{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:27:21Z","timestamp":1740547641072,"version":"3.38.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T00:00:00Z","timestamp":1706140800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T00:00:00Z","timestamp":1706140800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"DOI":"10.1007\/s13278-023-01196-4","type":"journal-article","created":{"date-parts":[[2024,1,25]],"date-time":"2024-01-25T06:01:47Z","timestamp":1706162507000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient weighted multi-source trust aggregation scheme for edge computing offloading"],"prefix":"10.1007","volume":"14","author":[{"given":"Chunxiang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhangbing","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Guiping","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,1,25]]},"reference":[{"issue":"3","key":"1196_CR1","doi-asserted-by":"publisher","first-page":"5432","DOI":"10.1109\/JIOT.2019.2902022","volume":"6","author":"AA Adewuyi","year":"2019","unstructured":"Adewuyi AA, Cheng H, Shi Q, Cao J, Macdermott A, Wang X (2019) Ctrust: a dynamic trust model for collaborative applications in the internet of things. IEEE Int Things J 6(3):5432\u20135445. https:\/\/doi.org\/10.1109\/JIOT.2019.2902022","journal-title":"IEEE Int Things J"},{"issue":"1","key":"1196_CR2","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/JIOT.2019.2950083","volume":"7","author":"A Alnasser","year":"2020","unstructured":"Alnasser A, Sun H, Jiang J (2020) Recommendation-based trust model for vehicle-to-everything (v2x). IEEE Int Things J 7(1):440\u2013450. https:\/\/doi.org\/10.1109\/JIOT.2019.2950083","journal-title":"IEEE Int Things J"},{"key":"1196_CR3","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1016\/j.future.2019.02.004","volume":"96","author":"RW Anwar","year":"2019","unstructured":"Anwar RW, Zainal A, Outay F, Yasar A, Iqbal S (2019) Btem: Belief based trust evaluation mechanism for wireless sensor networks. Future Gener Comput Syst 96:605\u2013616. https:\/\/doi.org\/10.1016\/j.future.2019.02.004","journal-title":"Future Gener Comput Syst"},{"issue":"5","key":"1196_CR4","doi-asserted-by":"publisher","first-page":"3641","DOI":"10.1007\/s40747-021-00434-6","volume":"8","author":"K Bajaj","year":"2022","unstructured":"Bajaj K, Sharma B, Singh R (2022) Implementation analysis of iot-based offloading frameworks on cloud\/edge computing for sensor generated big data. Comp Int Syst 8(5):3641\u20133658. https:\/\/doi.org\/10.1007\/s40747-021-00434-6","journal-title":"Comp Int Syst"},{"key":"1196_CR5","doi-asserted-by":"publisher","first-page":"85714","DOI":"10.1109\/ACCESS.2020.2991734","volume":"8","author":"K Cao","year":"2020","unstructured":"Cao K, Liu Y, Meng G, Sun Q (2020) An overview on edge computing research. IEEE Access 8:85714\u201385728. https:\/\/doi.org\/10.1109\/ACCESS.2020.2991734","journal-title":"IEEE Access"},{"issue":"4","key":"1196_CR6","doi-asserted-by":"publisher","first-page":"1178","DOI":"10.1109\/TPDS.2014.2317719","volume":"26","author":"Y Chae","year":"2015","unstructured":"Chae Y, DiPippo LC, Sun YL (2015) Trust management for defending on-off attacks. IEEE Trans Parallel Distrib Syst 26(4):1178\u20131191. https:\/\/doi.org\/10.1109\/TPDS.2014.2317719","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"13","key":"1196_CR7","doi-asserted-by":"publisher","first-page":"4738","DOI":"10.3390\/s22134738","volume":"22","author":"X Chen","year":"2022","unstructured":"Chen X, Liu G (2022) Federated deep reinforcement learning-based task offloading and resource allocation for smart cities in a mobile edge network. Sensors 22(13):4738. https:\/\/doi.org\/10.3390\/s22134738","journal-title":"Sensors"},{"issue":"3","key":"1196_CR8","first-page":"449","volume":"55","author":"X Deng","year":"2018","unstructured":"Deng X, Guan P, Wan Z, Liu E, Luo J, Zhao Z, Liu Y, Zhang H (2018) Integrated trust based resource cooperation in edge computing. J Comput Res Dev 55(3):449\u2013477","journal-title":"J Comput Res Dev"},{"key":"1196_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2020.100194","volume":"22","author":"H Golp\u00eera","year":"2021","unstructured":"Golp\u00eera H, Khan SAR, Safaeipour S (2021) A review of logistics internet-of-things: current trends and scope for future research. J Indust Inform Integrat 22:100194. https:\/\/doi.org\/10.1016\/j.jii.2020.100194","journal-title":"J Indust Inform Integrat"},{"key":"1196_CR10","doi-asserted-by":"publisher","first-page":"25408","DOI":"10.1109\/ACCESS.2017.2769878","volume":"5","author":"X Huang","year":"2017","unstructured":"Huang X, Yu R, Kang J, Zhang Y (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5:25408\u201325420. https:\/\/doi.org\/10.1109\/ACCESS.2017.2769878","journal-title":"IEEE Access"},{"key":"1196_CR11","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030502","author":"W Kong","year":"2020","unstructured":"Kong W, Li X, Hou L, Li Y (2020) An efficient and credible multi-source trust fusion mechanism based on time decay for edge computing. Electronics. https:\/\/doi.org\/10.3390\/electronics9030502","journal-title":"Electronics"},{"issue":"11","key":"1196_CR12","doi-asserted-by":"publisher","first-page":"4276","DOI":"10.3390\/s22114276","volume":"22","author":"R Kumar","year":"2022","unstructured":"Kumar R, Rani S, Awadh MA (2022) Exploring the application sphere of the internet of things in industry 4.0: a review, bibliometric and content analysis. Sensors 22(11):4276. https:\/\/doi.org\/10.3390\/s22114276","journal-title":"Sensors"},{"issue":"4","key":"1196_CR13","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","volume":"17","author":"W Li","year":"2015","unstructured":"Li W, Song H (2015) Art: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Int Transport Syst 17(4):960\u2013969. https:\/\/doi.org\/10.1109\/TITS.2015.2494017","journal-title":"IEEE Trans Int Transport Syst"},{"key":"1196_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-023-10187-9","author":"LB Mohammed","year":"2021","unstructured":"Mohammed LB, Anpalagan A, Jaseemuddin M (2021) Energy and latency efficient caching in mobile edge networks: Survey, solutions, and challenges. Wireless Personal Commun. https:\/\/doi.org\/10.1007\/s11277-023-10187-9","journal-title":"Wireless Personal Commun"},{"key":"1196_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114592","volume":"172","author":"A Mousa","year":"2021","unstructured":"Mousa A, Bentahar J, Alam O (2021) Multi-dimensional trust for context-aware services computing. Expert Syst with Appl 172:114592. https:\/\/doi.org\/10.1016\/j.eswa.2021.114592","journal-title":"Expert Syst with Appl"},{"key":"1196_CR16","unstructured":"Niwattanakul S, Singthongchai J, Naenudorn E, Wanapu S (2013) Using of jaccard coefficient for keywords similarity. In: Proceedings of the International Multiconference of Engineers and Computer Scientists, vol. 1, pp. 380\u2013384"},{"issue":"16","key":"1196_CR17","doi-asserted-by":"publisher","first-page":"13065","DOI":"10.1109\/JIOT.2021.3064225","volume":"8","author":"A Naouri","year":"2021","unstructured":"Naouri A, Wu H, Nouri NA, Dhelim S, Ning H (2021) A novel framework for mobile-edge computing by optimizing task offloading. IEEE Int. Things J 8(16):13065\u201313076. https:\/\/doi.org\/10.1109\/JIOT.2021.3064225","journal-title":"IEEE Int. Things J"},{"key":"1196_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2021.100382","volume":"14","author":"SO Ogundoyin","year":"2021","unstructured":"Ogundoyin SO, Kamil IA (2021) A trust management system for fog computing services. Int Things 14:100382. https:\/\/doi.org\/10.1016\/j.iot.2021.100382","journal-title":"Int Things"},{"key":"1196_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102494","volume":"112","author":"AE Omolara","year":"2022","unstructured":"Omolara AE, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Arshad H (2022) The internet of things security: a survey encompassing unexplored areas and new insights. Comput Sec 112:102494. https:\/\/doi.org\/10.1016\/j.cose.2021.102494","journal-title":"Comput Sec"},{"issue":"8","key":"1196_CR20","doi-asserted-by":"publisher","first-page":"1613","DOI":"10.1109\/LWC.2021.3070630","volume":"10","author":"B Pang","year":"2021","unstructured":"Pang B, Teng Z, Sun H, Du C, Li M, Zhu W (2021) A malicious node detection strategy based on fuzzy trust model and the abc algorithm in wireless sensor network. IEEE Wireless Commun Lett 10(8):1613\u20131617. https:\/\/doi.org\/10.1109\/LWC.2021.3070630","journal-title":"IEEE Wireless Commun Lett"},{"issue":"2","key":"1196_CR21","doi-asserted-by":"publisher","first-page":"1078","DOI":"10.1109\/COMST.2021.3062546","volume":"23","author":"P Ranaweera","year":"2021","unstructured":"Ranaweera P, Jurcut AD, Liyanage M (2021) Survey on multi-access edge computing security and privacy. IEEE Commun Surv Tutorials 23(2):1078\u20131124. https:\/\/doi.org\/10.1109\/COMST.2021.3062546","journal-title":"IEEE Commun Surv Tutorials"},{"key":"1196_CR22","first-page":"1","volume":"16","author":"DR-JG-J Rydning","year":"2018","unstructured":"Rydning DR-JG-J, Reinsel J, Gantz J (2018) The digitization of the world from edge to core. Framingham Int Data Corp 16:1\u201328","journal-title":"Framingham Int Data Corp"},{"issue":"10","key":"1196_CR23","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1109\/TMC.2014.2374154","volume":"14","author":"AM Shabut","year":"2014","unstructured":"Shabut AM, Dahal KP, Bista SK, Awan IU (2014) Recommendation based trust model with an effective defence scheme for manets. IEEE Trans Mobile Comput 14(10):2101\u20132115. https:\/\/doi.org\/10.1109\/TMC.2014.2374154","journal-title":"IEEE Trans Mobile Comput"},{"issue":"11","key":"1196_CR24","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.3390\/electronics8111359","volume":"8","author":"T Suh","year":"2019","unstructured":"Suh T, Cho Y (2019) An enhanced trust mechanism with consensus-based false information filtering algorithm against bad-mouthing attacks and false-praise attacks in wsns. Electronics 8(11):1359. https:\/\/doi.org\/10.3390\/electronics8111359","journal-title":"Electronics"},{"key":"1196_CR25","doi-asserted-by":"publisher","first-page":"4725","DOI":"10.1109\/ACCESS.2017.2786944","volume":"6","author":"B Sun","year":"2017","unstructured":"Sun B, Li D (2017) A comprehensive trust-aware routing protocol with multi-attributes for wsns. IEEE Access 6:4725\u20134741. https:\/\/doi.org\/10.1109\/ACCESS.2017.2786944","journal-title":"IEEE Access"},{"key":"1196_CR26","first-page":"16","volume":"21","author":"S Tisue","year":"2004","unstructured":"Tisue S, Wilensky U (2004) Netlogo: a simple environment for modeling complexity. Int Conf Complex Syst 21:16\u201321","journal-title":"Int Conf Complex Syst"},{"key":"1196_CR27","volume-title":"The Oxford Handbook of Social and Political Trust","author":"EM Uslaner","year":"2018","unstructured":"Uslaner EM (2018) The Oxford Handbook of Social and Political Trust. Oxford University Press"},{"issue":"1","key":"1196_CR28","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1109\/JSAC.2019.2952035","volume":"38","author":"D Velusamy","year":"2019","unstructured":"Velusamy D, Pugalendhi G, Ramasamy K (2019) A cross-layer trust evaluation protocol for secured routing in communication network of smart grid. IEEE J Select Areas Commun 38(1):193\u2013204. https:\/\/doi.org\/10.1109\/JSAC.2019.2952035","journal-title":"IEEE J Select Areas Commun"},{"issue":"5","key":"1196_CR29","doi-asserted-by":"publisher","first-page":"4218","DOI":"10.1109\/JIOT.2020.2966870","volume":"7","author":"T Wang","year":"2020","unstructured":"Wang T, Qiu L, Sangaiah AK, Liu A, Bhuiyan MZA, Ma Y (2020) Edge-computing-based trustworthy data collection model in the internet of things. IEEE Int Things J 7(5):4218\u20134227. https:\/\/doi.org\/10.1109\/JIOT.2020.2966870","journal-title":"IEEE Int Things J"},{"issue":"14","key":"1196_CR30","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/CC.2014.7085617","volume":"11","author":"Q Wu","year":"2014","unstructured":"Wu Q, Liu Q, Zhang L, Zhang Z (2014) A trusted routing protocol based on geodtn+ nav in vanet. China Commun 11(14):166\u2013174. https:\/\/doi.org\/10.1109\/CC.2014.7085617","journal-title":"China Commun"},{"key":"1196_CR31","doi-asserted-by":"publisher","first-page":"43679","DOI":"10.1109\/ACCESS.2019.2905550","volume":"7","author":"X Wu","year":"2019","unstructured":"Wu X, Huang J, Ling J, Shu L (2019) Bltm: beta and lqi based trust model for wireless sensor networks. IEEE Access 7:43679\u201343690. https:\/\/doi.org\/10.1109\/ACCESS.2019.2905550","journal-title":"IEEE Access"},{"key":"1196_CR32","doi-asserted-by":"publisher","unstructured":"Xia H, Xiao F, Zhang S-s, Hu C-q, Cheng X-z (2019) Trustworthiness inference framework in the social internet of things: A context-aware approach. In: IEEE INFOCOM 2019-IEEE Conference on Computer Communications, pp. 838\u2013846. https:\/\/doi.org\/10.1109\/INFOCOM.2019.8737491 . IEEE","DOI":"10.1109\/INFOCOM.2019.8737491"},{"issue":"6","key":"1196_CR33","doi-asserted-by":"publisher","first-page":"1247","DOI":"10.1109\/TMC.2019.2908154","volume":"19","author":"S Yu","year":"2020","unstructured":"Yu S, Dab B, Movahedi Z, Langar R, Wang L (2020) A socially-aware hybrid computation offloading framework for multi-access edge computing. IEEE Trans Mobile Comput 19(6):1247\u20131259. https:\/\/doi.org\/10.1109\/TMC.2019.2908154","journal-title":"IEEE Trans Mobile Comput"},{"issue":"1","key":"1196_CR34","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s10586-021-03518-7","volume":"26","author":"SKu Zaman","year":"2023","unstructured":"Zaman SKu, Jehangiri AI, Maqsood T, Haq Nu, Umar AI, Shuja J, Ahmad Z, Dhaou IB, Alsharekh MF (2023) Limpo: lightweight mobility prediction and offloading framework using machine learning for mobile edge computing. Cluster Comput 26(1):99\u2013117. https:\/\/doi.org\/10.1007\/s10586-021-03518-7","journal-title":"Cluster Comput"},{"issue":"3","key":"1196_CR35","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.1109\/TSMC.2019.2906310","volume":"51","author":"P Zhang","year":"2021","unstructured":"Zhang P, Zhou M, Kong Y (2021) A double-blind anonymous evaluation-based trust model in cloud computing environments. IEEE Trans Syst , Man, Cybernet: Syst 51(3):1805\u20131816. https:\/\/doi.org\/10.1109\/TSMC.2019.2906310","journal-title":"IEEE Trans Syst , Man, Cybernet: Syst"},{"key":"1196_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102249","volume":"105","author":"L Zhang","year":"2021","unstructured":"Zhang L, Zou Y, Wang W, Jin Z, Su Y, Chen H (2021) Resource allocation and trust computing for blockchain-enabled edge computing system. Comput Sec 105:102249. https:\/\/doi.org\/10.1016\/j.cose.2021.102249","journal-title":"Comput Sec"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01196-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s13278-023-01196-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-023-01196-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T14:13:49Z","timestamp":1740492829000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s13278-023-01196-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,25]]},"references-count":36,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["1196"],"URL":"https:\/\/doi.org\/10.1007\/s13278-023-01196-4","relation":{},"ISSN":["1869-5469"],"issn-type":[{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2024,1,25]]},"assertion":[{"value":"30 October 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"33"}}