecast. 22(4), 637\u2013666 (2006)","journal-title":"Int. J. Forecast."},{"key":"5050_CR47","doi-asserted-by":"crossref","unstructured":"Sahay, R., Geethakumari, G., Mitra, B., Thejas, V.: Exponential smoothing based approach for detection of blackhole attacks in iot. In: 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ANTS.2018.8710073"},{"key":"5050_CR48","unstructured":"Mahabeer, S.: Exponential smoothing. [Online] (2024). https:\/\/www.linkedin.com\/pulse\/exponential-smoothing-shrikesh-mahabeer. Accessed 26 Jun 2024"},{"key":"5050_CR49","doi-asserted-by":"crossref","unstructured":"Theodorakopoulos, G., Baras, J.S.: Trust evaluation in ad-hoc networks. In: Proceedings of the 3rd ACM workshop on Wireless Security, pp. 1\u201310 (2004)","DOI":"10.1145\/1023646.1023648"},{"issue":"2","key":"5050_CR50","first-page":"123","volume":"10","author":"A Author","year":"2022","unstructured":"Author, A., Another, B.: A survey on machine learning for iot security. J. IoT Secur. 10(2), 123\u2013135 (2022)","journal-title":"J. IoT Secur."},{"key":"5050_CR51","first-page":"45","volume":"5","author":"C Scientist","year":"2023","unstructured":"Scientist, C., Engineer, D.: Enhancing iot security with machine learning. Adv. IoT Res. 5, 45\u201358 (2023)","journal-title":"Adv. IoT Res."},{"issue":"14","key":"5050_CR52","doi-asserted-by":"publisher","first-page":"12125","DOI":"10.1109\/JIOT.2021.3133669","volume":"9","author":"C Chi","year":"2022","unstructured":"Chi, C., Wang, Y., Tong, X., Siddula, M., Cai, Z.: Game theory in internet of things: a survey. IEEE Internet Things J. 9(14), 12125\u201312146 (2022)","journal-title":"IEEE Internet Things J."},{"key":"5050_CR53","unstructured":"Google Colab: Introduction to colaboratory (2024). https:\/\/colab.research.google.com\/notebooks\/intro.ipynb. Accessed 11 Jul 2024"},{"key":"5050_CR54","unstructured":"II, S.M.W.: Accuracy, precision, recall, f1 score [Online] (2024). https:\/\/klu.ai\/glossary\/accuracy-precision-recall-f1. Accessed 01 Jul 2024"},{"key":"5050_CR55","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2021.127407","volume":"310","author":"Y Bai","year":"2021","unstructured":"Bai, Y., Fan, K., Zhang, K., Cheng, X., Li, H., Yang, Y.: Blockchain-based trust management for agricultural green supply: a game theoretic approach. J. Clean. Prod. 310, 127407 (2021)","journal-title":"J. Clean. Prod."},{"key":"5050_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13634-021-00748-0","volume":"2021","author":"ASS Thuluva","year":"2021","unstructured":"Thuluva, A.S.S., Somanathan, M.S., Somula, R., Sennan, S., Burgos, D.: Secure and efficient transmission of data based on caesar cipher algorithm for sybil attack in iot. EURASIP J. Adv. Signal Process. 2021, 1\u201323 (2021)","journal-title":"EURASIP J. Adv. Signal Process."},{"issue":"1","key":"5050_CR57","doi-asserted-by":"publisher","first-page":"1136","DOI":"10.1109\/JIOT.2023.3288040","volume":"11","author":"S Dogan-Tusha","year":"2023","unstructured":"Dogan-Tusha, S., Althunibat, S., Qaraqe, M.: Doppler-shift-based sybil attack detection for mobile iot networks. IEEE Internet Things J. 11(1), 1136\u20131147 (2023)","journal-title":"IEEE Internet Things J."},{"key":"5050_CR58","doi-asserted-by":"crossref","unstructured":"Cai, L., Rojas-Cessa, R.: Containing sybil attacks on trust management schemes for peer-to-peer networks. In: 2014 IEEE International Conference on Communications (ICC), pp. 841\u2013846. IEEE (2014)","DOI":"10.1109\/ICC.2014.6883424"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05050-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-024-05050-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-024-05050-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T21:23:13Z","timestamp":1758144193000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-024-05050-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,30]]},"references-count":58,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["5050"],"URL":"https:\/\/doi.org\/10.1007\/s10586-024-05050-w","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,30]]},"assertion":[{"value":"14 July 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2024","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 December 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"572"}}