{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:29:55Z","timestamp":1770989395567,"version":"3.50.1"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2018,11,29]],"date-time":"2018-11-29T00:00:00Z","timestamp":1543449600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s12243-018-0675-y","type":"journal-article","created":{"date-parts":[[2018,11,28]],"date-time":"2018-11-28T22:53:50Z","timestamp":1543445630000},"page":"257-272","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Measurement and security trust in WSNs: a proximity deviation based approach"],"prefix":"10.1007","volume":"74","author":[{"given":"Noureddine","family":"Boudriga","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9882-3026","authenticated-orcid":false,"given":"Paulvanna N.","family":"Marimuthu","sequence":"additional","affiliation":[]},{"given":"Sami J.","family":"Habib","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,29]]},"reference":[{"key":"675_CR1","volume-title":"Handbook of measurements: benchmarks for systems accuracy and precision","author":"AB Badiru","year":"2016","unstructured":"Badiru AB, Racz L (2016) Handbook of measurements: benchmarks for systems accuracy and precision. CRC Press, USA"},{"key":"675_CR2","unstructured":"Dyer SA (2004) Survey of instrumentation and measurement. Wiley, New York, USA"},{"issue":"2","key":"675_CR3","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1002\/ett.2674","volume":"26","author":"F Ishmanov","year":"2015","unstructured":"Ishmanov F, Saeed Malik A, Kim SW, Begalov B (2015) Trust management system in wireless sensor networks: design considerations and research challenges. Trans Emerg Telecommun Technol 26(2):107\u2013113","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"9","key":"675_CR4","doi-asserted-by":"publisher","first-page":"1086","DOI":"10.1016\/j.comcom.2010.02.006","volume":"33","author":"J Lopez","year":"2010","unstructured":"Lopez J, Roman R, Agudo I, Fernandez-Gago C (2010) Trust management systems for wireless sensor networks: best practices. Comput Commun 33(9):1086\u20131093","journal-title":"Comput Commun"},{"key":"675_CR5","unstructured":"Habib SJ, Marimuthu PN (2016) Development of analytical model for data trustworthiness in sensor networks. In: The proceedings of IEEE international conference on advanced information networking and applications, March 23\u201325, Crans-Montana, Switzerland, pp. 467\u2013472"},{"key":"675_CR6","unstructured":"Habib SJ, Marimuthu PN (2017) Reputation analysis of sensors\u2019 trust within Tabu search. In: The proceedings of world conference on information systems and technologies, April 11\u201313, Madeira, Portugal, pp. 343\u2013352"},{"key":"675_CR7","doi-asserted-by":"crossref","unstructured":"Boudriga N, Marimuthu PN, Habib SJ (2018) Trusting sensors measurements in a WSN: an approach based on true and group deviation estimation. In: The proceedings of world conference on information systems and technologies, March 27\u201329, Naples, Italy, pp. 603\u2013613","DOI":"10.1007\/978-3-319-77712-2_56"},{"key":"675_CR8","doi-asserted-by":"publisher","first-page":"703","DOI":"10.3390\/s17040703","volume":"17","author":"Z Chen","year":"2017","unstructured":"Chen Z, Tian L, Lin C (2017) Trust model of wireless sensor networks and its application in data fusion. Sensors 17:703\u2013719","journal-title":"Sensors"},{"key":"675_CR9","first-page":"646","volume":"41","author":"CQ Fan","year":"2013","unstructured":"Fan CQ, Wang SG, Sun QB, Wang HM, Zhang GW, Yang FCA (2013) Trust evaluation method of sensors based on energy monitoring. Acta Electron Sin 41:646\u2013651","journal-title":"Acta Electron Sin"},{"key":"675_CR10","doi-asserted-by":"crossref","unstructured":"Shao N, Zhou Z, Sun Z (2015) A lightweight and dependable trust model for clustered wireless sensor networks. In: Huang Z, Sun X, Luo J, Wang J (eds) The proceedings of cloud computing and security conference. Lecture notes in computer science, Springer, vol 9483. Pp. 157\u2013168, 2015","DOI":"10.1007\/978-3-319-27051-7_14"},{"key":"675_CR11","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.comnet.2014.06.015","volume":"72","author":"B Zhang","year":"2014","unstructured":"Zhang B, Huang ZH, Xiang YA (2014) Novel multiple-level trust management framework for wireless sensor networks. Comput Netw 72:45\u201361","journal-title":"Comput Netw"},{"key":"675_CR12","doi-asserted-by":"crossref","unstructured":"Meghanathan N (2014) A distributed trust evaluation model for wireless Mobile sensor networks. In: The proceedings of Int. Conf. On information technology: new generations, Las Vegas, April 7\u20139, pp. 186\u2013191","DOI":"10.1109\/ITNG.2014.73"},{"issue":"11","key":"675_CR13","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"S Lee","year":"2009","unstructured":"Lee S, Auriol BJ, Jameel H, Shaikh RA, Lee H, Song YJ (2009) Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans Parallel Distrib Syst 20(11):1698\u20131712","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"5","key":"675_CR14","first-page":"459","volume":"3","author":"MA Salem","year":"2017","unstructured":"Salem MA (2017) An efficient distributed trust model for wireless sensor networks. International Journal and Magazine of Engineering, Technology, Management and Research 3(5):459\u2013464","journal-title":"International Journal and Magazine of Engineering, Technology, Management and Research"},{"key":"675_CR15","doi-asserted-by":"crossref","unstructured":"Romer K, Blum P, Meier L (2005) Time synchronization and calibration in wireless sensor networks. In: Handbook of Sensor Networs: architecture and algorithm, John Wiley & Sons, New Jersy, pp. 199\u2013238","DOI":"10.1002\/047174414X.ch7"},{"key":"675_CR16","doi-asserted-by":"crossref","unstructured":"Bychkovskiy V, Megerian S, Estrin D Potkonjak MC (2003) A collaborative approach to in-place sensor calibration. In: The proceedings of the 2nd international workshop on information processing in sensor networks, April 22\u201323, Palo Alto, CA, USA, pp. 301\u2013316","DOI":"10.1007\/3-540-36978-3_20"},{"key":"675_CR17","doi-asserted-by":"crossref","unstructured":"Whitehouse K, Culler D (2002) Calibration as parameter estimation in sensor networks. In: The proceedings of ACM Int. workshop on wireless sensor networks and applications, Atlanta, GA, USA, pp. 59\u201367","DOI":"10.1145\/570738.570747"},{"key":"675_CR18","unstructured":"David BM, Sousa TR (2010) A Bayesian trust model for the MAC layer in IEEE 802.15.4 networks. In: The Proceeding of 9th International Information and Telecommunication Technologies Symposium, Rio de Janeiro, Brazil, pp. 1\u20137"},{"key":"675_CR19","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.3390\/s17061227","volume":"17","author":"J Wang","year":"2017","unstructured":"Wang J, Jiang S, Fapojuwo AO (2017) A protocol layer trust-based intrusion detection scheme for wireless sensor networks. Sensors 17:1227\u20131246","journal-title":"Sensors"},{"key":"675_CR20","unstructured":"Khalid O, Khan SU, Madani SA, Hayat K, Khan MI, Allah MN, Kolodziej J, Wang L, Zeadally S, Chen D (2013) Comparative study of trust and reputation systems for wireless sensor networks. Secur. Commn. Network 6:669\u2013688"},{"issue":"3","key":"675_CR21","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1007\/s13198-017-0573-0","volume":"8","author":"F Salehpour-Oskouei","year":"2017","unstructured":"Salehpour-Oskouei F, Pourgol-Mohammad M (2017) Risk assessment of sensor failures in a condition monitoring process: degradation-based failure probability determination. Int J Syst Assur Eng Manag 8(3):584\u2013593","journal-title":"Int J Syst Assur Eng Manag"},{"key":"675_CR22","doi-asserted-by":"crossref","unstructured":"Bellazreg R, Boudriga N, Trimeche K, An S (2013) Border surveillance: a dynamic deployment scheme for WSN-based solutions. In: The proceedings of IFIP\/IEEE Wireless and Mobile Networking Conference, April 23\u201325, Dubai, UAE, pp. 1\u20138","DOI":"10.1109\/WMNC.2013.6548956"},{"key":"675_CR23","first-page":"1","volume":"10","author":"M Angeles Sarna","year":"2015","unstructured":"Angeles Sarna M, Casada R, Bermudez A (2015) Distributed forest fire monitoring using sensor networks. Int J Distrib Sens Netw 10:1\u201318","journal-title":"Int J Distrib Sens Netw"},{"issue":"3\u20134","key":"675_CR24","first-page":"217","volume":"35","author":"I Arfaoui","year":"2017","unstructured":"Arfaoui I, Boudriga N, Trimeche K (2017) A WSN deployment scheme under irregular conditions for surveillance applications. Ad Hoc & Sensor Wireless Networks 35(3\u20134):217\u2013259","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"675_CR25","unstructured":"Berrahal S, Kim J-H., Rekhis S, Boudriga N, Wilkinsu D, Acevedou J (2015) Unmanned aircraft vehicle assisted border surveillance. In: The proceedings of the 23rd Internatioal conference on software, telecommunications and computer networks, Split-Bol (Island of Brac), Croatia, Sep.16\u201318, pp. 1\u20136"},{"key":"675_CR26","first-page":"6","volume":"2015","author":"M Angeles Sarna","year":"2015","unstructured":"Angeles Sarna M, Casada R, Bermudez A (2015) Distributed forest fire monitoring using sensor networks. Int J Distrib Sens Netw Special issue on Ad Hoc Networks for Disaster Scenarios and\/or Threat Detection 2015:6","journal-title":"Int J Distrib Sens Netw"},{"key":"675_CR27","doi-asserted-by":"crossref","unstructured":"Bukowski RW, Peacock RD, Averill JD, Cleary TG, Bryner NP, Walton WD, Reneke PA, Kuligowski ED (2008) Performance of home smoke alarms analysis of the response of several available technologies in residential fire settings. National Institute of Standards and Technology Technical Note, 1455-1, pp. 1\u2013396","DOI":"10.6028\/NIST.TN.1455-1r2008"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-018-0675-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-018-0675-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-018-0675-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,28]],"date-time":"2019-11-28T19:05:14Z","timestamp":1574967914000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-018-0675-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,29]]},"references-count":27,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["675"],"URL":"https:\/\/doi.org\/10.1007\/s12243-018-0675-y","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,11,29]]},"assertion":[{"value":"29 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 October 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 November 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}