{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T16:08:24Z","timestamp":1774454904419,"version":"3.50.1"},"reference-count":210,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100019457","name":"OPEVA project that has received funding within the Key Digital Technologies Joint Undertaking (KDT JU) from the European Union\u2019s Horizon Europe Programme","doi-asserted-by":"publisher","award":["101097267"],"award-info":[{"award-number":["101097267"]}],"id":[{"id":"10.13039\/100019457","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013348","name":"Swiss State Secretariat for Education, Research and Innovation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013348","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innosuisse\u2014Swiss Innovation Agency"},{"name":"Views and opinions expressed are however those of the author(s) only and do not necessarily reflect those of the European Union or KDT JU"},{"name":"Neither the European Union nor the granting authority can be held responsible for them"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/access.2023.3320945","type":"journal-article","created":{"date-parts":[[2023,9,29]],"date-time":"2023-09-29T17:45:30Z","timestamp":1696009530000},"page":"106803-106832","source":"Crossref","is-referenced-by-count":12,"title":["Exploring Trust Modeling and Management Techniques in the Context of Distributed Wireless Networks: A Literature Review"],"prefix":"10.1109","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8932-034X","authenticated-orcid":false,"given":"Teri","family":"Lenard","sequence":"first","affiliation":[{"name":"Centre Universitaire d&#x2019;Informatique, Geneva School of Economics and Management, University of Geneva, Carouge, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3214-8515","authenticated-orcid":false,"given":"Anastasija","family":"Collen","sequence":"additional","affiliation":[{"name":"Centre Universitaire d&#x2019;Informatique, Geneva School of Economics and Management, University of Geneva, Carouge, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1124-4214","authenticated-orcid":false,"given":"Meriem","family":"Benyahya","sequence":"additional","affiliation":[{"name":"Centre Universitaire d&#x2019;Informatique, Geneva School of Economics and Management, University of Geneva, Carouge, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0172-6319","authenticated-orcid":false,"given":"Niels Alexander","family":"Nijdam","sequence":"additional","affiliation":[{"name":"Centre Universitaire d&#x2019;Informatique, Geneva School of Economics and Management, University of Geneva, Carouge, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1390-479X","authenticated-orcid":false,"given":"B\u00e9la","family":"Genge","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering and Information Technology, Faculty of Engineering and Information Technology, George Emil Palade University of Medicine, Pharmacy, Science, and Technology of T&#x00E2;rgu Mure&#x015F;, T&#x00E2;rgu Mure&#x015F;, Romania"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.23919\/JCN.2022.000026"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3050007"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2022.3152841"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.3390\/fi14020031"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2020.103756"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.3390\/app11051998"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109354"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3035869"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2936263"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101481"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6223"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2021.101330"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICNAS53565.2021.9628892"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951619"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3129458"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain53845.2021.00053"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/EDGE55608.2022.00025"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109404"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.107952"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966747"},{"key":"ref46","article-title":"The meanings of trust","author":"mcknight","year":"1996"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-356-9_3"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-42337-1"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1151454.1151499"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/11537878_18"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33246-4_1"},{"key":"ref43","first-page":"542","article-title":"ComTrustO: Composite trust-based ontology framework for information and decision fusion","author":"oltramari","year":"2015","journal-title":"Proc 18th Int Conf Inf Fusion (Fusion)"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2006.07.009"},{"key":"ref8","first-page":"213","article-title":"Can we trust trust?","author":"gambetta","year":"1988","journal-title":"Trust Making and Breaking Cooperative Relations"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1108\/10662240910927849"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.76"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2015.07.011"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2014.06.003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2815595"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3143572"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/568574.568575"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2014.6968972"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2013.03.003"},{"key":"ref34","article-title":"Ontology development 101: A guide to creating your first ontology","author":"noy","year":"2001"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2008.39"},{"key":"ref36","first-page":"147","article-title":"An ontology based trust framework for sensor-driven pervasive environment","author":"karthik","year":"2017","journal-title":"Proc Asia Model Symp (AMS)"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.3390\/jsan11030043"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10182223"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/CTS.2011.5928659"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107248"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2010.42"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1109\/AICCSA.2006.205108","article-title":"trust ontology for service-oriented environment","author":"hussain","year":"2006","journal-title":"IEEE International Conference on Computer Systems and Applications 2006"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.10.012"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102409"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3390\/app9010166"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2008.04.002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.05.006"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396947"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.10.034"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.06.030"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s20216041"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2957744"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1090\/qam\/102435"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.1998.702600"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/MDM48529.2020.00026"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4728"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2997179"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190336"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2196"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107568"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3561"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2201"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctv10vm1qb"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.03.008"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100227"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10243105"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-381479-1.00002-2"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5766"},{"key":"ref132","doi-asserted-by":"crossref","first-page":"744","DOI":"10.3139\/120.111541","article-title":"Sine-cosine optimization algorithm for the conceptual design of automobile components","volume":"62","author":"yildiz","year":"2020","journal-title":"Material Tests"},{"key":"ref130","first-page":"401","article-title":"On a measure of divergence between two multinomial populations","volume":"7","author":"bhattacharyya","year":"1946","journal-title":"Sankhy?"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3019286"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3047642"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101898"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2022.3179595"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.07.006"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/3431390"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102215"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102308"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3416011.3424757"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3136548"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3108807"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.04.002"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2003.813506"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2181"},{"key":"ref81","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4057.003.0004","article-title":"A primer on kernel methods","author":"vert","year":"2004","journal-title":"Kernel Methods in Computational Biology"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.04.007"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968948"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.3390\/fi14050135"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1423333"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.05.016"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/BF00935665"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.12.045"},{"key":"ref80","first-page":"281","article-title":"Some methods for classification and analysis of MultiVariate observations","volume":"1","author":"macqueen","year":"1967","journal-title":"Proc 5th Berkeley Symp Math Statist Probab"},{"key":"ref79","article-title":"The PageRank citation ranking: Bringing order to the web","author":"page","year":"1999","journal-title":"Proc Web Conf Comput Sci Math"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2002.1035242"},{"key":"ref78","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316870","author":"bernardo","year":"1994","journal-title":"Bayesian Theory"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938995"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926982"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.41"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2021.102219"},{"key":"ref104","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proc Int'l Conf Knowledge Discovery and Data Mining"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2020.102403"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(84)90020-7"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100404"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289588"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10151840"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2021.104271"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2978143"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9030502"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.06.049"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107123"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103519"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00017"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2930286"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3138370"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.049"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144015"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3377049.3377054"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.05.011"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108013"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2022.08.004"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2021.10.006"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.107735"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.06.003"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3101051"},{"key":"ref65","article-title":"A coalitional security game against data integrity attacks in autonomous vehicle networks","volume":"37","author":"anwar","year":"2022","journal-title":"Veh Commun"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109119"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1049\/ise2.12029"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5397"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/CONIT55038.2022.9848121"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5109"},{"key":"ref120","article-title":"A secure routing scheme to mitigate attack in wireless adhoc sensor network","volume":"103","author":"jasper","year":"2021","journal-title":"Comput Secur"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107318"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11020185"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3099072"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2019.11.030"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100256"},{"key":"ref177","article-title":"Deep learning for anomaly detection: A survey","author":"chalapathy","year":"2019","journal-title":"arXiv 1901 03407"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100199"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.3390\/fi14010028"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2021.102752"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3046906"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107130"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2019-0046"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106901"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107254"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.3390\/electronics10121442"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2021.107479"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.3390\/app112411947"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7238"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9101659"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.3390\/app11010414"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.3390\/smartcities5010020"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2020.106722"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.02.015"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3169788"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.64"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2020.106789"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108413"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102956"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3027440"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-010-0646-0"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.06.052"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2021.3070630"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.3390\/sym12040609"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2021.101388"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.05.061"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.103013"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics50389.2020.00022"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102033"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.04.019"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.07.026"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.09.001"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1111\/coin.12473"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2022.07.006"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3020313"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3076118"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.6557"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1108\/10662241111123739"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3362168"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/EEEIC.2016.7555867"},{"key":"ref14","first-page":"162","article-title":"Internet of Things: Survey on security","volume":"27","author":"mena","year":"2018","journal-title":"Inform & Secur J"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.3390\/iot3020015"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/iot2010009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3009298"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2852491"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.08.017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040094"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC48107.2020.9148339"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118557747"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100350"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.02.024"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.02.011"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3078797"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.3390\/a15020028"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.7057"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100392"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2021.02.011"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1049\/ntw2.12036"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.06.039"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/10005208\/10267920.pdf?arnumber=10267920","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,23]],"date-time":"2023-12-23T02:44:44Z","timestamp":1703299484000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10267920\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":210,"URL":"https:\/\/doi.org\/10.1109\/access.2023.3320945","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]}}}