{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:32:32Z","timestamp":1757453552796,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2980258.2980413","type":"proceedings-article","created":{"date-parts":[[2016,11,2]],"date-time":"2016-11-02T12:22:17Z","timestamp":1478089337000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Beta Reputation and Direct Trust Model for Secure Communication in Wireless Sensor Networks"],"prefix":"10.1145","author":[{"given":"B.","family":"Priayoheswari","sequence":"first","affiliation":[{"name":"Department of Information Science and Technology, College of Engineering, Guindy, Anna University, Chennai, India"}]},{"given":"K.","family":"Kulothungan","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, College of Engineering, Guindy, Anna University, Chennai, India"}]},{"given":"A.","family":"Kannan","sequence":"additional","affiliation":[{"name":"Department of Information Science and Technology, College of Engineering, Guindy, Anna University, Chennai, India"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00302-4"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815396.1815429"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/544741.544853"},{"volume-title":"15th Bled Electron. Commerce Conf.,(June-2002)","author":"Josang R","key":"e_1_3_2_1_4_1","unstructured":"Josang and Ismail R , \" The beta reputation system,\" in Proc . 15th Bled Electron. Commerce Conf.,(June-2002) , 324--337. http:\/\/doi: 10.11451\/1280940.1280968. 10.11451\/1280940.1280968 Josang and Ismail R, \"The beta reputation system,\" in Proc. 15th Bled Electron. Commerce Conf.,(June-2002), 324--337. http:\/\/doi: 10.11451\/1280940.1280968."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1362542.1362546"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1621076.1621085"},{"key":"e_1_3_2_1_7_1","first-page":"118","article-title":"An authenticated trust and reputation calculation and management system for cloud and sensor networks integration","author":"Zhu","year":"2015","unstructured":"Zhu , Chunsheng, \" An authenticated trust and reputation calculation and management system for cloud and sensor networks integration .\" Information Forensics and Security, IEEE Transactions on (October- 2015 ), 118 -- 131 . Zhu, Chunsheng, et al. \"An authenticated trust and reputation calculation and management system for cloud and sensor networks integration.\" Information Forensics and Security, IEEE Transactions on (October-2015), 118--131.","journal-title":"Information Forensics and Security, IEEE Transactions on (October-"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.57"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.276"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.06.081216"},{"key":"e_1_3_2_1_11_1","first-page":"990","article-title":"ZEEP: Zone based energy efficient routing protocol for mobile sensor networks","author":"Srivastava R.","year":"2013","unstructured":"Srivastava , Juhi R. , and T. S. B. Sudarshan , \" ZEEP: Zone based energy efficient routing protocol for mobile sensor networks .\" IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), ( 2013 ), 990 -- 996 . Srivastava, Juhi R., and T. S. B. Sudarshan, \"ZEEP: Zone based energy efficient routing protocol for mobile sensor networks.\" IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), (2013), 990--996.","journal-title":"IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI), ("},{"key":"e_1_3_2_1_12_1","first-page":"1","article-title":"Location aware cluster based routing in wireless sensor networks","author":"Jerusha S","year":"2012","unstructured":"Jerusha S , Kulothungan K , Kannan A . Location aware cluster based routing in wireless sensor networks . International Journal of Computer and Communication Technology. ( 2012 ), 3(5), 1 -- 6 . Jerusha S, Kulothungan K, Kannan A. Location aware cluster based routing in wireless sensor networks. International Journal of Computer and Communication Technology. (2012), 3(5), 1--6.","journal-title":"International Journal of Computer and Communication Technology. ("},{"key":"e_1_3_2_1_13_1","first-page":"19","article-title":"An Adaptive Fault Tolerant Routing Protocol with Error Reporting Scheme for Wireless Sensor Networks","author":"Kulothungan K","year":"2011","unstructured":"Kulothungan K , Jothi JAA , Kannan A . An Adaptive Fault Tolerant Routing Protocol with Error Reporting Scheme for Wireless Sensor Networks . European Journal of Scientific Research.( 2011 ), 16 (1), 19 -- 32 . Kulothungan K, Jothi JAA, Kannan A. An Adaptive Fault Tolerant Routing Protocol with Error Reporting Scheme for Wireless Sensor Networks. European Journal of Scientific Research.(2011), 16 (1), 19--32.","journal-title":"European Journal of Scientific Research.("},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Anand K Ganapathy S Kulothungan K Yogesh P Kannan A. A rule based approach for attribute selection and intrusion detection in wireless sensor networks. Procedia Engineering.(2012) 38 1658--1664.  Anand K Ganapathy S Kulothungan K Yogesh P Kannan A. A rule based approach for attribute selection and intrusion detection in wireless sensor networks. Procedia Engineering.(2012) 38 1658--1664.","DOI":"10.1016\/j.proeng.2012.06.202"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.90"}],"event":{"name":"ICIA-16: International Conference on Informatics and Analytics","acronym":"ICIA-16","location":"Pondicherry India"},"container-title":["Proceedings of the International Conference on Informatics and Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980413","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2980258.2980413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:51Z","timestamp":1750217991000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2980258.2980413"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":15,"alternative-id":["10.1145\/2980258.2980413","10.1145\/2980258"],"URL":"https:\/\/doi.org\/10.1145\/2980258.2980413","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}