{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:53:23Z","timestamp":1761396803047,"version":"3.28.0"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T00:00:00Z","timestamp":1714348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"China Post-Doctoral Science Foundation","award":["2020M683296"],"award-info":[{"award-number":["2020M683296"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1007\/s12083-024-01701-2","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T08:02:20Z","timestamp":1714377740000},"page":"2221-2236","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Taas: Trust assessment as a service for secure communication of green edge-assisted UAV network"],"prefix":"10.1007","volume":"17","author":[{"given":"Qixu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yunxiang","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Zhiguang","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,29]]},"reference":[{"issue":"11","key":"1701_CR1","doi-asserted-by":"publisher","first-page":"e4603","DOI":"10.1002\/ett.4603","volume":"33","author":"A Gupta","year":"2022","unstructured":"Gupta A, Gupta SK (2022) A survey on green unmanned aerial vehicles-based fog computing: Challenges and future perspective. Trans Emerg Telecommun Technol 33(11):e4603","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"2","key":"1701_CR2","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1109\/COMST.2015.2495297","volume":"18","author":"L Gupta","year":"2016","unstructured":"Gupta L, Jain R, Vaszkun G (2016) Survey of important issues in UAV communication networks. IEEE Commun Surv Tutorials 18(2):1123\u20131152","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1701_CR3","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/TDSC.2018.2846258","volume":"17","author":"D Chen","year":"2020","unstructured":"Chen D, Zhang N, Cheng N, Zhang K, Qin Z, Shen XS (2020) Physical layer based message authentication with secure channel codes. IEEE Trans Dependable Secure Comput 17:1079\u20131093","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"1701_CR4","first-page":"95","volume":"25","author":"Y Zhi","year":"2020","unstructured":"Zhi Y, Fu Z, Sun X, Yu J (2020) Security and privacy issues of UAV: a survey. Mob\u00a0Netw\u00a0Appl 25:95\u2013101","journal-title":"Mob\u00a0Netw\u00a0Appl"},{"issue":"2","key":"1701_CR5","first-page":"1437","volume":"24","author":"M Adil","year":"2023","unstructured":"Adil M, Jan MA, Liu Y, Abulkasim H, Farouk A, Song H (2023) A systematic survey: security threats to UAV-aided IoT applications, taxonomy, current challenges and requirements with future research directions. IEEE Trans Intell Transp Syst 24(2):1437\u20131455","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"5","key":"1701_CR6","doi-asserted-by":"publisher","first-page":"3327","DOI":"10.1109\/TII.2020.3047416","volume":"18","author":"Y Wang","year":"2020","unstructured":"Wang Y, Wang Q, Chen X, Chen D, Fang X, Yin M, Zhang N (2020) Containerguard: A real-time attack detection system in container-based big data platform. IEEE Trans Ind Inf 18(5):3327\u20133336","journal-title":"IEEE Trans Ind Inf"},{"key":"1701_CR7","doi-asserted-by":"crossref","unstructured":"Chen D, Liao Z, Chen R, Wang H, Yu C, Zhang K, Zhang N, Shen XS (2024) Privacy-preserving anomaly detection of encrypted smart contract for blockchain-based data trading. IEEE Trans Dependable Secure Comput","DOI":"10.1109\/TDSC.2024.3353827"},{"key":"1701_CR8","doi-asserted-by":"publisher","first-page":"10992","DOI":"10.1109\/JIOT.2023.3328382","volume":"11","author":"D Chen","year":"2024","unstructured":"Chen D, Zhang L, Liao Z, Dai H, Zhang N, Shen XS, Pang M (2024) Flexible and fine-grained access control for EHR in blockchain-assisted e-healthcare systems. IEEE Internet Things J 11:10992\u201311007","journal-title":"IEEE Internet Things J"},{"issue":"18","key":"1701_CR9","doi-asserted-by":"publisher","first-page":"17265","DOI":"10.1109\/JIOT.2022.3155355","volume":"9","author":"D Chen","year":"2022","unstructured":"Chen D, Wang H, Zhang N, Nie X, Dai H-N, Zhang K, Choo KR (2022) Privacy-preserving encrypted traffic inspection with symmetric cryptographic techniques in IoT. IEEE Internet Things J 9(18):17265\u201317279","journal-title":"IEEE Internet Things J"},{"issue":"8","key":"1701_CR10","doi-asserted-by":"publisher","first-page":"5992","DOI":"10.1109\/JIOT.2021.3084449","volume":"9","author":"Q Wang","year":"2021","unstructured":"Wang Q, Chen X, Jin X, Li X, Chen D, Qin X (2021) Enhancing trustworthiness of internet of vehicles in space-air-ground integrated networks: attestation approach. IEEE Internet Things J 9(8):5992\u20136002","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"1701_CR11","first-page":"1879","volume":"136","author":"M Yang","year":"2023","unstructured":"Yang M, Huang G, Liu J, Gui Y, Wang Q, Chen X (2023) PIMS: an efficient process integrity monitoring system based on blockchain and trusted computing in cloud-native context. Comput Model Eng Sci 136(2):1879\u20131898","journal-title":"Comput Model Eng Sci"},{"issue":"4","key":"1701_CR12","doi-asserted-by":"publisher","first-page":"2877","DOI":"10.1109\/TII.2021.3110734","volume":"18","author":"J Liang","year":"2022","unstructured":"Liang J, Liu W, Xiong NN, Liu A, Zhang S (2022) An intelligent and trust UAV-assisted code dissemination 5G system for industrial internet-of-things. IEEE Trans Industr Inf 18(4):2877\u20132889","journal-title":"IEEE Trans Industr Inf"},{"key":"1701_CR13","doi-asserted-by":"publisher","first-page":"5610","DOI":"10.1007\/s11227-021-04092-w","volume":"78","author":"E Refaee","year":"2022","unstructured":"Refaee E, Shamsudheen S (2022) Trust- and energy-aware cluster head selection in a UAV-based wireless sensor network using FIT-FCM. J Supercomput 78:5610\u20135625","journal-title":"J Supercomput"},{"issue":"11","key":"1701_CR14","doi-asserted-by":"publisher","first-page":"3444","DOI":"10.1109\/JSAC.2021.3088675","volume":"39","author":"M Huang","year":"2021","unstructured":"Huang M, Liu A, Xiong NN, Wu J (2021) A UAV-assisted ubiquitous trust communication system in 5G and beyond networks. IEEE J Sel Areas Commun 39(11):3444\u20133458","journal-title":"IEEE J Sel Areas Commun"},{"key":"1701_CR15","doi-asserted-by":"publisher","first-page":"213","DOI":"10.24138\/jcomss-2021-0049","volume":"17","author":"A Moualla","year":"2021","unstructured":"Moualla A, Oumayma A, Aljnidi M (2021) Towards trust model in unmanned aerial vehicle ad hoc networks. J Commun Softw Syst 17:213\u2013220","journal-title":"J Commun Softw Syst"},{"issue":"16","key":"1701_CR16","doi-asserted-by":"publisher","first-page":"12481","DOI":"10.1109\/JIOT.2020.3014947","volume":"8","author":"C Ge","year":"2021","unstructured":"Ge C, Zhou L, Hancke GP, Su C (2021) A provenance-aware distributed trust model for resilient unmanned aerial vehicle networks. IEEE Internet Things J 8(16):12481\u201312489","journal-title":"IEEE Internet Things J"},{"issue":"6","key":"1701_CR17","doi-asserted-by":"publisher","first-page":"e3942","DOI":"10.1002\/ett.3942","volume":"33","author":"B Jiang","year":"2022","unstructured":"Jiang B, Huang G, Wang T, Gui J, Zhu X (2022) Trust based energy efficient data collection with unmanned aerial vehicle in edge network. Trans Emerg Telecommun Technol 33(6):e3942","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"7","key":"1701_CR18","doi-asserted-by":"publisher","first-page":"5644","DOI":"10.1109\/JIOT.2022.3150765","volume":"10","author":"J Bai","year":"2023","unstructured":"Bai J, Zeng Z, Wang T, Zhang S, Xiong NN, Liu A (2023) Tanto: An effective trust-based unmanned aerial vehicle computing system for the internet of things. IEEE Internet Things J 10(7):5644\u20135661","journal-title":"IEEE Internet Things J"},{"key":"1701_CR19","first-page":"1","volume":"2018","author":"X Li","year":"2018","unstructured":"Li X, Jin X, Wang Q, Cao M, Chen X (2018) SCCAF: a secure and compliant continuous assessment framework in cloud-based IoT context. Wirel Commun Mob Comput 2018:1\u201318","journal-title":"Wirel Commun Mob Comput"},{"issue":"2","key":"1701_CR20","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1007\/s10586-020-03166-3","volume":"24","author":"RR Kumar","year":"2021","unstructured":"Kumar RR, Kumari B, Kumar C (2021) CCS-OSSR: a framework based on hybrid mcdm for optimal service selection and ranking of cloud computing services. Clust Comput 24(2):867\u2013883","journal-title":"Clust Comput"},{"key":"1701_CR21","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1016\/j.future.2018.12.005","volume":"94","author":"L Sun","year":"2019","unstructured":"Sun L, Dong H, Hussain OK, Hussain FK, Liu AX (2019) A framework of cloud service selection with criteria interactions. Futur Gener Comput Syst 94:749\u2013764","journal-title":"Futur Gener Comput Syst"},{"key":"1701_CR22","doi-asserted-by":"publisher","first-page":"3747","DOI":"10.1007\/s40747-021-00518-3","volume":"8","author":"R Latif","year":"2022","unstructured":"Latif R, Ahmed MU, Tahir S, Latif S, Ahmad A (2022) A novel trust management model for edge computing. Complex Intell Systems 8:3747\u20133763","journal-title":"Complex Intell Systems"},{"key":"1701_CR23","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1186\/s13677-020-00202-w","volume":"9","author":"W Mo","year":"2020","unstructured":"Mo W, Wang T, Zhang S, Zhang J (2020) An active and verifiable trust evaluation approach for edge computing. J Cloud Computing 9:51\u201369","journal-title":"J Cloud Computing"},{"key":"1701_CR24","doi-asserted-by":"crossref","unstructured":"Ruan Y, Durresi A, Uslu S (2018) Trust assessment for internet of things in multi-access edge computing. IEEE 32nd International Conference on Advanced Information Networking and Applications (AINA) 1155\u20131161","DOI":"10.1109\/AINA.2018.00165"},{"key":"1701_CR25","doi-asserted-by":"publisher","first-page":"9368","DOI":"10.1109\/ACCESS.2018.2890432","volume":"7","author":"X Li","year":"2019","unstructured":"Li X, Wang Q, Lan X, Chen X, Zhang N, Chen D (2019) Enhancing cloud-based iot security through trustworthy cloud service: an integration of security and reputation approach. IEEE Access 7:9368\u20139383","journal-title":"IEEE Access"},{"issue":"1","key":"1701_CR26","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s10726-009-9164-z","volume":"19","author":"Z Xu","year":"2010","unstructured":"Xu Z (2010) A deviation-based approach to intuitionistic fuzzy multiple attribute group decision making. Group Decis Negot 19(1):57\u201376","journal-title":"Group Decis Negot"},{"key":"1701_CR27","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.future.2017.11.027","volume":"81","author":"N Yadav","year":"2018","unstructured":"Yadav N, Goraya MS (2018) Two-way ranking based service mapping in cloud environment. Futur Gener Comput Syst 81:53\u201366","journal-title":"Futur Gener Comput Syst"},{"issue":"8","key":"1701_CR28","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.1016\/j.simpat.2009.06.010","volume":"17","author":"VX Tran","year":"2009","unstructured":"Tran VX, Tsuji H, Masuda R (2009) A new QOS ontology and its QOS-based ranking algorithm for web services. Simul Model Pract Theory 17(8):1378\u20131398","journal-title":"Simul Model Pract Theory"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01701-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01701-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01701-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,17]],"date-time":"2024-11-17T06:36:07Z","timestamp":1731825367000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01701-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,29]]},"references-count":28,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,7]]}},"alternative-id":["1701"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01701-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2024,4,29]]},"assertion":[{"value":"11 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}]}}