{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T11:00:57Z","timestamp":1776942057797,"version":"3.51.4"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2020,1,18]],"date-time":"2020-01-18T00:00:00Z","timestamp":1579305600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,18]],"date-time":"2020-01-18T00:00:00Z","timestamp":1579305600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1007\/s11277-020-07092-w","type":"journal-article","created":{"date-parts":[[2020,1,18]],"date-time":"2020-01-18T06:02:40Z","timestamp":1579327360000},"page":"1079-1112","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN"],"prefix":"10.1007","volume":"112","author":[{"given":"Rupayan","family":"Das","sequence":"first","affiliation":[]},{"given":"Dinesh","family":"Dash","sequence":"additional","affiliation":[]},{"given":"Mrinal Kanti","family":"Sarkar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,18]]},"reference":[{"issue":"4","key":"7092_CR1","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1109\/TMC.2004.41","volume":"3","author":"O Younis","year":"2004","unstructured":"Younis, O., & Fahmy, S. (2004). HEED: A hybrid, energy-efficient, distributed clustering approach for ad-hoc sensor networks. IEEE Transactions on Mobile Computing, 3(4), 366\u2013379.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"4","key":"7092_CR2","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1016\/j.comcom.2008.11.025","volume":"32","author":"D Kumar","year":"2009","unstructured":"Kumar, D., Aseri, T. C., & Patel, R. B. (2009). EEHC: Energy efficient heterogeneous clustered scheme for wireless sensor networks. Computer Communications, 32(4), 662\u2013667.","journal-title":"Computer Communications"},{"issue":"4","key":"7092_CR3","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman, W. B., Chandrakasan, A. P., & Balakrishnan, H. (2002). An application-specific protocol architecture for wireless microsensor networks. IEEE Transactions on Wireless Communications, 1(4), 660\u2013670.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"10","key":"7092_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.14299\/ijser.2012.10.001","volume":"3","author":"M Singh","year":"2012","unstructured":"Singh, M., & Das, R. (2012). Survey of different techniques to detect wormhole attack in wireless sensor network. International Journal of Scientific and Engineering Research (IJSER), 3(10), 1\u20136. ISSN 2229-5518.","journal-title":"International Journal of Scientific and Engineering Research (IJSER)"},{"issue":"12","key":"7092_CR5","doi-asserted-by":"publisher","first-page":"7229","DOI":"10.1007\/s13369-017-3052-7","volume":"43","author":"RR Sahoo","year":"2018","unstructured":"Sahoo, R. R., Ray, S., Sarkar, S., & Bhoi, S. K. (2018). Guard against trust management vulnerabilities in wireless sensor network. Arabian Journal for Science and Engineering, 43(12), 7229\u20137251.","journal-title":"Arabian Journal for Science and Engineering"},{"issue":"8","key":"7092_CR6","doi-asserted-by":"publisher","first-page":"5137","DOI":"10.1007\/s11277-017-4772-4","volume":"97","author":"N Karthik","year":"2017","unstructured":"Karthik, N., & Ananthanarayana, V. S. (2017). A hybrid trust management scheme for wireless sensor networks. Wireless Personal Communications, 97(8), 5137\u20135170.","journal-title":"Wireless Personal Communications"},{"issue":"6","key":"7092_CR7","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TIFS.2013.2240299","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., Zhou, F., & Du, J. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(6), 924\u2013935.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"issue":"11","key":"7092_CR8","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"RA Shaikh","year":"2009","unstructured":"Shaikh, R. A., Jameel, H., & d\u2019Auriol, B. J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20(11), 1698\u20131712.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"7092_CR9","doi-asserted-by":"crossref","unstructured":"Ganeriwal, S., & Srivastava, M. B. (2008). Reputation-based framework for high integrity sensor networks. In Proceedings of the ACM workshop on security (Vol. 4(3), No. 15).","DOI":"10.1145\/1362542.1362546"},{"key":"7092_CR10","doi-asserted-by":"crossref","unstructured":"Chen, H., Wu, H., Hu, J., & Gao, C. (2008). Agent-based trust management model for wireless sensor networks. In International conference on multimedia and ubiquitous engineering (pp. 150\u2013154).","DOI":"10.1109\/MUE.2008.65"},{"key":"7092_CR11","doi-asserted-by":"crossref","unstructured":"Yao, Z., Kim, D., & Doh, Y. (2006). PLUS: Parameterized and localized trust management scheme for sensor networks security. In Proceedings of the 3rd IEEE international conference on mobile ad hoc and sensor systems (MASS\u201906) (pp. 437\u2013446).","DOI":"10.1109\/MOBHOC.2006.278584"},{"issue":"2","key":"7092_CR12","first-page":"146","volume":"13","author":"L Shen","year":"2008","unstructured":"Shen, L., & Shi, X. (2008). A dynamic cluster-based key management protocol in wireless. International Journal of Intelligent Control and Systems, 13(2), 146\u2013151.","journal-title":"International Journal of Intelligent Control and Systems"},{"issue":"8","key":"7092_CR13","first-page":"3037","volume":"2","author":"U Narayanan","year":"2013","unstructured":"Narayanan, U., & Soman, A. (2013). CAFS: Cluster based authentication scheme for filtering false data in wireless sensor network. International Journal of Advanced Research in Computer and Communication Engineering, 2(8), 3037\u20133041.","journal-title":"International Journal of Advanced Research in Computer and Communication Engineering"},{"key":"7092_CR14","doi-asserted-by":"crossref","unstructured":"Yeh, H.-L., Chen, T.-H., Liu, P.-C., Kim, T.-H., & Wei, H.-W. (2011). A secured authentication protocol for wireless sensor networks using elliptic curves cryptography. In 11th international workshop on knowledge management and acquisition for smart systems and services (PKAW 2010) (Vol. 11(5), p. 4767).","DOI":"10.3390\/s110504767"},{"issue":"1","key":"7092_CR15","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.adhoc.2006.05.011","volume":"5","author":"Y Cheng","year":"2007","unstructured":"Cheng, Y., & Agrawal, D. P. (2007). An improved key distribution mechanism for large-scale hierarchical wireless sensor networks. Elsevier, Security Issues in Sensor and Ad Hoc Networks, 5(1), 35\u201348.","journal-title":"Elsevier, Security Issues in Sensor and Ad Hoc Networks"},{"key":"7092_CR16","doi-asserted-by":"crossref","unstructured":"Chen, H., Wu, H., Hu, J., & Gao, C. (2008). Event-based trust framework model in wireless sensor networks. In International conference on networking, architecture, and storage (pp. 359\u2013364).","DOI":"10.1109\/NAS.2008.33"},{"issue":"4","key":"7092_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0167-9236(00)00084-1","volume":"29","author":"G Zacharia","year":"2000","unstructured":"Zacharia, G., Moukas, A., & Mae, P. (2000). Collaborative reputation mechanisms for electronic marketplaces. Decision Support Systems, 29(4), 1\u20137.","journal-title":"Decision Support Systems"},{"issue":"2","key":"7092_CR18","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.jpdc.2006.08.001","volume":"67","author":"K Liu","year":"2007","unstructured":"Liu, K., Abu-Ghazaleh, N., & Kang, K.-D. (2007). Location verification and trust management for resilient geographic routing. Journal of Parallel and Distributed Computing, 67(2), 215\u2013228.","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"1","key":"7092_CR19","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/TSMCA.2009.2030730","volume":"40","author":"Z Liang","year":"2010","unstructured":"Liang, Z., & Shi, W. (2010). TRECON: A trust-based economic framework for efficient internet routing. IEEE Transactions on Systems, Man, and Cybernetics\u2014Part A: Systems and Humans, 40(1), 52\u201367.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics\u2014Part A: Systems and Humans"},{"issue":"2","key":"7092_CR20","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","volume":"24","author":"G Theodorakopoulos","year":"2006","unstructured":"Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318\u20133289.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"7092_CR21","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1142\/S0218843003000681","volume":"12","author":"J Carbo","year":"2003","unstructured":"Carbo, J., Molina, J. M., & Davila, J. (2003). Trust management through fuzzy reputation. International Journal of Cooperative Information Systems, 12(1), 135\u2013155.","journal-title":"International Journal of Cooperative Information Systems"},{"key":"7092_CR22","unstructured":"Carbo, J., Molina, J. M., & Davila, J. (2002). Comparing predictions of SPORAS vs. a fuzzy reputation system. In 3rd international conference on fuzzy sets and fuzzy systems."},{"key":"7092_CR23","doi-asserted-by":"crossref","unstructured":"Labraoui, N. (2015). A reliable trust management scheme in wireless sensor networks. In 12th international symposium on programming and systems (ISPS 2015) (pp. 1\u20136). Algiers.","DOI":"10.1109\/ISPS.2015.7244958"},{"issue":"7","key":"7092_CR24","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1002\/sec.1384","volume":"9","author":"W Luo","year":"2016","unstructured":"Luo, W., Ma, W., & Gao, Q. (2016). A dynamic trust management system for wireless sensor networks. Security and Communication Networks, Wiley Online Library, 9(7), 613\u2013621.","journal-title":"Security and Communication Networks, Wiley Online Library"},{"key":"7092_CR25","first-page":"281","volume-title":"Emerging research in computing, information, communication and applications","author":"Monia","year":"2016","unstructured":"Monia, Randhawa, S., & Jain, S. (2016). An efficient trust management algorithm in wireless sensor network. In N. R. Shetty, N. Hamsavath Prasad, & N. Nalini (Eds.), Emerging research in computing, information, communication and applications (Vol. 3, pp. 281\u2013287). Singapore: Springer."},{"issue":"2","key":"7092_CR26","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1049\/cje.2017.01.012","volume":"26","author":"J Guo","year":"2017","unstructured":"Guo, J., Ma, J., & Wan, T. (2017). A mutual evaluation based trust management method for wireless sensor networks. Chinese Journal of Electronics, 26(2), 407\u2013415.","journal-title":"Chinese Journal of Electronics"},{"issue":"99","key":"7092_CR27","first-page":"1","volume":"PP","author":"F Firoozi","year":"2018","unstructured":"Firoozi, F., Zadorozhny, V. I., & Li, F. Y. (2018). Subjective logic-based in-network data processing for trust management in collocated and distributed wireless sensor networks. IEEE Sensors Journal, PP(99), 1.","journal-title":"IEEE Sensors Journal"},{"key":"7092_CR28","doi-asserted-by":"crossref","unstructured":"Priayoheswari, B., Kulothungan, K., & Kannan, A. (2016). Beta reputation and direct trust model for secure communication in wireless sensor networks. In Proceeding ICIA-16 proceedings of the international conference on informatics and analytics (Vol. 73).","DOI":"10.1145\/2980258.2980413"},{"issue":"8","key":"7092_CR29","doi-asserted-by":"publisher","first-page":"157","DOI":"10.4236\/wsn.2014.68016","volume":"6","author":"S Babu","year":"2014","unstructured":"Babu, S., Raha, A., & Naskar, M. (2014). Trust evaluation based on node\u2019s characteristics and neighbouring nodes\u2019 recommendations for WSN. Wireless Sensor Network, 6(8), 157\u2013172.","journal-title":"Wireless Sensor Network"},{"key":"7092_CR30","unstructured":"Singh, M., & Das, R. (2015). KT3F: A key based two tier trust management filtering scheme for intrusion detection in wireless sensor network. In Proceedings of the 2nd international conference on computer and communication technologies (Springer series) (Vol. 379, pp. 679\u2013690)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07092-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-020-07092-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-07092-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,17]],"date-time":"2021-01-17T00:30:13Z","timestamp":1610843413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-020-07092-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,18]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,5]]}},"alternative-id":["7092"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-07092-w","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,18]]},"assertion":[{"value":"18 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}