{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T16:21:46Z","timestamp":1778602906891,"version":"3.51.4"},"reference-count":156,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"24","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61862046"],"award-info":[{"award-number":["61862046"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Huhhot Science and Technology Plan","award":["2021-KJXM-TZJW-04"],"award-info":[{"award-number":["2021-KJXM-TZJW-04"]}]},{"name":"Science and Technology Program of Inner Mongolia Autonomous Region","award":["2020GG0188"],"award-info":[{"award-number":["2020GG0188"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1109\/jiot.2023.3297453","type":"journal-article","created":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T17:33:19Z","timestamp":1692293599000},"page":"21738-21762","source":"Crossref","is-referenced-by-count":8,"title":["A Comprehensive Review for 4-D Trust Management in Distributed IoT"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3901-8972","authenticated-orcid":false,"given":"Xuefei","family":"Li","sequence":"first","affiliation":[{"name":"School of Computing, Inner Mongolia University, Hohhot, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6660-5633","authenticated-orcid":false,"given":"Ru","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computing, Inner Mongolia University, Hohhot, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3139989"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2016.10.012","article-title":"A survey of trust computation models for service management in Internet of Things systems","volume":"97","author":"Jia","year":"2017","journal-title":"Comput. Commun."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/access.2013.2259892"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2969820"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3213699"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3066457"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3039296"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2011.042711.00083"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2011.092110.00088"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/thms.2022.3144956"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3100767"},{"key":"ref13","volume-title":"Subjective Logic. Artificial Intelligence: Foundations, Theory, and Algorithms","author":"Audun","year":"2016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/s1566-2535(02)00053-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/s0167-9236(99)00084-6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/tsmcc.2008.919174"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/access.2023.3244933"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/tevc.2023.3244537"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6911(82)80025-X"},{"issue":"1","key":"ref21","first-page":"1","article-title":"Introduction to grey system theory","volume":"1","author":"Julong","year":"1989","journal-title":"J. Grey Syst."},{"key":"ref22","volume-title":"Grey System Theory and Its Application","author":"Liu","year":"2014"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/09537280412331283955"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454211"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2009.33"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2011.072210.00026"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.3048301"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.010"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2018.2852491"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2003.1208918"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2013.6525602"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3184632"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2959124"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2010.5621979"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2020.2994747"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2012.37"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2012.33"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3111012"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2920987"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103232"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2812239"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc.2018.8377385"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2790-1"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3085187"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2847705"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.001.1900146"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.IR.8202"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2874095"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.110.2100029"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.011.2100746"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3125091"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2960526"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3077276"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3002711"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3054996"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3147478"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2020.2981314"},{"key":"ref58","volume-title":"The Official PGP User\u2019s Guide","author":"Zimmermann","year":"1995"},{"key":"ref59","first-page":"213","article-title":"Can we trust?","volume-title":"Trust: Making and Breaking Cooperative Relations","author":"Gambetta","year":"2000"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.3233\/jcs-2001-9402"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3085004"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.3003232"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2957421"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/jsyst.2021.3078797"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1460877.1460916"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2962282"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2014.2320505"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/tnse.2018.2866783"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8123-1_28"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2864189"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3114438"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.09.001"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/access.2020.2979022"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/kaleidoscope.2015.7383635"},{"key":"ref76","first-page":"61","article-title":"Context-aware trust evaluation functions for dynamic reconfigurable systems","volume-title":"Proc. WWW Workshop Models Trust Web","author":"Toivonen"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2022.3182121"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2015.2494017"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3177275"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/tpds.2013.116"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3142989"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2015.2420552"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.2981127"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3035869"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2902022"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3004041"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2022.3181668"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2967568"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3060751"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc.2019.8885994"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455794"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3081422"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2013.105"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2022.3179875"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/percomworkshops51409.2021.9430929"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.3390\/fi14050135"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3102578"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0146"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2022.3187788"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3176374"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3028380"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/infcomw.2010.5466696"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3063710"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3027440"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/icect.2005.4"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1504\/ijguc.2015.066397"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2733225"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.2298\/csis110303056c"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.12913\/22998624\/62703"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/aiccsa47632.2019.9035294"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/1341811.1341823"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2014.6821746"},{"issue":"12","key":"ref113","first-page":"19","article-title":"An advanced certain trust model using fuzzy logic and probabilistic logic theory","volume":"3","author":"Nafi","year":"2012","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/mnet.003.2100672"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/icetech.2016.7569215"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3079838"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/jbhi.2021.3107339"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2019.2952035"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3185684"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0181124"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/cdc.2004.1428612"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3215635"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2019.123514"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2019.2951620"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2006.154"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/icdcs.2019.00116"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/infocom.2019.8737491"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2005.861389"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09428-1_2"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/tifs.2020.2997179"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2836144"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3082272"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3189349"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2020.2995371"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2365797"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2022.3179428"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2020.3013279"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/pdcat.2012.127"},{"key":"ref139","first-page":"2502","article-title":"The beta reputation system","volume-title":"Proc. 15th Bled Electron. Commerce Conf.","author":"J\u00f8sang"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.06.013"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2021.3124073"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2016.2565001"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2018.2822677"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2930286"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/tsusc.2018.2839623"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2020.3046906"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/tsc.2023.3241975"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/trustcom.2015.528"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.08.003"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3044296"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.3029221"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3059261"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/naecon.2012.6531028"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2020.2999566"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/jiot.2020.2975084"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/tits.2021.3129417"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/10353047\/10223275.pdf?arnumber=10223275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,20]],"date-time":"2023-12-20T01:20:45Z","timestamp":1703035245000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10223275\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":156,"journal-issue":{"issue":"24"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2023.3297453","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,15]]}}}