{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:11:31Z","timestamp":1774717891793,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11227-021-04231-3","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:03:13Z","timestamp":1641600193000},"page":"8302-8320","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["LBTM: A lightweight blockchain-based trust management system for social internet of things"],"prefix":"10.1007","volume":"78","author":[{"given":"Mohammad","family":"Amiri-Zarandi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3728-0275","authenticated-orcid":false,"given":"Rozita A.","family":"Dara","sequence":"additional","affiliation":[]},{"given":"Evan","family":"Fraser","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"key":"4231_CR1","doi-asserted-by":"crossref","unstructured":"Abdelghani W, Zayani CA, Amous I, S\u00e8des F (2016) Trust management in social internet of things: a survey. In: Conference on e-Business, e-Services and e-Society, Springer, pp 430-441","DOI":"10.1007\/978-3-319-45234-0_39"},{"key":"4231_CR2","doi-asserted-by":"crossref","unstructured":"Abderrahim OB, Elhedhili MH, Saidane L (2017) Ctms-siot: A context-based trust management system for the social internet of things. In: 2017 13th International wireless communications and mobile computing conference (IWCMC), IEEE, pp 1903-190800000","DOI":"10.1109\/IWCMC.2017.7986574"},{"key":"4231_CR3","doi-asserted-by":"crossref","unstructured":"Amiri-Zarandi M, Dara RA (2020) Blockchain-based trust management in social internet of things. In: 2020 IEEE , International conference on dependable, autonomic and secure computing, international conference on pervasive intelligence and computing, international conference on cloud and big data computing, international conference on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech),IEEE, pp 49-54","DOI":"10.1109\/DASC-PICom-CBDCom-CyberSciTech49142.2020.00024"},{"key":"4231_CR4","doi-asserted-by":"publisher","first-page":"101921","DOI":"10.1016\/j.cose.2020.101921","volume":"96","author":"M Amiri-Zarandi","year":"2020","unstructured":"Amiri-Zarandi M, Dara RA, Fraser E (2020) A survey of machine learning-based solutions to protect privacy in the internet of things. Comput Secur 96:101921","journal-title":"Comput Secur"},{"issue":"1","key":"4231_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1109\/MCOM.2014.6710070","volume":"52","author":"L Atzori","year":"2014","unstructured":"Atzori L, Iera A, Morabito G (2014) From\u2019\u2019 smart objects\u2019\u2019 to\u2019\u2019 social objects\u2019\u2019: the next evolutionary step of the internet of things. IEEE Commun Mag 52(1):97\u2013105","journal-title":"IEEE Commun Mag"},{"key":"4231_CR6","doi-asserted-by":"publisher","first-page":"62095","DOI":"10.1109\/ACCESS.2019.2916340","volume":"7","author":"KA Awan","year":"2019","unstructured":"Awan KA, Din IU, Almogren A, Guizani M, Altameem A, Jadoon SU (2019) Robusttrust-a pro-privacy robust distributed trust management mechanism for internet of things. IEEE Access 7:62095\u201362106","journal-title":"IEEE Access"},{"issue":"4","key":"4231_CR7","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MNET.2018.1700031","volume":"32","author":"E Baccarelli","year":"2018","unstructured":"Baccarelli E, Scarpiniti M, Naranjo PGV, Vaca-Cardenas L (2018) Fog of social iot: when the fog becomes social. IEEE Netw 32(4):68\u201380","journal-title":"IEEE Netw"},{"issue":"1","key":"4231_CR8","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra J, Bengio Y (2012) Random search for hyper-parameter optimization. J Mach Learn Res 13(1):281\u2013305","journal-title":"J Mach Learn Res"},{"key":"4231_CR9","unstructured":"Brody P, Pureswaran V (2015) Device democracy: saving the future of the Internet of Things - IBM global business services executive report. IBM global business services executive report, http:\/\/m2mworldnews.com\/download\/white-papers\/IBM-Saving-the-future-of-IoT.pdf, pp 3-25"},{"key":"4231_CR10","unstructured":"Buterin V, et\u00a0al. (2014) Ethereum: a next-generation smart contract and decentralized application platform. URL https:\/\/github. com\/ethereum\/wiki\/wiki\/% 5BEnglish% 5D-White-Paper 7"},{"issue":"6","key":"4231_CR11","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TDSC.2015.2420552","volume":"13","author":"R Chen","year":"2015","unstructured":"Chen R, Bao F, Guo J (2015) Trust-based service management for social internet of things systems. IEEE Trans Dependable Secure Comp 13(6):684\u2013696","journal-title":"IEEE Trans Dependable Secure Comp"},{"issue":"4","key":"4231_CR12","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1002\/dac.2930","volume":"29","author":"Z Chen","year":"2016","unstructured":"Chen Z, Ling R, Huang CM, Zhu X (2016) A scheme of access service recommendation for the social internet of things. Int J Commun Syst 29(4):694\u2013706","journal-title":"Int J Commun Syst"},{"key":"4231_CR13","doi-asserted-by":"crossref","unstructured":"Di Pietro R, Salleras X, Signorini M, Waisbard E (2018) A blockchain-based trust system for the internet of things. In: Proceedings of the 23nd ACM on symposium on access control models and technologies, pp 77\u201383","DOI":"10.1145\/3205977.3205993"},{"key":"4231_CR14","doi-asserted-by":"crossref","unstructured":"Dorri A, Kanhere SS, Jurdak R (2017) Towards an optimized blockchain for iot. In: 2017 IEEE\/ACM Second international conference on Internet-of-Things design and implementation (IoTDI), IEEE, pp 173-178","DOI":"10.1145\/3054977.3055003"},{"key":"4231_CR15","doi-asserted-by":"crossref","unstructured":"Dorri A, Kanhere SS, Jurdak R, Gauravaram P (2017) Blockchain for iot security and privacy: The case study of a smart home. In: 2017 IEEE international conference on pervasive computing and communications workshops (PerCom workshops), IEEE, pp 618-623","DOI":"10.1109\/PERCOMW.2017.7917634"},{"issue":"2","key":"4231_CR16","doi-asserted-by":"publisher","first-page":"326","DOI":"10.3390\/s19020326","volume":"19","author":"AD Dwivedi","year":"2019","unstructured":"Dwivedi AD, Srivastava G, Dhar S, Singh R (2019) A decentralized privacy-preserving healthcare blockchain for iot. Sensors 19(2):326","journal-title":"Sensors"},{"key":"4231_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","volume":"126","author":"Q Feng","year":"2019","unstructured":"Feng Q, He D, Zeadally S, Khan MK, Kumar N (2019) A survey on privacy protection in blockchain system. J Netw Comp Appl 126:45\u201358","journal-title":"J Netw Comp Appl"},{"issue":"4","key":"4231_CR18","doi-asserted-by":"publisher","first-page":"1231","DOI":"10.1109\/TEM.2019.2918162","volume":"67","author":"G Fortino","year":"2019","unstructured":"Fortino G, Messina F, Rosaci D, Sarn\u00e9 GM (2019) Using blockchain in a reputation-based model for grouping agents in the internet of things. IEEE Trans Eng Manag 67(4):1231\u20131243","journal-title":"IEEE Trans Eng Manag"},{"key":"4231_CR19","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.cose.2018.06.004","volume":"78","author":"MT Hammi","year":"2018","unstructured":"Hammi MT, Hammi B, Bellot P, Serhrouchni A (2018) Bubbles of trust: a decentralized blockchain-based authentication system for iot. Comput Secur 78:126\u2013142","journal-title":"Comput Secur"},{"key":"4231_CR20","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","volume":"97","author":"MU Hassan","year":"2019","unstructured":"Hassan MU, Rehmani MH, Chen J (2019) Privacy preservation in blockchain based iot systems: Integration issues, prospects, challenges, and future research directions. Futur Gener Comput Syst 97:512\u2013529","journal-title":"Futur Gener Comput Syst"},{"key":"4231_CR21","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1016\/j.compeleceng.2016.09.024","volume":"58","author":"P Kasnesis","year":"2017","unstructured":"Kasnesis P, Patrikakis CZ, Kogias D, Toumanidis L, Venieris IS (2017) Cognitive friendship and goal management for the social iot. Comput Electr Eng 58:412\u2013428","journal-title":"Comput Electr Eng"},{"issue":"4","key":"4231_CR22","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","volume":"19","author":"N Kshetri","year":"2017","unstructured":"Kshetri N (2017) Can blockchain strengthen the internet of things? IT Prof 19(4):68\u201372","journal-title":"IT Prof"},{"issue":"2","key":"4231_CR23","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10207-008-0068-8","volume":"8","author":"J Li","year":"2009","unstructured":"Li J, Li N, Wang X, Yu T (2009) Denial of service attacks and defenses in decentralized trust management. Int J Inf Secur 8(2):89\u2013101","journal-title":"Int J Inf Secur"},{"issue":"2","key":"4231_CR24","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1109\/TKDE.2017.2762678","volume":"30","author":"Z Lin","year":"2017","unstructured":"Lin Z, Dong L (2017) Clarifying trust in social internet of things. IEEE Trans Knowl Data Eng 30(2):234\u2013248","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"4231_CR25","doi-asserted-by":"publisher","first-page":"1899","DOI":"10.1109\/JIOT.2017.2707465","volume":"4","author":"Z Ling","year":"2017","unstructured":"Ling Z, Luo J, Xu Y, Gao C, Wu K, Fu X (2017) Security vulnerabilities of internet of things: a case study of the smart plug system. IEEE Int Things J 4(6):1899\u20131909","journal-title":"IEEE Int Things J"},{"issue":"1","key":"4231_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2556612","volume":"8","author":"J Mcauley","year":"2014","unstructured":"Mcauley J, Leskovec J (2014) Discovering social circles in ego networks. ACM Trans Knowl Discov Data (TKDD) 8(1):1\u201328","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"4231_CR27","doi-asserted-by":"publisher","first-page":"1027","DOI":"10.1016\/j.future.2019.09.050","volume":"102","author":"SN Mohanty","year":"2020","unstructured":"Mohanty SN, Ramya K, Rani SS, Gupta D, Shankar K, Lakshmanaprabu S, Khanna A (2020) An efficient lightweight integrated blockchain (elib) model for iot security and privacy. Futur Gener Comput Syst 102:1027\u20131037","journal-title":"Futur Gener Comput Syst"},{"key":"4231_CR28","unstructured":"Moinet A, Darties B, Baril JL (2017) Blockchain based trust & authentication for decentralized sensor networks. arXiv preprint arXiv:1706.01730"},{"issue":"5","key":"4231_CR29","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","volume":"26","author":"M Nitti","year":"2013","unstructured":"Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253\u20131266","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"4231_CR30","doi-asserted-by":"crossref","unstructured":"Pearson S (2013) Privacy, security and trust in cloud computing. In: Privacy and security for cloud computing, Springer, pp 3-42","DOI":"10.1007\/978-1-4471-4189-1_1"},{"key":"4231_CR31","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.compeleceng.2018.08.021","volume":"72","author":"Y Qian","year":"2018","unstructured":"Qian Y, Jiang Y, Chen J, Zhang Y, Song J, Zhou M, Pusti\u0161ek M (2018) Towards decentralized iot security enhancement: a blockchain approach. Comput Electr Eng 72:266\u2013273","journal-title":"Comput Electr Eng"},{"key":"4231_CR32","doi-asserted-by":"crossref","unstructured":"Rafey SEA, Abdel-Hamid A, Abou El-Nasr M (2016) Cbstm-iot: Context-based social trust model for the internet of things. In: 2016 International conference on selected topics in mobile & wireless networking (MoWNeT), IEEE, pp 1-8","DOI":"10.1109\/MoWNet.2016.7496623"},{"issue":"3","key":"4231_CR33","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1093\/sysbio\/45.3.380","volume":"45","author":"R Real","year":"1996","unstructured":"Real R, Vargas JM (1996) The probabilistic basis of jaccard\u2019s index of similarity. Syst Biol 45(3):380\u2013385","journal-title":"Syst Biol"},{"key":"4231_CR34","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","volume":"88","author":"A Reyna","year":"2018","unstructured":"Reyna A, Mart\u00edn C, Chen J, Soler E, D\u00edaz M (2018) On blockchain and its integration with iot. challenges and opportunities. Futur Gener comput syst 88:173\u2013190","journal-title":"Futur Gener comput syst"},{"key":"4231_CR35","doi-asserted-by":"crossref","unstructured":"Son H, Kang N, Gwak B, Lee D (2017) An adaptive iot trust estimation scheme combining interaction history and stereotypical reputation. In: 2017 14th IEEE Annual consumer communications & networking conference (CCNC), IEEE, pp 349-352","DOI":"10.1109\/CCNC.2017.7983132"},{"issue":"6","key":"4231_CR36","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.3390\/s17061346","volume":"17","author":"NB Truong","year":"2017","unstructured":"Truong NB, Lee H, Askwith B, Lee GM (2017) Toward a trust evaluation mechanism in the social internet of things. Sensors 17(6):1346","journal-title":"Sensors"},{"issue":"3","key":"4231_CR37","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","volume":"18","author":"F Tschorsch","year":"2016","unstructured":"Tschorsch F, Scheuermann B (2016) Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun Surv Tutor 18(3):2084\u20132123","journal-title":"IEEE Commun Surv Tutor"},{"key":"4231_CR38","doi-asserted-by":"crossref","unstructured":"Wang JP, Bin S, Yu Y, Niu XX (2013) Distributed trust management mechanism for the internet of things. In: Applied Mechanics and Materials, 347: 2463-2467. Trans Tech Publ","DOI":"10.4028\/www.scientific.net\/AMM.347-350.2463"},{"issue":"2014","key":"4231_CR39","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"4231_CR40","doi-asserted-by":"publisher","first-page":"23626","DOI":"10.1109\/ACCESS.2018.2831898","volume":"6","author":"J Yuan","year":"2018","unstructured":"Yuan J, Li X (2018) A reliable and lightweight trust computing mechanism for iot edge devices based on multi-source feedback information fusion. IEEE Access 6:23626\u201323638","journal-title":"IEEE Access"},{"key":"4231_CR41","doi-asserted-by":"publisher","first-page":"33859","DOI":"10.1109\/ACCESS.2019.2904544","volume":"7","author":"J Zhao","year":"2019","unstructured":"Zhao J, Huang J, Xiong N (2019) An effective exponential-based trust and reputation evaluation system in wireless sensor networks. IEEE Access 7:33859\u201333869","journal-title":"IEEE Access"},{"issue":"2","key":"4231_CR42","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MCOM.2018.1700592","volume":"56","author":"C Zhu","year":"2018","unstructured":"Zhu C, Rodrigues JJ, Leung VC, Shu L, Yang LT (2018) Trust-based communication for the industrial internet of things. IEEE Commun Mag 56(2):16\u201322","journal-title":"IEEE Commun Mag"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04231-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-04231-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-04231-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T14:01:22Z","timestamp":1648821682000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-04231-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":42,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["4231"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-04231-3","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"6 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}