{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:17:14Z","timestamp":1762507034430},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,3,6]],"date-time":"2017-03-06T00:00:00Z","timestamp":1488758400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s11432-016-9028-0","type":"journal-article","created":{"date-parts":[[2017,3,8]],"date-time":"2017-03-08T02:38:09Z","timestamp":1488940689000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["A resilient trust management scheme for defending against reputation time-varying attacks based on BETA distribution"],"prefix":"10.1007","volume":"60","author":[{"given":"Weidong","family":"Fang","sequence":"first","affiliation":[]},{"given":"Wuxiong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,6]]},"reference":[{"key":"9028_CR1","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/CC.2016.7489987","volume":"13","author":"M J Guo","year":"2016","unstructured":"Guo M J, Liu Y H, Yu H B, et al. An overview of smart city in China. China Commun, 2016, 13: 203\u2013211","journal-title":"China Commun"},{"key":"9028_CR2","doi-asserted-by":"crossref","first-page":"2908","DOI":"10.1007\/s11432-012-4725-1","volume":"55","author":"Z Xiong","year":"2012","unstructured":"Xiong Z, Sheng H, Rong W G, et al. Intelligent transportation systems for smart cities: a progress review. Sci China Inf Sci, 2012, 55: 2908\u20132914","journal-title":"Sci China Inf Sci"},{"key":"9028_CR3","doi-asserted-by":"crossref","first-page":"1463","DOI":"10.1109\/TIM.2016.2526669","volume":"65","author":"G Mois","year":"2016","unstructured":"Mois G, Sanislav T, Folea S C. A cyber-physical system for environmental monitoring. IEEE Trans Instrum Meas, 2016, 65: 1463\u20131471","journal-title":"IEEE Trans Instrum Meas"},{"key":"9028_CR4","doi-asserted-by":"crossref","first-page":"3676","DOI":"10.1109\/TVT.2015.2433263","volume":"65","author":"Y Yang","year":"2016","unstructured":"Yang Y, Zhao C, Yao S, et al. Delay performance of network-coding-based epidemic routing. IEEE Trans Veh Technol, 2016, 65: 3676\u20133684","journal-title":"IEEE Trans Veh Technol"},{"key":"9028_CR5","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1007\/s10462-013-9394-y","volume":"43","author":"W Chen","year":"2015","unstructured":"Chen W, Jiang X R, Tang Z B, et al. Context-based global multi-class semantic image segmentation by wireless multimedia sensor networks. Artif Intell Rev, 2015, 43: 579\u2013591","journal-title":"Artif Intell Rev"},{"key":"9028_CR6","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/MCOM.2012.6211487","volume":"50","author":"X F Tao","year":"2012","unstructured":"Tao X F, Xu X D, Cui Q M. An overview of cooperative communications. IEEE Commun Mag, 2012, 50: 65\u201371","journal-title":"IEEE Commun Mag"},{"key":"9028_CR7","doi-asserted-by":"crossref","first-page":"3372","DOI":"10.1049\/iet-com.2013.1117","volume":"8","author":"Y Yang","year":"2014","unstructured":"Yang Y, Zhang W X, Wei K, et al. Power reduction for mobile devices by deploying low-power base stations. IET Commun, 2014, 8: 3372\u20133380","journal-title":"IET Commun"},{"key":"9028_CR8","first-page":"66","volume-title":"Proceedings of ACM Workshop on Security of ad hoc and Sensor Network","author":"G Saurabh","year":"2004","unstructured":"Saurabh G, Mani B S. Reputation-based framework for high integrity sensor network. In: Proceedings of ACM Workshop on Security of ad hoc and Sensor Network. New York: ACM, 2004. 66\u201377"},{"key":"9028_CR9","first-page":"158","volume":"41","author":"G Yang","year":"2009","unstructured":"Yang G, Yin G S, Yang W, et al. A reputation-based model for malicious node detection in WSNs (in Chinese). J Harbin Inst Technol, 2009, 41: 158\u2013162","journal-title":"J Harbin Inst Technol"},{"key":"9028_CR10","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1109\/TPDS.2014.2320505","volume":"26","author":"J F Jiang","year":"2015","unstructured":"Jiang J F, Han G J, Wang F, et al. An efficient distributed trust model for wireless sensor network. IEEE Trans Parall Distrib Syst, 2015, 26: 1228\u20131337","journal-title":"IEEE Trans Parall Distrib Syst"},{"key":"9028_CR11","doi-asserted-by":"crossref","first-page":"1164","DOI":"10.1109\/TITB.2012.2199996","volume":"16","author":"D J He","year":"2012","unstructured":"He D J, Chen C, Chan S, et al. A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans Inform Technol Biomed, 2012, 16: 1164\u20131175","journal-title":"IEEE Trans Inform Technol Biomed"},{"key":"9028_CR12","first-page":"186","volume-title":"A distributed trust evaluation model for wireless mobile sensor networks","author":"N Meghanathan","year":"2014","unstructured":"Meghanathan N. A distributed trust evaluation model for wireless mobile sensor networks. In: Proceedings of International Conference on Information Technology: New Generations (ITNG), Las Vegas, 2014. 186\u2013191"},{"key":"9028_CR13","first-page":"1","volume-title":"Enhanced beta trust model in wireless sensor networks","author":"V UmaRani","year":"2016","unstructured":"UmaRani V, Sundaram K S, Jayashree D. Enhanced beta trust model in wireless sensor networks. In: Proceedings of International Conference on Information Communication and Embedded Systems (ICICES), Tamil Nadu, 2016. 1\u20135"},{"key":"9028_CR14","first-page":"1","volume-title":"Trust model based on changeable sampling frequency for wireless sensor network","author":"N Wang","year":"2016","unstructured":"Wang N, Liu D Q. Trust model based on changeable sampling frequency for wireless sensor network. In: Proceedings of IEEE\/ACIS 15th International Conference on Computer and Information Science (ICIS), Okayama, 2016. 1\u20134"},{"key":"9028_CR15","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1049\/iet-ifs.2012.0145","volume":"8","author":"H Xia","year":"2014","unstructured":"Xia H, Jia Z P, Sha E H-M. Research of trust model based on fuzzy theory in mobile ad hoc networks. IET Inform Secur, 2014, 8: 88\u2013103","journal-title":"IET Inform Secur"},{"key":"9028_CR16","first-page":"1","volume-title":"Adaptive trust management protocol based on intrusion detection for wireless sensor network","author":"L Gheorghe","year":"2013","unstructured":"Gheorghe L, Rughinis R, Tataroiu R. Adaptive trust management protocol based on intrusion detection for wireless sensor network. In: Proceedings of RoEduNet International Conference on Networking in Education and Research, Constanta, 2013. 1\u20137"},{"key":"9028_CR17","first-page":"3843","volume-title":"A reputation management scheme based on multi-factor in WSN","author":"F Fang","year":"2013","unstructured":"Fang F, Li J F, Li J. A reputation management scheme based on multi-factor in WSN. In: Proceeding of IEEE International Conference on Mechatronic Sciences, Electric Engineering and Computer (MEC). Shenyang, 2013. 3843\u20133848"},{"key":"9028_CR18","first-page":"1","volume-title":"A reliable trust management scheme in wireless sensor networks","author":"N Labraoui","year":"2015","unstructured":"Labraoui N. A reliable trust management scheme in wireless sensor networks. In: Proceedings of IEEE International Symposium on Programming and Systems (ISPS), Algiers, 2015. 1\u20136"},{"key":"9028_CR19","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/CC.2015.7188530","volume":"12","author":"W G Su","year":"2015","unstructured":"Su W G, Liao Y. A jury-based trust management mechanism in distributed cognitive radio networks. China Commun, 2015, 12: 119\u2013126","journal-title":"China Commun"},{"key":"9028_CR20","doi-asserted-by":"crossref","first-page":"1409","DOI":"10.1109\/TMC.2013.22","volume":"13","author":"Y Ren","year":"2014","unstructured":"Ren Y, Zadorozhny V I, Oleshchuk V A, et al. A novel approach to trust management in unattended wireless sensor networks. IEEE Trans Mob Comput, 2014, 13: 1409\u20131423","journal-title":"IEEE Trans Mob Comput"},{"key":"9028_CR21","first-page":"1","volume-title":"Energy efficient hierarchical trust management scheme for solving cluster head compromising problem in wireless sensor networks","author":"V Reshmi","year":"2015","unstructured":"Reshmi V, Sajitha M. Energy efficient hierarchical trust management scheme for solving cluster head compromising problem in wireless sensor networks. In: Proceeding of IEEE International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS), Coimbatore, 2015. 1\u20136"},{"key":"9028_CR22","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TIFS.2014.2364679","volume":"10","author":"C S Zhu","year":"2015","unstructured":"Zhu C S, Nicanfar H, Leung V C M, et al. An authenticated trust and reputation calculation and management system for cloud and sensor networks integration. IEEE Trans Inform Forens Secur, 2015, 10: 118\u2013131","journal-title":"IEEE Trans Inform Forens Secur"},{"key":"9028_CR23","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jnca.2015.06.013","volume":"59","author":"W D Fang","year":"2016","unstructured":"Fang W D, Zhang C L, Shi Z D, et al. BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J Netw Comput Appl, 2016, 59: 88\u201394","journal-title":"J Netw Comput Appl"},{"key":"9028_CR24","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A Mathematical Theory of Evidence","author":"G Shafer","year":"1976","unstructured":"Shafer G. A Mathematical Theory of Evidence. Princeton: Princeton University, 1976"},{"key":"9028_CR25","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1142\/S0218488501000831","volume":"9","author":"A J\u00f8sang","year":"2011","unstructured":"J\u00f8sang A. A logic for uncertain probabilities. Int J Uncertain Fuzz Knowl-Based Syst, 2011, 9: 279\u2013311","journal-title":"Int J Uncertain Fuzz Knowl-Based Syst"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-9028-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-016-9028-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-9028-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T14:47:06Z","timestamp":1658760426000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-016-9028-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,6]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["9028"],"URL":"https:\/\/doi.org\/10.1007\/s11432-016-9028-0","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,6]]},"article-number":"040305"}}