{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:03:08Z","timestamp":1772064188167,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/icin.2018.8401594","type":"proceedings-article","created":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T00:06:37Z","timestamp":1530576397000},"page":"1-5","source":"Crossref","is-referenced-by-count":1,"title":["A trust model based on evidence-based subjective logic for securing wireless mesh networks"],"prefix":"10.1109","author":[{"given":"Freshta","family":"Popalyar","sequence":"first","affiliation":[]},{"given":"Akmal","family":"Yaqini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"franz","year":"2013","journal-title":"Probabilistic opinion pooling generalized Part one General agendas"},{"key":"ref11","author":"alan","year":"2016","journal-title":"The Oxford Handbook of Probability and Philosophy"},{"key":"ref12","article-title":"Belief revision in probability theory","author":"pei","year":"1993","journal-title":"Proceedings of the Ninth International Conference on Uncertainty in Artificial Intelligence"},{"key":"ref13","first-page":"2135","article-title":"Hmm-based trust model","author":"eisalamouny","year":"2009","journal-title":"4th International Workshop on Formal Aspects in Security and Trust"},{"key":"ref14","first-page":"14","article-title":"Evidence-based trust: A mathematical model geared for multiagent systems","volume":"5 4","author":"yonghong","year":"2010","journal-title":"ACM Transactions on Autonomous and Adaptive Systems (TAAS)"},{"key":"ref15","article-title":"A New Interpretation of the Shannon Entropy Measure","author":"lewis","year":"2015","journal-title":"No DSTO-TN-1395 DEFENCE SCIENCE AND TECHNOLOGY GROUP EDINBURGH (AUSTRALIA)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861389"},{"key":"ref17","article-title":"Insider threats against trust mechanism with watchdog and defending approaches in wireless sensor networks","author":"youngho","year":"2012","journal-title":"Security and Privacy Workshops (SPW) 2012 IEEE Symposium on"},{"key":"ref18","first-page":"81","article-title":"Review of a mathematical theory of evidence","volume":"5 3","author":"zadeh","year":"1984","journal-title":"AI Magazine"},{"key":"ref19","first-page":"453","article-title":"Dempsters rule as seen by little colored balls","volume":"28 4","author":"audun","year":"2012","journal-title":"Computational Intelligence"},{"key":"ref4","article-title":"Performance analysis of the CONFIDANT protocol","author":"sonja","year":"2002","journal-title":"Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing"},{"key":"ref3","first-page":"381","article-title":"Flow-based reputation with uncertainty: evidence-based subjective logic","volume":"15 4","author":"boris","year":"2016","journal-title":"International Journal of Information Security"},{"key":"ref6","article-title":"Trust evaluation based reliable routing in wireless mesh network.","author":"xuyang","year":"2007","journal-title":"Wireless Communications Networking and Mobile Computing"},{"key":"ref5","article-title":"A survey of trust and reputation management systems in wireless communications","volume":"98 10","author":"han","year":"2010","journal-title":"Proceedings of the IEEE"},{"key":"ref8","article-title":"Trust metric integration in resource constrained networks via data fusion","author":"babbitt","year":"2015","journal-title":"Information Fusion (FUSION) 2015 18th International Conference on"},{"key":"ref7","article-title":"MCDM based trust model for secure routing in Wireless Mesh Networks","author":"shantanu","year":"2011","journal-title":"Information and Communication Technologies (WICT) 2011 World Congress on"},{"key":"ref2","author":"chen","year":"2007","journal-title":"Intrusion detection in wireless mesh networks"},{"key":"ref9","article-title":"A nonbiased trust model for wireless mesh networks","volume":"30 9","author":"tan","year":"2017","journal-title":"International Journal of Communication Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470059616"},{"key":"ref20","article-title":"A defect in Dempster-Shafer theory","author":"pei","year":"1994","journal-title":"Proceedings of the Tenth International Conference on Uncertainty in Artificial Intelligence"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416357"},{"key":"ref21","article-title":"A logic for uncertain probabilities","author":"audun","year":"2001","journal-title":"International Journal of Uncertainty Fuzziness and Knowledge-Based Systems"},{"key":"ref24","first-page":"131","article-title":"Regression-based trust model for mobile ad hoc networks","volume":"6 3","author":"revathi","year":"2012","journal-title":"IET Information Security"},{"key":"ref23","first-page":"1178","article-title":"Trust management for defending on-off attacks","volume":"26 4","author":"younghun","year":"2015","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref25","author":"jaydip","year":"2011","journal-title":"Research on Secure Routing for Wireless Mesh Networks"}],"event":{"name":"2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)","location":"Paris","start":{"date-parts":[[2018,2,19]]},"end":{"date-parts":[[2018,2,22]]}},"container-title":["2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8392644\/8401570\/08401594.pdf?arnumber=8401594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:52:57Z","timestamp":1643212377000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8401594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icin.2018.8401594","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}