{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T03:31:42Z","timestamp":1768275102098,"version":"3.49.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T00:00:00Z","timestamp":1551052800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s12652-019-01256-8","type":"journal-article","created":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T09:43:01Z","timestamp":1551087781000},"page":"1129-1140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Interest-based trust management scheme for social internet of things"],"prefix":"10.1007","volume":"11","author":[{"given":"Said","family":"Talbi","sequence":"first","affiliation":[]},{"given":"Abdelmadjid","family":"Bouabdallah","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,25]]},"reference":[{"key":"1256_CR1","doi-asserted-by":"publisher","unstructured":"AlFarraj O, AlZubi A, Tolba A (2018) Trust-based neighbor selection using activation function for secure routing in wireless sensor networks. J Ambient Intell Humaniz Comput. \nhttps:\/\/doi.org\/10.1007\/s12652-018-0885-1","DOI":"10.1007\/s12652-018-0885-1"},{"issue":"4","key":"1256_CR2","first-page":"35","volume":"24","author":"S Amit","year":"2001","unstructured":"Amit S (2001) Modern information retrieval: a brief overview. Bull IEEE Comput Soc Techn Comm Data Eng 24(4):35\u201343","journal-title":"Bull IEEE Comput Soc Techn Comm Data Eng"},{"issue":"15","key":"1256_CR3","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a surveys. Comput Netw 54(15):2787\u20132805. \nhttps:\/\/doi.org\/10.1016\/j.comnet.2010.05.010","journal-title":"Comput Netw"},{"issue":"11","key":"1256_CR4","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1109\/LCOMM.2011.090911.111340","volume":"15","author":"L Atzori","year":"2011","unstructured":"Atzori L, Iera A, Morabito G (2011) Siot: Giving a social structure to the internet of things. Commun Lett 15(11):1193\u20131195. \nhttps:\/\/doi.org\/10.1109\/LCOMM.2011.090911.111340","journal-title":"Commun Lett"},{"issue":"16","key":"1256_CR5","doi-asserted-by":"publisher","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","volume":"56","author":"L Atzori","year":"2012","unstructured":"Atzori L, Iera A, Morabito G, Nitti M (2012) The social internet of things (siot)\u2014when social networks meet the internet of things: concept, architecture and network characterization. Comput Netw 56(16):3594\u20133608. \nhttps:\/\/doi.org\/10.1016\/j.comnet.2012.07.010","journal-title":"Comput Netw"},{"issue":"4","key":"1256_CR6","doi-asserted-by":"publisher","first-page":"1207","DOI":"10.2298\/CSIS110303056C","volume":"8","author":"D Chen","year":"2011","unstructured":"Chen D, Chang G, Sun D, Jia J, Wang X (2011) Trm-iot: A trust management model based on fuzzy reputation for internet of things. Comput Sci Inf Syst 8(4):1207\u20131228. \nhttps:\/\/doi.org\/10.2298\/CSIS110303056C","journal-title":"Comput Sci Inf Syst"},{"issue":"6","key":"1256_CR7","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TDSC.2015.2420552","volume":"13","author":"I Chen","year":"2016","unstructured":"Chen I, Bao F, Guo J (2016a) Trust-based service management for social internet of things systems. IEEE Trans Dependable Secure Comput 13(6):684\u2013696. \nhttps:\/\/doi.org\/10.1109\/TDSC.2015.2420552","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"3","key":"1256_CR8","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1109\/TSC.2014.2365797","volume":"9","author":"I Chen","year":"2016","unstructured":"Chen I, Guo J, Bao F (2016b) Trust management for soa-based iot and its application to service composition. IEEE Trans Serv Comput 9(3):482\u2013495. \nhttps:\/\/doi.org\/10.1109\/TSC.2014.2365797","journal-title":"IEEE Trans Serv Comput"},{"key":"1256_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0887-z","author":"I Chen","year":"2018","unstructured":"Chen I, Tian Z, Cui X, Yin L, Wang X (2018) Trust architecture and reputation evaluation for internet of things. J Ambient Intell Humaniz Comput. \nhttps:\/\/doi.org\/10.1007\/s12652-018-0887-z","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"3","key":"1256_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1362542.1362546","volume":"4","author":"S Ganeriwal","year":"2008","unstructured":"Ganeriwal S, Balzano L, Srivastava M (2008) Reputation-based framework for high integrity sensor networks. ACM Trans Sensor Netw 4(3):1\u201337. \nhttps:\/\/doi.org\/10.1145\/1362542.1362546","journal-title":"ACM Trans Sensor Netw"},{"issue":"2","key":"1256_CR11","doi-asserted-by":"publisher","first-page":"28001","DOI":"10.1209\/0295-5075\/122\/28001","volume":"22","author":"C Gao","year":"2018","unstructured":"Gao C, Chen Z, Li X, Tian Z, Li S, Wang Z (2018) Multiobjective discrete particle swarm optimization for community detection in dynamic networks. Europhys Lett (EPL) 22(2):28001. \nhttps:\/\/doi.org\/10.1209\/0295-5075\/122\/28001","journal-title":"Europhys Lett (EPL)"},{"issue":"12","key":"1256_CR12","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/CC.2014.6821746","volume":"11","author":"L Gu","year":"2014","unstructured":"Gu L, Wang J, Bin S (2014) Trust management mechanism for internet of things. Commun China 11(12):148\u2013156. \nhttps:\/\/doi.org\/10.1109\/CC.2014.6821746","journal-title":"Commun China"},{"issue":"2","key":"1256_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1592451.1592452","volume":"42","author":"K Hoffman","year":"2009","unstructured":"Hoffman K, Zage D, Rotaru C (2009) A survey of attack and defense techniques for reputation systems. ACM Comput Surv J 42(2):1\u201334. \nhttps:\/\/doi.org\/10.1145\/1592451.1592452","journal-title":"ACM Comput Surv J"},{"issue":"5","key":"1256_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MIS.2007.4338497","volume":"22","author":"Z Huang","year":"2007","unstructured":"Huang Z, Zeng D, Chen H (2007) A comparison of collaborative-filtering recommendation algorithms for e-commerce. IEEE Intell Syst 22(5):68\u201378. \nhttps:\/\/doi.org\/10.1109\/MIS.2007.4338497","journal-title":"IEEE Intell Syst"},{"key":"1256_CR15","unstructured":"Josang A, Golbeck J (2009) Challenges for robust trust and reputation systems. In: International Workshop on Security and Trust Management (STM), pp 1\u201312"},{"key":"1256_CR16","unstructured":"Josang A, Ismail R (2002) The beta reputation system. In: 15th Bled Electronic Commerce Conference, pp 1\u201314"},{"issue":"5","key":"1256_CR17","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TFUZZ.2006.889817","volume":"15","author":"R Khoury","year":"2007","unstructured":"Khoury R, Karray F, Sun Y, Kamel M, Basir O (2007) Semantic understanding of general linguistic items by means of fuzzy set theory. IEEE Trans Fuzzy Syst 15(5):757\u2013771. \nhttps:\/\/doi.org\/10.1109\/TFUZZ.2006.889817","journal-title":"IEEE Trans Fuzzy Syst"},{"issue":"3","key":"1256_CR18","doi-asserted-by":"publisher","first-page":"495","DOI":"10.1007\/s11277-011-0386-4","volume":"61","author":"G K\u00f8ien","year":"2011","unstructured":"K\u00f8ien G (2011) Reflections on trust in devices: an informal survey of human trust in an internet-of-things context. Wirel Person Commun 61(3):495\u2013510. \nhttps:\/\/doi.org\/10.1007\/s11277-011-0386-4","journal-title":"Wirel Person Commun"},{"issue":"4","key":"1256_CR19","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1049\/iet-net.2017.0021","volume":"6","author":"A Kowshalya","year":"2017","unstructured":"Kowshalya A, Valarmathi M (2017) Trust management for reliable decision making among social objects in the social internet of things. IET Netw 6(4):75\u201380. \nhttps:\/\/doi.org\/10.1049\/iet-net.2017.0021","journal-title":"IET Netw"},{"key":"1256_CR20","doi-asserted-by":"publisher","DOI":"10.1186\/1687-1499-2012-203","author":"R Lacuesta","year":"2012","unstructured":"Lacuesta R, Navarro G, Cetina C, Penalver L, Lloret J (2012) Internet of things: where to be is to trust. J Wirel Commun Network. \nhttps:\/\/doi.org\/10.1186\/1687-1499-2012-203","journal-title":"J Wirel Commun Network"},{"key":"1256_CR21","doi-asserted-by":"publisher","first-page":"4664","DOI":"10.1109\/ACCESS.2017.2677917","volume":"5","author":"H Nguyen","year":"2017","unstructured":"Nguyen H, Lee O, Jung J, Park J, Um T, Lee H (2017) Event-driven trust refreshment on ambient services. IEEE Access 5:4664\u20134670. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2017.2677917","journal-title":"IEEE Access"},{"key":"1256_CR22","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.adhoc.2015.01.006","volume":"32","author":"K Nguyen","year":"2015","unstructured":"Nguyen K, Laurent M, Oualha N (2015) Survey on secure communication protocols for the internet of things. Ad Hoc Netw 32:17\u201331. \nhttps:\/\/doi.org\/10.1016\/j.adhoc.2015.01.006","journal-title":"Ad Hoc Netw"},{"key":"1256_CR23","doi-asserted-by":"publisher","unstructured":"Nitti M, Girau R, Atzori L, Morabito G (2012) A subjective model for trustworthiness evaluation in the social internet of things. In: IEEE 23rd International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), p 18\u201323. \nhttps:\/\/doi.org\/10.1109\/PIMRC.2012.6362662","DOI":"10.1109\/PIMRC.2012.6362662"},{"issue":"5","key":"1256_CR24","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","volume":"26","author":"M Nitti","year":"2014","unstructured":"Nitti M, Girau R, Atzori L, Morabito G (2014) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253\u20131266. \nhttps:\/\/doi.org\/10.1109\/TKDE.2013.105","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1256_CR25","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.cose.2013.09.001","volume":"39","author":"Y Saied","year":"2013","unstructured":"Saied Y, Olivereau A, Zeghlache D, Laurent M (2013) Trust management system design for the internet of things: a context-aware and multiservice approach. Comput Secur 39:351\u2013366. \nhttps:\/\/doi.org\/10.1016\/j.cose.2013.09.001","journal-title":"Comput Secur"},{"key":"1256_CR26","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari S, Rizzardi A, Grieco L, Coen-Porisini A (2015) Security, privacy and trust in internet of things: the road ahead. Comput Netw 76:146\u2013164. \nhttps:\/\/doi.org\/10.1016\/j.comnet.2014.11.008","journal-title":"Comput Netw"},{"key":"1256_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2846624","author":"Q Tan","year":"2018","unstructured":"Tan Q, Gao Y, Shi J, Wang X, Fang B, Tian Z (2018) Towards a comprehensive insight into the eclipse attacks of tor hidden services. IEEE Internet Things J. \nhttps:\/\/doi.org\/10.1109\/JIOT.2018.2846624","journal-title":"IEEE Internet Things J"},{"key":"1256_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2846590","author":"Z Tian","year":"2018","unstructured":"Tian Z, Cui Y, An L, Su S, Yin X, Yin L, Cui X (2018) A real-time correlation of host-level events in cyber range service for smart campus. IEEE Access. \nhttps:\/\/doi.org\/10.1109\/ACCESS.2018.2846590","journal-title":"IEEE Access"},{"key":"1256_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.12.054","author":"Z Tian","year":"2019","unstructured":"Tian Z, Su S, Shi W, Du X, Guizani M, Yu X (2019) A data-driven method for future internet route decision modeling. Future Gener Comput Syst. \nhttps:\/\/doi.org\/10.1016\/j.future.2018.12.054","journal-title":"Future Gener Comput Syst"},{"issue":"8","key":"1256_CR30","doi-asserted-by":"publisher","first-page":"2440","DOI":"10.3390\/s18082440","volume":"18","author":"Y Wang","year":"2018","unstructured":"Wang Y, Tian Z, Zhang H, Su S, Shi W (2018) A privacy preserving scheme for nearest neighbor query. Sensors 18(8):2440. \nhttps:\/\/doi.org\/10.3390\/s18082440","journal-title":"Sensors"},{"key":"1256_CR31","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","volume":"42","author":"Z Yan","year":"2014","unstructured":"Yan Z, Zhang P, Vasilakos A (2014) A survey on trust management for internet of things. J Netw Comput Appl 42:120\u2013134. \nhttps:\/\/doi.org\/10.1016\/j.jnca.2014.01.014","journal-title":"J Netw Comput Appl"},{"key":"1256_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2013.06.009","volume":"41","author":"X Yang","year":"2014","unstructured":"Yang X, Guo Y, Steck H (2014) A survey of collaborative filtering based social recommender systems. Comput Commun 41:1\u201310. \nhttps:\/\/doi.org\/10.1016\/j.comcom.2013.06.009","journal-title":"Comput Commun"},{"key":"1256_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-1129-0","author":"S Zemmoudj","year":"2018","unstructured":"Zemmoudj S, Bermad N, Omar M (2018) Context-aware pseudonymization and authorization model for iot-based smart hospitals. J Ambient Intell Humaniz Comput. \nhttps:\/\/doi.org\/10.1007\/s12652-018-1129-0","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01256-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01256-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01256-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T00:19:32Z","timestamp":1582589972000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01256-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,25]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["1256"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01256-8","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,25]]},"assertion":[{"value":"24 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}