{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,22]],"date-time":"2025-04-22T16:36:37Z","timestamp":1745339797183},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,1]]},"DOI":"10.1007\/s11277-022-10007-6","type":"journal-article","created":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T10:02:56Z","timestamp":1663581776000},"page":"1437-1469","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Hidden Markov Trust for Attenuation of Selfish and Malicious Nodes in the IoT Network"],"prefix":"10.1007","volume":"128","author":[{"given":"Gamini","family":"Joshi","sequence":"first","affiliation":[]},{"given":"Vidushi","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,9,19]]},"reference":[{"key":"10007_CR1","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1016\/j.jss.2016.06.059","volume":"119","author":"CK Dehury","year":"2016","unstructured":"Dehury, C. K., & Sahoo, P. K. (2016). Design and implementation of a novel service management framework for IoT devices in cloud. Journal of Systems and Software, 119, 149\u2013161. https:\/\/doi.org\/10.1016\/j.jss.2016.06.059","journal-title":"Journal of Systems and Software"},{"issue":"11","key":"10007_CR2","doi-asserted-by":"publisher","first-page":"3654","DOI":"10.3390\/s21113654","volume":"21","author":"N Abosata","year":"2021","unstructured":"Abosata, N., Al-Rubaye, S., Inalhan, G., & Emmanouilidis, C. (2021). Internet of Things for system integrity: A comprehensive survey on security, attacks and countermeasures for industrial applications. Sensors, 21(11), 3654. https:\/\/doi.org\/10.3390\/s21113654","journal-title":"Sensors"},{"issue":"3","key":"10007_CR3","first-page":"25","volume":"5","author":"AK Akhtar","year":"2012","unstructured":"Akhtar, A. K., & Sahoo, G. (2012). Mathematical model for the detection of selfish nodes in MANETs. International Journal of Computer Science and Informatics, 5(3), 25\u201328.","journal-title":"International Journal of Computer Science and Informatics"},{"key":"10007_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100285","volume":"27","author":"MA Rahim","year":"2021","unstructured":"Rahim, M. A., Rahman, M. A., Rahman, M. M., Asyhari, A. T., Bhuiyan, M. Z. A., & Ramasamy, D. (2021). Evolution of IoT-enabled connectivity and applications in automotive industry: A review. Vehicular Communications, 27, 100285. https:\/\/doi.org\/10.1016\/j.vehcom.2020.100285","journal-title":"Vehicular Communications"},{"issue":"4","key":"10007_CR5","doi-asserted-by":"publisher","first-page":"3687","DOI":"10.1007\/s11277-021-09107-6","volume":"122","author":"K \u00c1vila","year":"2022","unstructured":"\u00c1vila, K., Sanmartin, P., Jabba, D., & G\u00f3mez, J. (2022). An analytical survey of attack scenario parameters on the techniques of attack mitigation in WSN. Wireless Personal Communications, 122(4), 3687\u20133718. https:\/\/doi.org\/10.1007\/s11277-021-09107-6","journal-title":"Wireless Personal Communications"},{"issue":"1","key":"10007_CR6","doi-asserted-by":"publisher","first-page":"150","DOI":"10.3390\/s19010150","volume":"19","author":"JVV Sobral","year":"2019","unstructured":"Sobral, J. V. V., Rodrigues, J. J. P. C., Rab\u00ealo, R. A. L., Saleem, K., & Furtado, V. (2019). LOADng-IoT: An enhanced routing protocol for internet of things applications over low power networks. Sensors, 19(1), 150. https:\/\/doi.org\/10.3390\/s19010150","journal-title":"Sensors"},{"issue":"12","key":"10007_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/ett.3878","volume":"31","author":"AJR Gon\u00e7alves","year":"2020","unstructured":"Gon\u00e7alves, A. J. R., Rab\u00ealo, R. A. L., Rodrigues, J. J. P. C., & Oliveira, L. M. L. (2020). A mobility solution for low power and lossy networks using the LOADng protocol. Transactions on Emerging Telecommunications Technologies, 31(12), 1\u201324. https:\/\/doi.org\/10.1002\/ett.3878","journal-title":"Transactions on Emerging Telecommunications Technologies"},{"issue":"1","key":"10007_CR8","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/s11277-021-08647-1","volume":"121","author":"M Shukla","year":"2021","unstructured":"Shukla, M., Joshi, B. K., & Singh, U. (2021). Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET. Wireless Personal Communications, 121(1), 503\u2013526. https:\/\/doi.org\/10.1007\/s11277-021-08647-1","journal-title":"Wireless Personal Communications"},{"issue":"4","key":"10007_CR9","doi-asserted-by":"publisher","first-page":"2911","DOI":"10.1007\/s11277-021-08855-9","volume":"121","author":"C Anand","year":"2021","unstructured":"Anand, C., & Vasuki, N. (2021). Trust based DoS attack detection in wireless sensor networks for reliable data transmission. Wireless Personal Communications, 121(4), 2911\u20132926. https:\/\/doi.org\/10.1007\/s11277-021-08855-9","journal-title":"Wireless Personal Communications"},{"issue":"2","key":"10007_CR10","doi-asserted-by":"publisher","first-page":"99","DOI":"10.22266\/ijies2022.0430.10","volume":"15","author":"SK Narayana","year":"2022","unstructured":"Narayana, S. K., & Hosur, N. T. (2022). Priority based trust efficient routing using ant colony optimization for IoT-based mobile wireless mesh networks. International Journal of Intelligent Engineering and Systems, 15(2), 99\u2013106. https:\/\/doi.org\/10.22266\/ijies2022.0430.10","journal-title":"International Journal of Intelligent Engineering and Systems"},{"key":"10007_CR11","doi-asserted-by":"publisher","unstructured":"Zhongqiu, J., Shu, Y., & Liangmin, W. (2009). Survivability Evaluation of Cluster-Based Wireless Sensor Network under DoS Attack. In 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing. https:\/\/doi.org\/10.1007\/978-3-642-32427-7_18","DOI":"10.1007\/978-3-642-32427-7_18"},{"issue":"6","key":"10007_CR12","doi-asserted-by":"publisher","first-page":"4173","DOI":"10.1007\/s11276-020-02326-y","volume":"26","author":"P Theerthagiri","year":"2020","unstructured":"Theerthagiri, P. (2020). FUCEM: Futuristic cooperation evaluation model using Markov process for evaluating node reliability and link stability in mobile ad hoc network. Wireless Networks, 26(6), 4173\u20134188. https:\/\/doi.org\/10.1007\/s11276-020-02326-y","journal-title":"Wireless Networks"},{"issue":"14","key":"10007_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.5047","volume":"31","author":"M Maragatharajan","year":"2019","unstructured":"Maragatharajan, M., Balasubramanian, C., & Balakannan, S. P. (2019). A secured MANET using position-based opportunistic routing and SEMI MARKOV process. Concurrency and Computation: Practice and Experience, Wiley, 31(14), 1\u20138. https:\/\/doi.org\/10.1002\/cpe.5047","journal-title":"Concurrency and Computation: Practice and Experience, Wiley"},{"key":"10007_CR14","doi-asserted-by":"publisher","first-page":"8956","DOI":"10.1109\/ACCESS.2017.2695525","volume":"5","author":"L Chen","year":"2017","unstructured":"Chen, L., Thombre, S., Jarvinen, K., Lohan, E. S., Alen-Savikko, A., Leppakoski, H., & Kuusniemi, H. (2017). Robustness, security and privacy in location-based services for future IoT: A survey. IEEE Access, 5, 8956\u20138977. https:\/\/doi.org\/10.1109\/ACCESS.2017.2695525","journal-title":"IEEE Access"},{"key":"10007_CR15","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1016\/j.cose.2014.04.006","volume":"44","author":"S Peng","year":"2014","unstructured":"Peng, S., Wu, M., Wang, G., & Yu, S. (2014). Propagation model of smartphone worms based on semi-Markov process and social relationship graph. Computers & Security, 44, 92\u2013103. https:\/\/doi.org\/10.1016\/j.cose.2014.04.006","journal-title":"Computers & Security"},{"issue":"1","key":"10007_CR16","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1186\/s13638-015-0384-4","volume":"2015","author":"J Sengathir","year":"2015","unstructured":"Sengathir, J., & Manoharan, R. (2015). A futuristic trust coefficient-based semi-Markov prediction model for mitigating selfish nodes in MANETs. EURASIP Journal on Wireless Communications and Networking, 2015(1), 158. https:\/\/doi.org\/10.1186\/s13638-015-0384-4","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"10007_CR17","doi-asserted-by":"crossref","unstructured":"Liu, X., & Datta, A. (2012). Modeling context aware dynamic trust using hidden markov model. In Proceedings of the National Conference on Artificial Intelligence (Vol. 3, pp. 1938\u20131944).","DOI":"10.1609\/aaai.v26i1.8395"},{"key":"10007_CR18","doi-asserted-by":"publisher","unstructured":"Pathak, P., Chauhan, E., Rathi, S., & Kosti, S. (2018). HMM-Based IDS for Attack Detection and Prevention in MANET. In Lecture Notes in Networks and Systems (Vol. 10, pp. 413\u2013421). https:\/\/doi.org\/10.1007\/978-981-10-3920-1_42","DOI":"10.1007\/978-981-10-3920-1_42"},{"key":"10007_CR19","doi-asserted-by":"publisher","unstructured":"Alam, M. M., Sajid, M. S. I., Wang, W., & Wei, J. (2022). IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms. In 2022 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1695\u20131700). IEEE. https:\/\/doi.org\/10.1109\/WCNC51071.2022.9771878","DOI":"10.1109\/WCNC51071.2022.9771878"},{"issue":"8","key":"10007_CR20","doi-asserted-by":"publisher","first-page":"2874","DOI":"10.3390\/s22082874","volume":"22","author":"X Zhang","year":"2022","unstructured":"Zhang, X., Wu, T., Zheng, Q., Zhai, L., Hu, H., Yin, W., & Cheng, C. (2022). Multi-step attack detection based on pre-trained hidden Markov models. Sensors, 22(8), 2874. https:\/\/doi.org\/10.3390\/s22082874","journal-title":"Sensors"},{"issue":"6","key":"10007_CR21","doi-asserted-by":"publisher","first-page":"6236","DOI":"10.1007\/s11227-020-03513-6","volume":"77","author":"MA Khan","year":"2021","unstructured":"Khan, M. A., & Abuhasel, K. A. (2021). An evolutionary multi-hidden Markov model for intelligent threat sensing in industrial internet of things. The Journal of Supercomputing, 77(6), 6236\u20136250. https:\/\/doi.org\/10.1007\/s11227-020-03513-6","journal-title":"The Journal of Supercomputing"},{"key":"10007_CR22","unstructured":"Chen, C.-M., Guan, D.-J., Huang, Y.-Z., & Ou, Y.-H. (2016). Anomaly network intrusion detection using hidden Markov model. In International Journal of Innovative Computing, Information and Control (pp. 569\u2013580)."},{"key":"10007_CR23","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/j.future.2017.07.028","volume":"87","author":"D Wu","year":"2018","unstructured":"Wu, D., Zhang, F., Wang, H., & Wang, R. (2018). Security-oriented opportunistic data forwarding in Mobile Social Networks. Future Generation Computer Systems, 87, 803\u2013815. https:\/\/doi.org\/10.1016\/j.future.2017.07.028","journal-title":"Future Generation Computer Systems"},{"key":"10007_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101974","volume":"97","author":"T Li","year":"2020","unstructured":"Li, T., Liu, Y., Liu, Y., Xiao, Y., & Nguyen, N. A. (2020). Attack plan recognition using hidden Markov and probabilistic inference. Computers & Security, 97, 101974. https:\/\/doi.org\/10.1016\/j.cose.2020.101974","journal-title":"Computers & Security"},{"key":"10007_CR25","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.jpdc.2021.02.011","volume":"151","author":"H Liu","year":"2021","unstructured":"Liu, H., Han, D., & Li, D. (2021). Behavior analysis and blockchain based trust management in VANETs. Journal of Parallel and Distributed Computing, 151, 61\u201369. https:\/\/doi.org\/10.1016\/j.jpdc.2021.02.011","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"10007_CR26","doi-asserted-by":"publisher","unstructured":"Ingale, S., Paraye, M., & Ambawade, D. (2020). Enhancing Multi-Step Attack Prediction using Hidden Markov Model and Naive Bayes. In 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) (pp. 36\u201344). IEEE. https:\/\/doi.org\/10.1109\/ICESC48915.2020.9155895","DOI":"10.1109\/ICESC48915.2020.9155895"},{"key":"10007_CR27","doi-asserted-by":"publisher","unstructured":"Kalnoor, G., & Gowri Shankar, S. (2022). A model-based system for intrusion detection using novel technique-hidden Markov Bayesian in wireless sensor network. In Proceedings of Third International Conference on ICTCS 2017 (Vol. 40, pp. 43\u201353). https:\/\/doi.org\/10.1007\/978-981-16-0739-4_4","DOI":"10.1007\/978-981-16-0739-4_4"},{"issue":"12","key":"10007_CR28","doi-asserted-by":"publisher","first-page":"9117","DOI":"10.1109\/JIOT.2021.3056118","volume":"9","author":"E Muhati","year":"2022","unstructured":"Muhati, E., & Rawat, D. B. (2022). Hidden-Markov-model-enabled prediction and visualization of cyber agility in IoT era. IEEE Internet of Things Journal, 9(12), 9117\u20139127. https:\/\/doi.org\/10.1109\/JIOT.2021.3056118","journal-title":"IEEE Internet of Things Journal"},{"issue":"4","key":"10007_CR29","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1177\/1748301817725305","volume":"11","author":"A Roles","year":"2017","unstructured":"Roles, A., & ElAarag, H. (2017). Coexistence with malicious and selfish nodes in wireless ad hoc networks: A Bayesian game approach. Journal of Algorithms & Computational Technology, 11(4), 353\u2013365. https:\/\/doi.org\/10.1177\/1748301817725305","journal-title":"Journal of Algorithms & Computational Technology"},{"key":"10007_CR30","doi-asserted-by":"crossref","unstructured":"Daniel Jurafsky, J. H. M. (2019). Hidden Markov Models. In Speech and Language Processing (3rd ed. draft) (Vol. 16, pp. 795\u2013796).","DOI":"10.1038\/s41592-019-0532-6"},{"issue":"3","key":"10007_CR31","doi-asserted-by":"publisher","first-page":"1429","DOI":"10.1007\/s11831-020-09422-4","volume":"28","author":"B Mor","year":"2021","unstructured":"Mor, B., Garhwal, S., & Kumar, A. (2021). A systematic review of hidden Markov models and their applications. Archives of Computational Methods in Engineering, 28(3), 1429\u20131448. https:\/\/doi.org\/10.1007\/s11831-020-09422-4","journal-title":"Archives of Computational Methods in Engineering"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10007-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-10007-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10007-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,18]],"date-time":"2023-01-18T10:18:49Z","timestamp":1674037129000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-10007-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,1]]}},"alternative-id":["10007"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-10007-6","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"29 August 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}