{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T22:10:48Z","timestamp":1771539048910,"version":"3.50.1"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/wf-iot.2019.8767170","type":"proceedings-article","created":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T00:04:42Z","timestamp":1563840282000},"page":"278-282","source":"Crossref","is-referenced-by-count":23,"title":["A Similarity based Trust Model to Mitigate Badmouthing Attacks in Internet of Things (IoT)"],"prefix":"10.1109","author":[{"given":"Vijender Busi","family":"Reddy","sequence":"first","affiliation":[]},{"given":"Atul","family":"Negi","sequence":"additional","affiliation":[]},{"given":"S","family":"Venkataraman","sequence":"additional","affiliation":[]},{"given":"V Raghu","family":"Venkataraman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2017.2699561"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref12","first-page":"1","article-title":"A survey of black hole attacks in wireless mobile ad hoc networks","author":"fan hsun tseng","year":"2011","journal-title":"A Springer open access journal on Human Centric computing and Information sciences"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2059690"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2011.86"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2736446"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831898"},{"key":"ref17","year":"0"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1016\/j.knosys.2012.07.019","article-title":"A new similarity function for selecting neighbors for each target item in collaborative filtering","volume":"37","author":"keunho choi","year":"2013","journal-title":"Elsevier Knowledge-Based Systems"},{"key":"ref19","author":"rozee","year":"2016","journal-title":"Hc-12 wireless serial port communication module v2 3"},{"key":"ref4","author":"murthy","year":"2004","journal-title":"Ad Hoc Wireless Networks Architectures and Protocols"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.042711.00083"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.57"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for internet of things","volume":"42","author":"zheng yan","year":"2014","journal-title":"Elsevier Journal of Network and Computer Applications"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref9","article-title":"Sori: A secure and objective reputation based incentive scheme for ad-hoc networks","author":"he","year":"2004","journal-title":"IEEE Wireless Communications and Networking Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2018.093331"}],"event":{"name":"2019 IEEE 5th World Forum on Internet of Things (WF-IoT'19)","location":"Limerick, Ireland","start":{"date-parts":[[2019,4,15]]},"end":{"date-parts":[[2019,4,18]]}},"container-title":["2019 IEEE 5th World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8764305\/8767167\/08767170.pdf?arnumber=8767170","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:54:06Z","timestamp":1658094846000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8767170\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2019.8767170","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}