{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T01:23:01Z","timestamp":1769908981584,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:00:00Z","timestamp":1699574400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T00:00:00Z","timestamp":1699574400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2024,4]]},"DOI":"10.1007\/s11227-023-05763-6","type":"journal-article","created":{"date-parts":[[2023,11,10]],"date-time":"2023-11-10T15:02:27Z","timestamp":1699628547000},"page":"7849-7875","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model"],"prefix":"10.1007","volume":"80","author":[{"given":"Ali M.","family":"Al Shahrani","sequence":"first","affiliation":[]},{"given":"Ali","family":"Rizwan","sequence":"additional","affiliation":[]},{"given":"Manuel","family":"S\u00e1nchez-Chero","sequence":"additional","affiliation":[]},{"given":"Lilia Lucy Campos","family":"Cornejo","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Shabaz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,11,10]]},"reference":[{"issue":"9","key":"5763_CR1","doi-asserted-by":"publisher","first-page":"9244","DOI":"10.1109\/TVT.2021.3049189","volume":"70","author":"F Ahmad","year":"2021","unstructured":"Ahmad F, Kurugollu F, Kerrache CA, Sezer S, Liu L (2021) NOTRINO: a novel hybrid trust management scheme for internet-of-vehicles. IEEE Trans Veh Technol 70(9):9244\u20139257. https:\/\/doi.org\/10.1109\/TVT.2021.3049189","journal-title":"IEEE Trans Veh Technol"},{"key":"5763_CR2","doi-asserted-by":"publisher","first-page":"62095","DOI":"10.1109\/ACCESS.2019.2916340","volume":"7","author":"KA Awan","year":"2019","unstructured":"Awan KA, Ud Din I, Almogren A, Guizani M, Altameem A, Jadoon SU (2019) Robust trust\u2014a pro-privacy robust distributed trust management mechanism for internet of things. IEEE Access 7:62095\u201362106. https:\/\/doi.org\/10.1109\/ACCESS.2019.2916340","journal-title":"IEEE Access"},{"key":"5763_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/WD.2019.8734204","volume":"2019","author":"F Ahmad","year":"2019","unstructured":"Ahmad F, Adnane A, Kurugollu F, Hussain R (2019) A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks. Wirel Days (WD) 2019:1\u20138. https:\/\/doi.org\/10.1109\/WD.2019.8734204","journal-title":"Wirel Days (WD)"},{"key":"5763_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICSENS.2018.8589697","volume":"2018","author":"VB Reddy","year":"2018","unstructured":"Reddy VB, Negi A, Venkataraman S (2018) Trust computation model using hysteresis curve for wireless sensor networks. IEEE Sens 2018:1\u20134. https:\/\/doi.org\/10.1109\/ICSENS.2018.8589697","journal-title":"IEEE Sens"},{"key":"5763_CR5","unstructured":"Yang B, Yamamoto R, Tanaka Y (2012) Historical evidence-based trust management strategy against black hole attacks in MANET. In: 2012 14th International Conference on Advanced Communication Technology (ICACT), pp 394\u2013399"},{"key":"5763_CR6","doi-asserted-by":"publisher","unstructured":"Rajamani S (2016) Keynote talk III: trusted cloud: how to make the cloud more secure. In: 2016 ACM\/IEEE International Conference on Formal Methods and Models for System Design (MEMOCODE), p 132. https:\/\/doi.org\/10.1109\/MEMCOD.2016.7797757","DOI":"10.1109\/MEMCOD.2016.7797757"},{"key":"5763_CR7","doi-asserted-by":"publisher","unstructured":"Lu Y, Lin K, Li K (2012) Trust evaluation model against insider attack in wireless sensor networks. In: 2012 Second International Conference on Cloud and Green Computing, pp 319\u2013326. https:\/\/doi.org\/10.1109\/CGC.2012.35","DOI":"10.1109\/CGC.2012.35"},{"key":"5763_CR8","doi-asserted-by":"publisher","unstructured":"Shakkira K, Mohamed Mubarak T (2015) advanced lightweight, dependable and secure trust system for clustered wireless sensor networks. In: 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), pp 1\u20134. https:\/\/doi.org\/10.1109\/ICIIECS.2015.7193162.","DOI":"10.1109\/ICIIECS.2015.7193162"},{"key":"5763_CR9","doi-asserted-by":"publisher","unstructured":"Chen M, Chen L, Dai Z, Shao Z, Ma Y (2021) Trust evaluation based on variable weight synthesis. In: 2021 IEEE 23rd International Conference on High Performance Computing & communications; 7th International Conference on Data Science & Systems; 19th International Conference on Smart City; 7th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC\/DSS\/Smart City\/DependSys), pp 1685\u20131692. https:\/\/doi.org\/10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00248","DOI":"10.1109\/HPCC-DSS-SmartCity-DependSys53884.2021.00248"},{"issue":"12","key":"5763_CR10","doi-asserted-by":"publisher","first-page":"3921","DOI":"10.1109\/JSEN.2017.2699561","volume":"17","author":"V Busi Reddy","year":"2017","unstructured":"Busi Reddy V, Venkataraman S, Negi A (2017) Communication and data trust for wireless sensor networks using D-S theory. IEEE Sens J 17(12):3921\u20133929. https:\/\/doi.org\/10.1109\/JSEN.2017.2699561","journal-title":"IEEE Sens J"},{"key":"5763_CR11","doi-asserted-by":"publisher","unstructured":"Yang B, Yamamoto R, Tanaka Y (2014) Dempster-Shafer evidence theory-based trust management strategy against cooperative black hole attacks and gray hole attacks in MANETs. In: 16th International Conference on Advanced Communication Technology, pp 223\u2013232. https:\/\/doi.org\/10.1109\/ICACT.2014.6779177","DOI":"10.1109\/ICACT.2014.6779177"},{"key":"5763_CR12","doi-asserted-by":"publisher","unstructured":"Choi J, Park J, Seol J, Maeng S (2013) Isolated mini-domain for trusted cloud computing. In: 2013 13th IEEE\/ACM international symposium on cluster, cloud, and grid computing, pp 194\u2013195. https:\/\/doi.org\/10.1109\/CCGrid.2013.69","DOI":"10.1109\/CCGrid.2013.69"},{"key":"5763_CR13","doi-asserted-by":"publisher","unstructured":"Muzammal SM, Murugesan RK, Jhanjhi NZ, Jung LT (2020) SMTrust: proposing trust-based secure routing protocol for rpl attacks for iot applications. In: 2020 International Conference on Computational Intelligence (ICCI), pp 305\u2013310. https:\/\/doi.org\/10.1109\/ICCI51257.2020.9247818","DOI":"10.1109\/ICCI51257.2020.9247818"},{"key":"5763_CR14","doi-asserted-by":"publisher","unstructured":"Labraoui N (2015) A reliable trust management scheme in wireless sensor networks. In: 2015 12th international symposium on programming and systems (ISPS, pp 1\u20136. https:\/\/doi.org\/10.1109\/ISPS.2015.7244958","DOI":"10.1109\/ISPS.2015.7244958"},{"key":"5763_CR15","doi-asserted-by":"publisher","unstructured":"Gonzalez JM, Anwar M, Joshi JBD (2011) A trust-based approach against IP-spoofing attacks. In: 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp 63\u201370. https:\/\/doi.org\/10.1109\/PST.2011.5971965","DOI":"10.1109\/PST.2011.5971965"},{"key":"5763_CR16","doi-asserted-by":"publisher","unstructured":"Duan J, Yang D, Zhang S, Zhao J, Gidlund M (2013) A trust management scheme for industrial wireless sensor networks. In: IECON 2013-39th Annual Conference of the IEEE Industrial Electronics Society, pp 5576\u20135581. https:\/\/doi.org\/10.1109\/IECON.2013.6700047","DOI":"10.1109\/IECON.2013.6700047"},{"issue":"4","key":"5763_CR17","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1109\/TDSC.2011.65","volume":"9","author":"J Ho","year":"2012","unstructured":"Ho J, Wright M, Das SK (2012) Zone trust: fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing. IEEE Trans Dependable Secur Comput 9(4):494\u2013511. https:\/\/doi.org\/10.1109\/TDSC.2011.65","journal-title":"IEEE Trans Dependable Secur Comput"},{"key":"5763_CR18","doi-asserted-by":"publisher","unstructured":"Zhou N, Fang W, Zhang W, Lv X, Huang J (2018) A novel trust management scheme for defending against on-off attack based on gaussian distribution. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (Smart Data), pp 1806\u20131811. https:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00300","DOI":"10.1109\/Cybermatics_2018.2018.00300"},{"key":"5763_CR19","doi-asserted-by":"publisher","unstructured":"Saidi A (2021) Trust evaluation method for wireless sensor networks based on behavioral similarity and similarity coefficient. In: 2021 International Conference on Networking and Advanced Systems (ICNAS), pp 1\u20136. https:\/\/doi.org\/10.1109\/ICNAS53565.2021.9628892","DOI":"10.1109\/ICNAS53565.2021.9628892"},{"key":"5763_CR20","doi-asserted-by":"publisher","unstructured":"Xu M, He J, Zhang B, Zhang H (2007) A new data protecting scheme based on TPM. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel\/Distributed Computing (SNPD 2007), pp 943\u2013947. https:\/\/doi.org\/10.1109\/SNPD.2007.276","DOI":"10.1109\/SNPD.2007.276"},{"key":"5763_CR21","unstructured":"Li Q, Wen Z, Wu Z, Hu S, Wang N, He B (2019) A survey on federated learning systems: Vision, hype and reality for data privacy and protection. arXiv:1907.09693"},{"issue":"2","key":"5763_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3298981","volume":"10","author":"Q Yang","year":"2019","unstructured":"Yang Q, Liu Y, Chen T, Tong Y (2019) Federated machine learning: concept and applications. ACM Trans Intell Syst Technol (TIST) 10(2):1\u201319","journal-title":"ACM Trans Intell Syst Technol (TIST)"},{"issue":"4","key":"5763_CR23","doi-asserted-by":"publisher","first-page":"4298","DOI":"10.1109\/TVT.2020.2973651","volume":"69","author":"Y Lu","year":"2020","unstructured":"Lu Y, Huang X, Zhang K, Maharjan S, Zhang Y (2020) Blockchain empowered asynchronous federated learning for secure data sharing in internet of vehicles. IEEE Trans Veh Technol 69(4):4298\u20134311","journal-title":"IEEE Trans Veh Technol"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05763-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-023-05763-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-023-05763-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,25]],"date-time":"2024-03-25T11:44:47Z","timestamp":1711367087000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-023-05763-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,10]]},"references-count":23,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["5763"],"URL":"https:\/\/doi.org\/10.1007\/s11227-023-05763-6","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,10]]},"assertion":[{"value":"26 October 2023","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 November 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}