{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T11:25:14Z","timestamp":1763810714794},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s11277-021-09256-8","type":"journal-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T07:02:30Z","timestamp":1635231750000},"page":"2625-2647","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Friendliness Based Trustworthy Relationship Management (F-TRM) in Social Internet of Things"],"prefix":"10.1007","volume":"123","author":[{"given":"Subash","family":"Rajendran","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R.","family":"Jebakumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,10,26]]},"reference":[{"issue":"5","key":"9256_CR1","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/JIOT.2017.2683200","volume":"4","author":"J Lin","year":"2017","unstructured":"Lin, J., Yu, W., Zhang, N., Yang, X., Zhang, H., & Zhao, W. (2017). A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications. IEEE Internet of Things Journal, 4(5), 1125\u20131142.","journal-title":"IEEE Internet of Things Journal"},{"issue":"15","key":"9256_CR2","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: A survey. Computer Networks, 54(15), 2787\u20132805.","journal-title":"Computer Networks"},{"key":"9256_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.11.036","author":"R Maa","year":"2017","unstructured":"Maa, R., Wanga, K., Qiua, T., Sangaiahb, A. K., Lina, D., & Liaqatc, H. B. (2017). Feature-based compositing memory networks for aspect-based sentiment classification in Social Internet of Things. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2017.11.036","journal-title":"Future Generation Computer Systems"},{"key":"9256_CR4","doi-asserted-by":"publisher","first-page":"103358","DOI":"10.1016\/j.future.2017.11.036","volume":"80","author":"S Rajendran","year":"2021","unstructured":"Rajendran, S., & Jebakumar, R. (2021). Object Recommendation based Friendship Selection (ORFS) for navigating smarter social objects in SIoT. Microprocessors and Microsystems, 80, 103358. https:\/\/doi.org\/10.1016\/j.micpro.2020.103358","journal-title":"Microprocessors and Microsystems"},{"key":"9256_CR5","doi-asserted-by":"publisher","unstructured":"Rajendran, S., & Jebakumar, R. (2020). Cognitive Based Device Recommendation (CDR) model for social internet of things. In 2020 IEEE 4th Conference on Information & Communication Technology (CICT), pp. 1\u20136. https:\/\/doi.org\/10.1109\/CICT51604.2020.9312094","DOI":"10.1109\/CICT51604.2020.9312094"},{"key":"9256_CR6","doi-asserted-by":"crossref","unstructured":"Nitti, M., Girau, R., Atzori, L., Iera, A., & Morabito, G. (2012) A subjective model for trustworthiness evaluation in the Social Internet of Things. In 23rd international symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC), pp 18\u201323.","DOI":"10.1109\/PIMRC.2012.6362662"},{"key":"9256_CR7","doi-asserted-by":"crossref","unstructured":"Bao, F., Chen, R., & Guo, J. (2013) Scalable, adaptive and survivable trust management for community of Interest based Internet of Things systems. In Eleventh International Symposium on Autonomous Decentralized Systems (ISADS), pp 1\u20137.","DOI":"10.1109\/ISADS.2013.6513398"},{"issue":"3","key":"9256_CR8","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1504\/IJTMCC.2014.067305","volume":"2","author":"M Panda","year":"2014","unstructured":"Panda, M., & Abraham, A. (2014). Development of a reliable trust management model in Social Internet of Things. International Journal of Trust Management in Computing and Communications, 2(3), 229\u2013258.","journal-title":"International Journal of Trust Management in Computing and Communications"},{"key":"9256_CR9","doi-asserted-by":"crossref","unstructured":"Chen, R., Guo, J., & Bao, F. (2014) Trust management for service composition in SOA-based IoT systems. In Wireless Communications and Networking Conference (WCNC), pp. 3444\u20133449.","DOI":"10.1109\/WCNC.2014.6953138"},{"key":"9256_CR10","doi-asserted-by":"crossref","unstructured":"Xiao, H., Sidhu, N., & Christianson, B. (2015) Guarantor and reputation based trust model for Social Internet of Things. In International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 600\u2013605.","DOI":"10.1109\/IWCMC.2015.7289151"},{"key":"9256_CR11","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1002\/dac.2930","volume":"29","author":"Z Chen","year":"2015","unstructured":"Chen, Z., Ling, R., Huang, C.-M., & Zhu, X. (2015). A scheme of access service recommendation for the Social Internet of Things. International Journal of Communication Systems, 29, 694\u2013706.","journal-title":"International Journal of Communication Systems"},{"key":"9256_CR12","doi-asserted-by":"crossref","unstructured":"Rafey, S. E. A., Abdel-Hamid, A., & El-Nasr, M. A. (2016) CBSTM-IoT: Context-based social trust model for the Internet of Things. In Proceedings of International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT), pp. 1\u20138.","DOI":"10.1109\/MoWNet.2016.7496623"},{"issue":"6","key":"9256_CR13","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TDSC.2015.2420552","volume":"13","author":"R Chen","year":"2016","unstructured":"Chen, R., Bao, F., & Guo, J. (2016). Trust-based service management for Social Internet of Things systems. IEEE Transactions on Dependable and Secure Computing, 13(6), 684\u2013696.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"issue":"6","key":"9256_CR14","doi-asserted-by":"publisher","first-page":"1346","DOI":"10.3390\/s17061346","volume":"17","author":"NB Truong","year":"2017","unstructured":"Truong, N. B., Lee, H., Askwith, B., & Lee, G. M. (2017). Toward a trust evaluation mechanism in the Social Internet of Things. Sensors, 17(6), 1346.","journal-title":"Sensors"},{"key":"9256_CR15","unstructured":"Truong, N. B., Um, T. W., & Lee, G. M. (2016). A reputation and knowledge based trust service platform for trustworthy Social Internet of Things. In Innovations in Clouds, Internet and Networks (ICIN), Paris, France."},{"key":"9256_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, L., Li, L., Medwedeff, E., Huang, H., Fu, X., & Wang R. (2019). Privacy protection of social networks based on classified attribute encryption, security and communication networks.","DOI":"10.1155\/2019\/9108759"},{"key":"9256_CR17","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3046906","author":"C Marche","year":"2020","unstructured":"Marche, C., & Nitti, M. (2020). Trust-related attacks and their detection: A trust management model for the social IoT. IEEE Transactions on Network and Service Management. https:\/\/doi.org\/10.1109\/TNSM.2020.3046906","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"9256_CR18","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720908773","author":"J Son","year":"2020","unstructured":"Son, J., Choi, W., & Choi, S.-M. (2020). Trust information network in Social Internet of Things using trust-aware recommender systems. International Journal of Distributed Sensor Networks. https:\/\/doi.org\/10.1177\/1550147720908773","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"9256_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107254","volume":"178","author":"B Jafarian","year":"2020","unstructured":"Jafarian, B., Yazdani, N., & Haghighi, M. S. (2020). Discrimination-aware trust management for Social Internet of Things. Computer Networks, 178, 107254. https:\/\/doi.org\/10.1016\/j.comnet.2020.107254","journal-title":"Computer Networks"},{"key":"9256_CR20","doi-asserted-by":"publisher","unstructured":"Roopa, M. S., Puneetha, Vishwas, RajKumar Buyya, Venugopal, Iyengar, & Patnaik. Trust management for service-oriented SIoT systems. In 2020 The 8th International Conference on Information Technology: IoT and Smart City (ICIT 2020). Association for Computing Machinery (pp. 216\u2013222). https:\/\/doi.org\/10.1145\/3446999.3447635","DOI":"10.1145\/3446999.3447635"},{"key":"9256_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3052219","author":"M Ba-hutair","year":"2021","unstructured":"Ba-hutair, M., Bouguettaya, A., & Ghari-Neiat, A. (2021). Multi-perspective trust management framework for crowdsourced IoT services. IEEE Transactions on Services Computing. https:\/\/doi.org\/10.1109\/TSC.2021.3052219","journal-title":"IEEE Transactions on Services Computing"},{"key":"9256_CR22","doi-asserted-by":"crossref","unstructured":"Dhelim, S., Ning, H., Farha, F., Chen, L., Atzori, L., & Daneshmand, M. (2021). IoT-enabled social relationships meet artificial social intelligence. ArXiv, arXiv:2103.01776","DOI":"10.1109\/JIOT.2021.3081556"},{"key":"9256_CR23","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.comcom.2021.02.015","volume":"171","author":"N Narang","year":"2021","unstructured":"Narang, N., & Kar, S. (2021). A hybrid trust management framework for a multi-service social IoT network. Computer Communications, 171, 61\u201379.","journal-title":"Computer Communications"},{"issue":"1","key":"9256_CR24","doi-asserted-by":"publisher","first-page":"43","DOI":"10.31803\/tg-20210204180217","volume":"15","author":"S Babar","year":"2021","unstructured":"Babar, S., & Mahalle, P. (2021). Trust management approach for detection of malicious devices in SIoT. Tehni\u010dki Glasnik, 15(1), 43\u201350.","journal-title":"Tehni\u010dki Glasnik"},{"key":"9256_CR25","doi-asserted-by":"crossref","unstructured":"Tapia, E. M., Intille, S. S., & Larson, K. (2004). Activity recognition in the home using simple and ubiquitous sensors. In International conference on pervasive computing, pp. 158\u2013175.","DOI":"10.1007\/978-3-540-24646-6_10"},{"key":"9256_CR26","doi-asserted-by":"crossref","unstructured":"Alemdar, H. O., Ertan, H., Incel, O. D., & Ersoy, C. (2013). ARAS human activity datasets in multiple homes with multiple residents.","DOI":"10.4108\/icst.pervasivehealth.2013.252120"},{"key":"9256_CR27","doi-asserted-by":"publisher","first-page":"2396","DOI":"10.1016\/j.comnet.2009.04.008","volume":"53","author":"JH Luo","year":"2009","unstructured":"Luo, J. H., Liu, X., & Fan, M. Y. (2009). A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Networks, 53, 2396\u20132407.","journal-title":"Computer Networks"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09256-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-021-09256-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-021-09256-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,22]],"date-time":"2022-03-22T17:55:27Z","timestamp":1647971727000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-021-09256-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,26]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["9256"],"URL":"https:\/\/doi.org\/10.1007\/s11277-021-09256-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,26]]},"assertion":[{"value":"19 October 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}