{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:52:29Z","timestamp":1774122749785,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T00:00:00Z","timestamp":1698019200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,23]]},"DOI":"10.1109\/iotsms59855.2023.10325703","type":"proceedings-article","created":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T18:56:38Z","timestamp":1700765798000},"page":"117-124","source":"Crossref","is-referenced-by-count":3,"title":["Phoenix: IoT Trust Evaluation Using Game Theory with Second Chance Protocol"],"prefix":"10.1109","author":[{"given":"Himan","family":"Namdari","sequence":"first","affiliation":[{"name":"Worcester Polytechnic Institute,Dept. of Data Science,Worcester,MA,USA"}]},{"given":"Cihan","family":"Tunc","sequence":"additional","affiliation":[{"name":"University of North Texas,Dept. of Computer Science &#x0026; Engineering,Denton,TX,USA"}]},{"given":"Ram","family":"Dantu","sequence":"additional","affiliation":[{"name":"University of North Texas,Dept. of Computer Science &#x0026; Engineering,Denton,TX,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102442"},{"key":"ref2","article-title":"Internet of things (iot) spending worldwide 2023","author":"Vailshery","year":"2021"},{"key":"ref3","article-title":"The ultimate list of internet of things statistics for 2022","author":"Steward","year":"2022"},{"key":"ref4","article-title":"Cyberattacks on iot devices surge 300% in 2019, \u2018measured in billions\u2019, report claims","author":"Vailshery","year":"2019"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/icbc54727.2022.9805565"},{"issue":"01","key":"ref6","doi-asserted-by":"crossref","first-page":"59","DOI":"10.36548\/jtcsst.2021.1.006","article-title":"A data driven trust mechanism based on blockchain in iot sensor networks for detection and mitigation of attacks","volume":"3","author":"Sivaganesan","year":"2021","journal-title":"Journal of trends in Computer Science and Smart technology (TCSST)"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/iot2010004"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-04202-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3871524"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/s110201345"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2917763"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/209436"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2021.127407"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2015.2468576"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1504\/IJHPCN.2019.099267"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2022.3154357"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1968.tb00722.x"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.36.1.48"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/1969529"},{"issue":"1999","key":"ref20","first-page":"173","article-title":"Practical byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","journal-title":"OsDI"}],"event":{"name":"2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)","location":"San Antonio, TX, USA","start":{"date-parts":[[2023,10,23]]},"end":{"date-parts":[[2023,10,25]]}},"container-title":["2023 10th International Conference on Internet of Things: Systems, Management and Security (IOTSMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10325565\/10325665\/10325703.pdf?arnumber=10325703","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:43:05Z","timestamp":1710362585000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10325703\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,23]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/iotsms59855.2023.10325703","relation":{},"subject":[],"published":{"date-parts":[[2023,10,23]]}}}