{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:10:15Z","timestamp":1767856215496,"version":"3.49.0"},"reference-count":62,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100004515","name":"Universiti Kebangsaan Malaysia through the Prime Impact Fund (DIP) Grant","doi-asserted-by":"publisher","award":["DIP-2020-021"],"award-info":[{"award-number":["DIP-2020-021"]}],"id":[{"id":"10.13039\/501100004515","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3086534","type":"journal-article","created":{"date-parts":[[2021,6,4]],"date-time":"2021-06-04T19:59:29Z","timestamp":1622836769000},"page":"83214-83233","source":"Crossref","is-referenced-by-count":13,"title":["ETAS: An Efficient Trust Assessment Scheme for BANs"],"prefix":"10.1109","volume":"9","author":[{"given":"Anand","family":"Kumar","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6992-1655","authenticated-orcid":false,"given":"Karan","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5310-5389","authenticated-orcid":false,"given":"Tayyab","family":"Khan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0106-7050","authenticated-orcid":false,"given":"Ali","family":"Ahmadian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1587-964X","authenticated-orcid":false,"given":"Mohamad Hanif Md.","family":"Saad","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manisha","family":"Manjul","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4508-5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0670-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.145"},{"key":"ref32","first-page":"75","article-title":"Trust key management scheme for wireless body area networks","volume":"12","author":"mana","year":"2011","journal-title":"Int J Netw Secur"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1858158.1858162"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.121313.00064"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIC.2016.7919700"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.3390\/s16040424"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-015-0341-0"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/MASS.2014.85"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1177\/0020720920953133"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3390\/s16040561"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2708713"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TMSCS.2016.2525997"},{"key":"ref27","article-title":"Extension of trust in a body area network","author":"weast","year":"2016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/09720529.2019.1582869"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/JSAC.2009.090504","article-title":"A secure mobile healthcare system using trust-based multicast scheme","volume":"27","author":"boukerche","year":"2009","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref1","first-page":"1","article-title":"Towards trust-aware health monitoring body area sensor networks","volume":"16","author":"yu","year":"2010","journal-title":"Int J Inf Technol"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-01834-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2454-1.ch016"},{"key":"ref21","first-page":"12","article-title":"Survey of trust management mechanism in wireless sensor network","volume":"20","author":"jiang","year":"2020","journal-title":"Netinfo Security"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00906-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/00207217.2019.1636313"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICIIECS.2015.7193088"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/s140101877"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22277-2_7"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.258"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.3014455"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007405"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3956"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3942"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.5121\/ijsptm.2018.7401"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1080\/03772063.2017.1284613"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-016-0254-3"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2240299"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2422966.2422975"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914769"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5374-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4772-4"},{"key":"ref13","first-page":"63","article-title":"A trust model using fuzzy logic in wireless sensor network","volume":"42","author":"kyung","year":"2008","journal-title":"World Acad Sci Eng Technol"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905550"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904544"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2879360"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2917763"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1368-y"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-7998-2454-1.ch030"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/978-3-642-36169-2_6","article-title":"Security and privacy in wireless body area networks for health care applications","author":"javadi","year":"2013","journal-title":"Wireless Networks and Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2012.2199996"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMR.989-994.4837"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.4108\/icst.bodynets.2013.253677"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/1550147720964358"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2014.8.5.13"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3377049.3377084"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2810337"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00865-9_3"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3974"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761504"},{"key":"ref47","first-page":"1","article-title":"Survey on attacks on wireless body area network","volume":"3","author":"karchowdhury","year":"2019","journal-title":"Int J Comput Intell IoT Forthcoming"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-6005-x"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5828-8_44"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2693-y"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1544-2_19"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09447002.pdf?arnumber=9447002","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:56:27Z","timestamp":1639770987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9447002\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3086534","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}