{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T13:56:56Z","timestamp":1773842216321,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T00:00:00Z","timestamp":1722384000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T00:00:00Z","timestamp":1722384000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11277-024-11391-x","type":"journal-article","created":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T15:02:31Z","timestamp":1722438151000},"page":"1997-2036","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A Multi-Layered Assessment System for Trustworthiness Enhancement and Reliability for Industrial Wireless Sensor Networks"],"prefix":"10.1007","volume":"137","author":[{"given":"Mohd Anas","family":"Khan","sequence":"first","affiliation":[]},{"family":"Shalu","sequence":"additional","affiliation":[]},{"given":"Quadri Noorulhasan","family":"Naveed","sequence":"additional","affiliation":[]},{"given":"Ayodele","family":"Lasisi","sequence":"additional","affiliation":[]},{"given":"Sheetal","family":"Kaushik","sequence":"additional","affiliation":[]},{"given":"Sunil","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,31]]},"reference":[{"key":"11391_CR1","doi-asserted-by":"publisher","first-page":"3169","DOI":"10.1007\/s11276-019-02129-w","volume":"26","author":"W Fang","year":"2020","unstructured":"Fang, W., Zhang, W., Chen, W., Liu, Y., & Tang, C. (2020). TMSRS: Trust management-based secure routing scheme in industrial wireless sensor network with fog computing. Wireless Networks, 26, 3169\u20133182.","journal-title":"Wireless Networks"},{"issue":"7","key":"11391_CR2","doi-asserted-by":"publisher","first-page":"4837","DOI":"10.1109\/TII.2020.3019286","volume":"17","author":"L Yang","year":"2020","unstructured":"Yang, L., Yinzhi, Lu., Yang, S. X., Guo, T., & Liang, Z. (2020). A secure clustering protocol with fuzzy trust evaluation and outlier detection for industrial wireless sensor networks. IEEE Transactions on Industrial Informatics, 17(7), 4837\u20134847.","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"11391_CR3","first-page":"237","volume":"51","author":"L Jiewu","year":"2020","unstructured":"Jiewu, L., Ye, S., Man Zhou, J., Zhao, L., Liu, Q., Guo, W., Cao, W., & Leijie, Fu. (2020). Blockchain-secured smart manufacturing in industry 4.0: A survey. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51, 237\u2013252.","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics: Systems"},{"key":"11391_CR4","doi-asserted-by":"crossref","unstructured":"Leontaris, L., Mitsiaki, A., Charalampous, P., Dimitriou, N., Leivaditou, E., Karamanidis, A., Papageorgiou, E. (2023). A blockchain-enabled deep residual architecture for accountable, in-situ quality control in industry 4.0 with minimal latency. Computers in Industry, 149, 103919.","DOI":"10.1016\/j.compind.2023.103919"},{"key":"11391_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102215","author":"A Saidi","year":"2020","unstructured":"Saidi, A., Benahmed, K., & Seddiki, N. (2020). Secure cluster head election algorithm and misbehavior detection approach based on trust management technique for clustered wireless sensor networks. Ad Hoc Networks. https:\/\/doi.org\/10.1016\/j.adhoc.2020.102215","journal-title":"Ad Hoc Networks"},{"key":"11391_CR6","doi-asserted-by":"publisher","first-page":"184133","DOI":"10.1109\/ACCESS.2019.2960609","volume":"7","author":"T-H Kim","year":"2019","unstructured":"Kim, T.-H., RekhaGoyat, M. K., Rai, G. K., Buchanan, W. J., Saha, R., & Thomas, R. (2019). A novel trust evaluation process for secure localization using a decentralized blockchain in wireless sensor networks. IEEE Access, 7, 184133\u2013184144.","journal-title":"IEEE Access"},{"key":"11391_CR7","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1016\/j.future.2019.02.004","volume":"96","author":"RW Anwar","year":"2019","unstructured":"Anwar, R. W., AnazidaZainal, FatmaOutay, Yasar, A., & Iqbal, S. (2019). BTEM: Belief based trust evaluation mechanism for wireless sensor networks. Future Generation Computer Systems, 96, 605\u2013616.","journal-title":"Future Generation Computer Systems"},{"key":"11391_CR8","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s12652-020-02017-8","volume":"12","author":"G Rathee","year":"2021","unstructured":"Rathee, G., Balasaraswathi, M., Prabhu Chandran, K., Gupta, S. D., & Boopathi, C. S. (2021). A secure WSN sensors communication in industry 4.0 using blockchain technology. Journal of Ambient Intelligence and Humanized Computing, 12, 533\u2013545.","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"11391_CR9","first-page":"1","volume":"53","author":"W Jingwen","year":"2020","unstructured":"Jingwen, W., Jing, X., Yan, Z., Yulong, Fu., Pedrycz, W., & Yang, L. T. (2020). A Survey on trust evaluation based on machine learning. ACM Computing Surveys (CSUR), 53, 1\u201336.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"11391_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/dac.5656","author":"P Ravikumar","year":"2024","unstructured":"Ravikumar, P., Ganesh, P., & Kumar,. (2024). A novel energy-efficient routing protocol for industrial WSN using hybrid COOT-LS algorithm with LSTM-based DOM prediction. International Journal of Communication Systems. https:\/\/doi.org\/10.1002\/dac.5656","journal-title":"International Journal of Communication Systems"},{"key":"11391_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-024-01708-9","author":"K Dinesh","year":"2024","unstructured":"Dinesh, K., & Svn, S. K. (2024). GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks. Peer-to-Peer Networking and Applications. https:\/\/doi.org\/10.1007\/s12083-024-01708-9","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"11391_CR12","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100889","author":"S Anitha","year":"2023","unstructured":"Anitha, S., Saravanan, S., & Chandrasekar, A. (2023). Trust management based multidimensional secure cluster with RSA cryptography algorithm in WSN for secure data transmission. Measurement: Sensors. https:\/\/doi.org\/10.1016\/j.measen.2023.100889","journal-title":"Measurement: Sensors"},{"issue":"1","key":"11391_CR13","doi-asserted-by":"publisher","first-page":"1910","DOI":"10.1038\/s41598-023-28721-x","volume":"13","author":"T Khan","year":"2023","unstructured":"Khan, T., Singh, K., Ahmad, K., & Ahmad, K. A. B. (2023). A secure and dependable trust assessment (SDTS) scheme for industrial communication networks. Scientific Reports, 13(1), 1910.","journal-title":"Scientific Reports"},{"issue":"8","key":"11391_CR14","doi-asserted-by":"publisher","first-page":"8377","DOI":"10.1109\/TIE.2022.3212378","volume":"70","author":"L Yang","year":"2022","unstructured":"Yang, L., Yang, S. X., Li, Y., Yinzhi, Lu., & Guo, T. (2022). Generative adversarial learning for trusted and secure clustering in industrial wireless sensor networks. IEEE Transactions on Industrial Electronics, 70(8), 8377\u20138387.","journal-title":"IEEE Transactions on Industrial Electronics"},{"key":"11391_CR15","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.future.2021.06.049","volume":"125","author":"T Khan","year":"2021","unstructured":"Khan, T., Singh, K., Hasan, M. H., Khaleel Ahmad, G., Reddy, T., Mohan, S., & Ahmadian, A. (2021). ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs. Future Generation Computer Systems, 125, 921\u2013943.","journal-title":"Future Generation Computer Systems"},{"key":"11391_CR16","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"RA Shaikh","year":"2009","unstructured":"Shaikh, R. A., Jameel, H., d\u2019Auriol, B. J., Lee, H., & Lee, S. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20, 1698\u20131712.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"6","key":"11391_CR17","doi-asserted-by":"publisher","first-page":"924","DOI":"10.1109\/TIFS.2013.2240299","volume":"8","author":"X Li","year":"2013","unstructured":"Li, X., Zhou, F., & Junping, Du. (2013). LDTS: A lightweight and dependable trust system for clustered wireless sensor networks. IEEE transactions on information forensics and security, 8(6), 924\u2013935.","journal-title":"IEEE transactions on information forensics and security"},{"key":"11391_CR18","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1007\/s11235-016-0254-3","volume":"65","author":"S Talbi","year":"2017","unstructured":"Talbi, S., et al. (2017). Adaptive and dual data-communication trust scheme for clustered wireless sensor networks. Telecommunication Systems, 65, 605\u2013619.","journal-title":"Telecommunication Systems"},{"issue":"3","key":"11391_CR19","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1080\/03772063.2017.1284613","volume":"63","author":"M Singh","year":"2017","unstructured":"Singh, M., et al. (2017). A lightweight trust mechanism and overhead analysis for clustered WSN. IETE Journal of Research, 63(3), 297\u2013308.","journal-title":"IETE Journal of Research"},{"key":"11391_CR20","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.comcom.2023.06.014","volume":"209","author":"T Khan","year":"2023","unstructured":"Khan, T., Singh, K., Shariq, M., Khaleel Ahmad, K. S., Savita, A. A., Salahshour, S., & Conti, M. (2023). An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach. Computer Communications, 209, 217\u2013229.","journal-title":"Computer Communications"},{"key":"11391_CR21","doi-asserted-by":"publisher","first-page":"1807","DOI":"10.1007\/s13204-021-02152-4","volume":"13","author":"B Alhayani","year":"2023","unstructured":"Alhayani, B., Kwekha-Rashid, A. S., Mahajan, H. B., Ilhan, H., Uke, N., Alkhayyat, A., & Mohammed, H. J. (2023). 5G standards for the Industry 4.0 enabled communication systems using artificial intelligence: perspective of smart healthcare system. Applied nanoscience, 13, 1807\u20131817.","journal-title":"Applied nanoscience"},{"key":"11391_CR22","doi-asserted-by":"publisher","first-page":"17361","DOI":"10.1007\/s00521-020-05189-8","volume":"32","author":"K Demertzis","year":"2020","unstructured":"Demertzis, K., Iliadis, L., Tziritas, N., & Kikiras, P. (2020). Anomaly detection via blockchained deep learning smart contracts in industry 4.0. Neural Computing and Applications, 32, 17361\u201317378.","journal-title":"Neural Computing and Applications"},{"key":"11391_CR23","doi-asserted-by":"crossref","unstructured":"Leng, J., Ruan, G., Jiang, P., Xu, K., Liu, Q., Zhou, X., Liu, C. (2020). Blockchain-empowered sustainable manufacturing and product lifecycle management in industry 4.0: A survey. Renewable and sustainable energy reviews, 132, 110112.","DOI":"10.1016\/j.rser.2020.110112"},{"issue":"1","key":"11391_CR24","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TSUSC.2018.2839623","volume":"4","author":"U Jayasinghe","year":"2018","unstructured":"Jayasinghe, U., Lee, GyuMyoung, Um, T.-W., & Shi, Qi. (2018). Machine learning based trust computational model for WSN services. IEEE Transactions on Sustainable Computing, 4(1), 39\u201352.","journal-title":"IEEE Transactions on Sustainable Computing"},{"issue":"12","key":"11391_CR25","doi-asserted-by":"publisher","first-page":"4372","DOI":"10.3390\/s18124372","volume":"18","author":"S Kwon","year":"2018","unstructured":"Kwon, S., Jeong, J., & Shon, T. (2018). Toward security enhanced provisioning in industrial IoT systems. Sensors, 18(12), 4372.","journal-title":"Sensors"},{"key":"11391_CR26","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3246065","author":"A Balasundaram","year":"2023","unstructured":"Balasundaram, A., Sidheswar Routray, A. V., Prabu, P. K., Malla, P. P., & Maiti, M. (2023). Internet of things (WSN) based smart healthcare system for efficient diagnostics of health parameters of patients in emergency care. IEEE Internet of Things Journal. https:\/\/doi.org\/10.1109\/JIOT.2023.3246065","journal-title":"IEEE Internet of Things Journal"},{"issue":"23","key":"11391_CR27","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7818","volume":"35","author":"P Aruchamy","year":"2023","unstructured":"Aruchamy, P., Gnanaselvi, S., Sowndarya, D., & Naveenkumar, P. (2023). An artificial intelligence approach for energy-aware intrusion detection and secure routing in internet of things-enabled wireless sensor networks. Concurrency and Computation: Practice and Experience, 35(23), e7818.","journal-title":"Concurrency and Computation: Practice and Experience"},{"key":"11391_CR28","doi-asserted-by":"crossref","unstructured":"Abuhasel, Khaled Ali. A zero-trust network-based access control scheme for sustainable and resilient industry 5.0. IEEE Access (2023)","DOI":"10.1109\/ACCESS.2023.3325879"},{"issue":"2","key":"11391_CR29","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1007\/s12083-023-01458-0","volume":"16","author":"VP Paruthi Ilam","year":"2023","unstructured":"Paruthi Ilam, V. P., Prasanth, A., Manikandan, S. P., & DeviSowndarya, K. K. (2023). A hybrid ANFIS reptile optimization algorithm for energy-efficient inter-cluster routing in internet of things-enabled wireless sensor networks. Peer-to-Peer Networking and Applications, 16(2), 1049\u20131068.","journal-title":"Peer-to-Peer Networking and Applications"},{"key":"11391_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2022.102154","author":"V Kavitha","year":"2022","unstructured":"Kavitha, V., & Ganapathy, K. (2022). Galactic swarm optimized convolute network and cluster head elected energy-efficient routing protocol in WSN. Sustainable Energy Technologies and Assessments. https:\/\/doi.org\/10.1016\/j.seta.2022.102154","journal-title":"Sustainable Energy Technologies and Assessments"},{"key":"11391_CR31","doi-asserted-by":"crossref","unstructured":"Smache, M., Olivereau, A., Franco-Rondisson, T., Tria, A. (2019). Time synchronization attack scenarios and analysis of effective self-detection parameters in a distributed industrial wireless sensor network. in 2019 17th international conference on privacy, Security and Trust (PST) (pp. 1\u20135). IEEE.","DOI":"10.1109\/PST47121.2019.8949065"},{"key":"11391_CR32","doi-asserted-by":"publisher","first-page":"16032","DOI":"10.1109\/ACCESS.2023.3244933","volume":"11","author":"W Zhang","year":"2023","unstructured":"Zhang, W., Sun, H., Fang, W., Zhu, C., & Jia, G. (2023). Trust evaluation and decision based on ds evidence theory: Early models and future perspectives. IEEE Access, 11, 16032\u201316041.","journal-title":"IEEE Access"},{"issue":"3","key":"11391_CR33","doi-asserted-by":"publisher","first-page":"3465","DOI":"10.1109\/TNSM.2022.3173975","volume":"19","author":"PK Roy","year":"2022","unstructured":"Roy, P. K., & Bhattacharya, A. (2022). SDIWSN: A software-defined networking-based authentication protocol for real-time data transfer in industrial wireless sensor networks. IEEE Transactions on Network and Service Management, 19(3), 3465\u20133477.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"2","key":"11391_CR34","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1007\/s11277-022-10165-7","volume":"129","author":"T Khan","year":"2023","unstructured":"Khan, T., & Singh, K. (2023). RTM: Realistic weight-based reliable trust model for large scale WSNs. Wireless Personal Communications, 129(2), 953\u2013991.","journal-title":"Wireless Personal Communications"},{"issue":"5","key":"11391_CR35","doi-asserted-by":"publisher","first-page":"888","DOI":"10.1049\/iet-com.2019.0172","volume":"14","author":"P Nancy","year":"2020","unstructured":"Nancy, P., Muthurajkumar, S., Sannasi Ganapathy, S. V. N., Kumar, S., Selvi, M., & Arputharaj, K. (2020). Intrusion detection using dynamic feature selection and fuzzy temporal decision tree classification for wireless sensor networks. IET Communications, 14(5), 888\u2013895.","journal-title":"IET Communications"},{"key":"11391_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00737-4","author":"K Dinesh","year":"2023","unstructured":"Dinesh, K., & Santhosh Kumar, S. V. N. (2023). Energy-efficient trust-aware secured neuro-fuzzy clustering with sparrow search optimization in wireless sensor network. International Journal of Information Security. https:\/\/doi.org\/10.1007\/s10207-023-00737-4","journal-title":"International Journal of Information Security"},{"key":"11391_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-023-03603-2","author":"H Bangali","year":"2023","unstructured":"Bangali, H., Paul Rodrigues, V., Pandimurugan, S. R., Santhosh Kumar, S. V. N., Selvi, M., & Kannan, A. (2023). Prediction of middle box-based attacks in internet of healthcare things using ranking subsets and convolutional neural network. Wireless Networks. https:\/\/doi.org\/10.1007\/s11276-023-03603-2","journal-title":"Wireless Networks"},{"issue":"5","key":"11391_CR38","doi-asserted-by":"publisher","first-page":"2682","DOI":"10.3390\/s23052682","volume":"23","author":"SV Naga","year":"2023","unstructured":"Naga, S. V., Kumar, S., Yesuraj, R., Munuswamy, S., & Arputharaj, K. (2023). A comprehensive survey on certificate-less authentication schemes for vehicular ad hoc networks in intelligent transportation systems. Sensors, 23(5), 2682.","journal-title":"Sensors"},{"issue":"1","key":"11391_CR39","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s11276-023-03473-8","volume":"30","author":"Y Rajkumar","year":"2024","unstructured":"Rajkumar, Y., & Santhosh Kumar, S. V. N. (2024). An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks. Wireless Networks, 30(1), 335\u2013362.","journal-title":"Wireless Networks"},{"issue":"1","key":"11391_CR40","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s11276-023-03470-x","volume":"30","author":"S Rajasoundaran","year":"2024","unstructured":"Rajasoundaran, S., Santhosh Kumar, S. V. N., Selvi, M., Thangaramya, K., & Arputharaj, K. (2024). Secure and optimized intrusion detection scheme using LSTM-MAC principles for underwater wireless sensor networks. Wireless Networks, 30(1), 209\u2013231.","journal-title":"Wireless Networks"},{"issue":"1","key":"11391_CR41","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/s11276-023-03459-6","volume":"30","author":"S Jayashree","year":"2024","unstructured":"Jayashree, S., & Santhosh Kumar, S. V. N. (2024). LAPEP\u2014lightweight authentication protocol with enhanced privacy for effective secured communication in vehicular ad-hoc network. Wireless Networks, 30(1), 151\u2013178.","journal-title":"Wireless Networks"},{"issue":"3","key":"11391_CR42","doi-asserted-by":"publisher","first-page":"1389","DOI":"10.1007\/s11277-024-10948-0","volume":"134","author":"T Khan","year":"2024","unstructured":"Khan, T., & Singh, K. (2024). DTMS: A Dual trust-based multi-level sybil attack detection approach in WSNs. Wireless Personal Communications, 134(3), 1389\u20131420.","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11391-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11391-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11391-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T12:16:47Z","timestamp":1724069807000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11391-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,31]]},"references-count":42,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["11391"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11391-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,31]]},"assertion":[{"value":"22 June 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}