{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:19:07Z","timestamp":1763457547937,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/iscc.2015.7405638","type":"proceedings-article","created":{"date-parts":[[2016,2,16]],"date-time":"2016-02-16T00:54:13Z","timestamp":1455584053000},"page":"962-967","source":"Crossref","is-referenced-by-count":34,"title":["Trust-based RPL for the Internet of Things"],"prefix":"10.1109","author":[{"given":"Nabil","family":"Djedjig","sequence":"first","affiliation":[]},{"given":"Djamel","family":"Tandjaoui","sequence":"additional","affiliation":[]},{"given":"Faiza","family":"Medjek","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1109\/ICACT.2005.245914","article-title":"Trust evaluation model for wireless sensor networks","volume":"1","author":"hur","year":"2005","journal-title":"Advanced Communication Technology 2005 ICACT 2005 The 7th International Conference on"},{"key":"ref11","first-page":"1","article-title":"Using sensor-ranks for in-network detection of faulty readings in wireless sensor networks","author":"xiao","year":"2007","journal-title":"Proceedings of the 6th ACM international workshop on Data engineering for wireless and mobile access"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2009.92"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.258"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WICOM.2009.5302528"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982547"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.031912.110179"},{"key":"ref17","first-page":"1","article-title":"Trust management for the internet of things and its application to service composition","author":"bao","year":"2012","journal-title":"IEEE WoWMoM 2012 Workshop on the Internet of Things Smart Objects and Services"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.347-350.2463"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TEMU.2012.6294705"},{"key":"ref4","article-title":"Rpl: Ipv6 routing protocol for low-power and lossy networks","author":"winter","year":"2012","journal-title":"RFC 6550"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"ref6","first-page":"63","article-title":"A trust model using fuzzy logic in wireless sensor network","volume":"42","author":"kim","year":"2008","journal-title":"World Academy of Science Engineering and Technology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2013.06.014"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2006.278584"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1362542.1362546"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1674-7_38"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2007.122"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2013.6727823"},{"key":"ref22","article-title":"Objective function zero for the routing protocol for low-power and lossy networks (rpl)","author":"thubert","year":"2012","journal-title":"RFC 6552"},{"key":"ref21","article-title":"Routing metrics used for path calculation in low power and lossy networks","author":"vasseur","year":"2012","journal-title":"RFC 6551"},{"article-title":"Operating system based compliance validation of trusted computing","year":"0","author":"singh","key":"ref23"}],"event":{"name":"2015 20th IEEE Symposium on Computers and Communication (ISCC)","start":{"date-parts":[[2015,7,6]]},"location":"Larnaca","end":{"date-parts":[[2015,7,9]]}},"container-title":["2015 IEEE Symposium on Computers and Communication (ISCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7397314\/7405441\/07405638.pdf?arnumber=7405638","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,15]],"date-time":"2020-09-15T13:46:48Z","timestamp":1600177608000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7405638\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/iscc.2015.7405638","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}