{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T13:59:44Z","timestamp":1768917584276,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"20","license":[{"start":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T00:00:00Z","timestamp":1597622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T00:00:00Z","timestamp":1597622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61772280"],"award-info":[{"award-number":["61772280"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11042-020-09578-y","type":"journal-article","created":{"date-parts":[[2020,8,17]],"date-time":"2020-08-17T16:04:07Z","timestamp":1597680247000},"page":"30653-30676","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Blockchain-based trust establishment mechanism in the internet of multimedia things"],"prefix":"10.1007","volume":"80","author":[{"given":"Yongjun","family":"Ren","sequence":"first","affiliation":[]},{"given":"Fujian","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Kui","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Pradip Kumar","family":"Sharma","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,17]]},"reference":[{"key":"9578_CR1","doi-asserted-by":"crossref","unstructured":"Alexopoulos N, Habib S, M\u00fchlh\u00e4user M (2018). Towards secure distributed trust management on a global scale: An analytical approach for applying distributed ledgers for authorization in the IoT. In Proceedings of the 2018 Workshop on IoT security and privacy. ACM, 49\u201354.","DOI":"10.1145\/3229565.3229569"},{"key":"9578_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1145\/2523649.2523665","volume":"2013","author":"B Amann","year":"2013","unstructured":"Amann B, Sommer R, Vallentin M et al (2013) No attack necessary: the surprising dynamics of SSL trust relationships. ACM ACSAC 2013:179\u2013188","journal-title":"ACM ACSAC"},{"key":"9578_CR3","doi-asserted-by":"crossref","unstructured":"Basin D, Cremers C, Kim THJ et al. (2014) ARPKI: attack resilient public-key infrastructure. ACM CCS2014. 382-393.","DOI":"10.1145\/2660267.2660298"},{"key":"9578_CR4","doi-asserted-by":"crossref","unstructured":"Benkerrou H, Heddad S, Omar M (2017) Credit and honesty-based trust assessment for hierarchical collaborative IoT systems. IDT2017. 295-299.","DOI":"10.1109\/DT.2017.8012117"},{"key":"9578_CR5","unstructured":"Blaze M, Feigenbaum J, Lacy J (1996) Reputation systems: facilitating trust in internet interactions. IEEE Symp on Security and Privacy."},{"issue":"6","key":"9578_CR6","doi-asserted-by":"publisher","first-page":"913","DOI":"10.3233\/JCS-140509","volume":"22","author":"J Braun","year":"2014","unstructured":"Braun J, Volk F, Classen J, Buchmann J, M\u00fchlh\u00e4user M (2014) CA trust management for the web PKI. J Comput Secur 22(6):913\u2013959","journal-title":"J Comput Secur"},{"issue":"4","key":"9578_CR7","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.2298\/CSIS110303056C","volume":"8","author":"D Chen","year":"2011","unstructured":"Chen D, Chang G, Sun D, Li J, Jia J, Wang X (2011) TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207\u20131228","journal-title":"Comput Sci Inf Syst"},{"issue":"6","key":"9578_CR8","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TDSC.2015.2420552","volume":"13","author":"I Chen","year":"2015","unstructured":"Chen I, Bao F, Guo J (2015) Trust-based service management for social internet of things systems. IEEE Trans on Dependable and Secure Computing 13(6):684\u2013696","journal-title":"IEEE Trans on Dependable and Secure Computing"},{"key":"9578_CR9","doi-asserted-by":"publisher","first-page":"5745","DOI":"10.1109\/JIOT.2019.2944301","volume":"7","author":"L Fang","year":"2019","unstructured":"Fang L, Li Y, Yun X, Wen Z, Ji S, Meng W, Cao Z, Tanveer M (2019) THP: a novel authentication scheme to prevent multiple attacks in SDN-based IoT network. IEEE Internet Things J 7:5745\u20135759. https:\/\/doi.org\/10.1109\/JIOT.2019.2944301","journal-title":"IEEE Internet Things J"},{"key":"9578_CR10","doi-asserted-by":"publisher","unstructured":"Ge C, Liu Z, Xia J et al (2019) Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Transactions on Dependable and Secure Computing:1. https:\/\/doi.org\/10.1109\/TDSC.2019.2899300","DOI":"10.1109\/TDSC.2019.2899300"},{"key":"9578_CR11","first-page":"144","volume":"2003","author":"M Gupta","year":"2003","unstructured":"Gupta M, Judge P, Ammar M (2003) A reputation system for peer-to-peer networks. Proc of the 13th Int workshop on network and operating systems support for digital audio and video. New York: ACM 2003:144\u2013152","journal-title":"New York: ACM"},{"issue":"1","key":"9578_CR12","doi-asserted-by":"publisher","first-page":"159688","DOI":"10.1109\/ACCESS.2019.2950443","volume":"7","author":"G Li","year":"2019","unstructured":"Li G, Yan J, Chen L, Wu J, Lin Q, Zhang Y (2019) Energy consumption optimization with a delay threshold in cloud-fog cooperation computing. IEEE Access 7(1):159688\u2013159697","journal-title":"IEEE Access"},{"key":"9578_CR13","doi-asserted-by":"crossref","unstructured":"Lin J, Shen Z, Miao C (2017) Using blockchain technology to build trust in sharing LoRaWAN IoT. In proceedings of the 2nd international conference on crowd science and engineering. ACM, 38-43.","DOI":"10.1145\/3126973.3126980"},{"issue":"5","key":"9578_CR14","doi-asserted-by":"publisher","first-page":"846","DOI":"10.3724\/SP.J.1016.2012.00846","volume":"35","author":"W Liu","year":"2012","unstructured":"Liu W, Lin L, Fang B et al (2012) An hierarchical trust model for the internet of things. Chinese Journal of Computers 35(5):846\u2013855","journal-title":"Chinese Journal of Computers"},{"issue":"2","key":"9578_CR15","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/CC.2014.6821746","volume":"11","author":"G Lize","year":"2014","unstructured":"Lize G, Jingpei G, Bin S et al (2014) Trust management mechanism for internet of things. China Communications 11(2):148\u2013156","journal-title":"China Communications"},{"issue":"2","key":"9578_CR16","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/10864415.2001.11044235","volume":"6","author":"DH McKnight","year":"2001","unstructured":"McKnight DH, Chervany NL (2001) What trust means in e-commerce customer relationships: an interdisciplinary conceptual typology. Int J Electron Commer 6(2):25\u201359","journal-title":"Int J Electron Commer"},{"key":"9578_CR17","unstructured":"Moinet A, Darties B, Baril J L (2017) Blockchain based trust & authentication for decentralized sensor networks. arXiv preprint. arXiv:1706.01730, 2017."},{"key":"9578_CR18","unstructured":"Mui L (2002) Computation models of trust and reputation: agents, evolutionary games, and social networks. Massachusetts Institute of Technology."},{"issue":"5","key":"9578_CR19","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","volume":"26","author":"M Nitti","year":"2013","unstructured":"Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the social internet of things. IEEE Trans on Knowledge and Data Engineering 26(5):1253\u20131266","journal-title":"IEEE Trans on Knowledge and Data Engineering"},{"key":"9578_CR20","doi-asserted-by":"crossref","unstructured":"Pietro R, Salleras X, Signorini M et al. (2018) A blockchain-based distributed trust system for the internet of things. In proceedings of the 23nd ACM on symposium on access control models and technologies (SACMAT'18). 77-83.","DOI":"10.1145\/3205977.3205993"},{"key":"9578_CR21","doi-asserted-by":"crossref","unstructured":"Pinto G V, Dias J P, Ferreira H S (2018) Blockchain-based PKI for crowdsourced IoT sensor information. International conference on soft computing and pattern recognition. 248-257.","DOI":"10.1007\/978-3-030-17065-3_25"},{"key":"9578_CR22","doi-asserted-by":"crossref","unstructured":"Rafey SEA, Abdel-Hamid A, El-Nasr MA (2016) CBSTM-IoT: context-based social trust model for the internet of things. IMoWNeT16. 1-8.","DOI":"10.1109\/MoWNet.2016.7496623"},{"issue":"4","key":"9578_CR23","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.3934\/mbe.2019091","volume":"16","author":"Y Ren","year":"2019","unstructured":"Ren Y, Leng Y, Cheng Y, Wang J, 1 School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China, 2 Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology (CICAEET), Nanjing University of Information Science & Technology, Nanjing, China, 3 Hunan Provincial Key Laboratory of Intelligent Processing of Big Data on Transportation, School of Computer & Communication Engineering, Changsha University of Science & Technology, Changsha, China, 4 School of Information Science and Engineering, Fujian University of Technology, Fujian, China (2019) Secure data storage based on blockchain and coding in edge computing. Math Biosci Eng 16(4):1874\u20131892","journal-title":"Math Biosci Eng"},{"issue":"3","key":"9578_CR24","doi-asserted-by":"publisher","first-page":"1471","DOI":"10.32604\/cmc.2020.06745","volume":"63","author":"Y Ren","year":"2020","unstructured":"Ren Y, Qi J, Cheng Y, Wang J, Xia J (2020) Digital continuity guarantee approach of electronic record based on data quality theory. Computers, Materials & Continua 63(3):1471\u20131483","journal-title":"Computers, Materials & Continua"},{"key":"9578_CR25","doi-asserted-by":"publisher","first-page":"207","DOI":"10.3390\/s20010207","volume":"20","author":"Y Ren","year":"2020","unstructured":"Ren Y, Zhu F, Sharma PK, Wang T, Wang J, Alfarraj O, Tolba A (2020) Data query mechanism based on hash computing power of Blockchain in internet of things. Sensors. 20:207","journal-title":"Sensors."},{"key":"9578_CR26","doi-asserted-by":"publisher","unstructured":"Ren Y, Qi J, Liu Y et al (2020) Integrity verification mechanism of sensor data based on bilinear map accumulator. ACM Trans Internet Technol. https:\/\/doi.org\/10.1145\/3380749","DOI":"10.1145\/3380749"},{"key":"9578_CR27","first-page":"64","volume":"1996","author":"P Resnick","year":"2000","unstructured":"Resnick P, Zechauser R, Friedman E (2000) Decentralized trust management. IEEE Symposium on Security and Privacy 1996:64\u2013173","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"9578_CR28","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.cose.2013.09.001","volume":"39","author":"YB Saied","year":"2013","unstructured":"Saied YB, Olivereau A, Zeghlache D et al (2013) Trust management system design for the internet of things: a context-aware and multi-service approach. Computers and Security 39:351\u2013365","journal-title":"Computers and Security"},{"issue":"2","key":"9578_CR29","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"Y Sun","year":"2006","unstructured":"Sun Y, Wei L, Zhu H (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24(2):305\u2013317","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"9578_CR30","doi-asserted-by":"crossref","unstructured":"Szalachowski P, Matsumoto S, Perrig A (2015) PoliCert: secure and flexible TLS certificate management. ACM CCS2014. 406-417.","DOI":"10.1145\/2660267.2660355"},{"issue":"10","key":"9578_CR31","first-page":"1","volume":"48","author":"W Wan","year":"2019","unstructured":"Wan W, Chen J, Zhang S (2019) A cluster correlation power analysis against double blinding exponentiation. Journal of Information Security and Applications 48(10):1\u20138","journal-title":"Journal of Information Security and Applications"},{"issue":"8","key":"9578_CR32","first-page":"1","volume":"2018","author":"J Wang","year":"2018","unstructured":"Wang J, Gao Y, Ying X et al (2018) An enhanced PEGASIS algorithm with mobile sink support for wireless sensor networks. Wireless Communications & Mobile Computing 2018(8):1\u20139","journal-title":"Wireless Communications & Mobile Computing"},{"key":"9578_CR33","doi-asserted-by":"publisher","first-page":"155014771983958","DOI":"10.1177\/1550147719839581","volume":"15","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Liu W, Sangaiah AK, Kim HJ (2019) An intelligent data gathering schema with data fusion supported for mobile sink in WSNs. International Journal of Distributed Sensor Networks 15:155014771983958. https:\/\/doi.org\/10.1177\/1550147719839581","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"3","key":"9578_CR34","doi-asserted-by":"publisher","first-page":"711","DOI":"10.32604\/cmc.2019.05450","volume":"58","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Liu W, Wu, Se-Jung Lim W (2019) An asynchronous clustering and mobile data gathering scheme based on timer mechanism in wireless sensor networks. Computers, Materials & Continua. 58(3):711\u2013725","journal-title":"Computers, Materials & Continua."},{"issue":"1","key":"9578_CR35","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1186\/s13673-019-0179-4","volume":"9","author":"J Wang","year":"2019","unstructured":"Wang J, Gu X, Liu W, Sangaiah AK, Kim HJ (2019) An empower Hamilton loop-based data collection algorithm with mobile agent for WSNs. Human-centric Computing and Information Sciences 9(1):18","journal-title":"Human-centric Computing and Information Sciences"},{"issue":"19","key":"9578_CR36","doi-asserted-by":"publisher","first-page":"2579","DOI":"10.3390\/s19112579","volume":"2019","author":"J Wang","year":"2019","unstructured":"Wang J, Gao Y, Wang K et al (2019) An affinity propagation-based self-adaptive clustering method for wireless sensor networks. Sensors. 2019(19):2579","journal-title":"Sensors."},{"key":"9578_CR37","doi-asserted-by":"crossref","unstructured":"Xiao H, Sidhu N, Christianson B (2015) Guarantor and reputation-based trust model for social internet of things. IWCMC15. 600-605.","DOI":"10.1109\/IWCMC.2015.7289151"},{"issue":"6","key":"9578_CR38","doi-asserted-by":"publisher","first-page":"3352","DOI":"10.1109\/JIOT.2018.2882820","volume":"264","author":"B Yin","year":"2019","unstructured":"Yin B, We X (2019) Communication-efficient data aggregation tree construction for complex queries in IoT applications. IEEE Internet Things J 264(6):3352\u20133363","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"9578_CR39","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1109\/JIOT.2017.2781737","volume":"5","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, He Q, Xiang Y, Zhang LY, Liu B, Chen J, Xie Y (2018) Low-cost and confidentiality-preserving data acquisition for internet of multimedia things. IEEE Internet Things J 5(5):3442\u20133451","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"9578_CR40","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1504\/IJSNET.2019.101567","volume":"31","author":"X Zhang","year":"2019","unstructured":"Zhang X, Duan J, Sun W, Jha SK (2019) A tumour perception system based on a multi-layer mass-spring model. International Journal of Sensor Networks 31(1):24\u201332","journal-title":"International Journal of Sensor Networks"},{"key":"9578_CR41","doi-asserted-by":"crossref","unstructured":"Zhang Y, He Q, Chen G et al. (2020) A low-overhead, confidentiality-assured, and authenticated data acquisition framework for IoT. IEEE Transactions on Industrial Informatics In press.","DOI":"10.1109\/TII.2019.2957404"},{"issue":"3","key":"9578_CR42","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/MNET.2018.1700164","volume":"32","author":"W Zhao","year":"2018","unstructured":"Zhao W, Liu J, Guo H, Hara T (2018) Etc-iot: edge-node-assisted transmitting for the cloud-centric internet of things. IEEE Netw 32(3):101\u2013107","journal-title":"IEEE Netw"},{"key":"9578_CR43","doi-asserted-by":"crossref","unstructured":"Zhu Q, Loke S, Trujillo-Rasua R, Jiang F et al. (2019) Applications of distributed ledger technologies to the internet of things: a survey. ACM computing surveys (CSUR). 52(6), 120:1-34.","DOI":"10.1145\/3359982"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09578-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-020-09578-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-020-09578-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,15]],"date-time":"2021-09-15T05:23:31Z","timestamp":1631683411000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-020-09578-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,17]]},"references-count":43,"journal-issue":{"issue":"20","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["9578"],"URL":"https:\/\/doi.org\/10.1007\/s11042-020-09578-y","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,17]]},"assertion":[{"value":"12 February 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 August 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Compliance with ethical standards"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of interest"}}]}}