{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T11:49:45Z","timestamp":1774007385389,"version":"3.50.1"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T00:00:00Z","timestamp":1573603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772554, 61572528, and 6157256"],"award-info":[{"award-number":["61772554, 61572528, and 6157256"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Intell. Syst. Technol."],"published-print":{"date-parts":[[2019,11,30]]},"abstract":"<jats:p>Security is a pivotal issue for the development of Cyber Physical Systems (CPS). The trusted computing of CPS includes the complete protection mechanisms, such as hardware, firmware, and software, the combination of which is responsible for enforcing a system security policy. A Trust Detection-based Secured Routing (TDSR) scheme is proposed to establish security routes from source nodes to the data center under malicious environment to ensure network security. In the TDSR scheme, sensor nodes in the routing path send detection routing to identify relay nodes\u2019 trust. And then, data packets are routed through trustworthy nodes to sink securely. In the TDSR scheme, the detection routing is executed in those nodes that have abundant energy; thus, the network lifetime cannot be affected. Performance evaluation through simulation is carried out for success of routing ratio, compromised node detection ratio, and detection routing overhead. The experiment results show that the performance can be improved in the TDSR scheme compared to previous schemes.<\/jats:p>","DOI":"10.1145\/3321694","type":"journal-article","created":{"date-parts":[[2019,11,14]],"date-time":"2019-11-14T22:07:36Z","timestamp":1573769256000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["A Trust Computing-based Security Routing Scheme for Cyber Physical Systems"],"prefix":"10.1145","volume":"10","author":[{"given":"Yuxin","family":"Liu","sequence":"first","affiliation":[{"name":"Central South University, ChangSha, China"}]},{"given":"Xiao","family":"Liu","sequence":"additional","affiliation":[{"name":"Central South University, ChangSha, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5190-4761","authenticated-orcid":false,"given":"Anfeng","family":"Liu","sequence":"additional","affiliation":[{"name":"Central South University, ChangSha, China"}]},{"given":"Neal N.","family":"Xiong","sequence":"additional","affiliation":[{"name":"Northeastern State University, OK, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8753-3878","authenticated-orcid":false,"given":"Fang","family":"Liu","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, China"}]}],"member":"320","published-online":{"date-parts":[[2019,11,13]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2064797"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2543680"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.026"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCAD.2016.2539327"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.09.001"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.237"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3046676"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2018.2833204"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18092885"},{"key":"e_1_2_1_10_1","volume-title":"Minimizing convergecast time and energy consumption in green internet of things","author":"Li Zhetao","unstructured":"Zhetao Li , Yuxin Liu , Anfeng Liu , Shiguo Wang , and Haolin Liu . 2018. Minimizing convergecast time and energy consumption in green internet of things . IEEE Trans. Emerg. Top. Comput. In Press . DOI:10.1109\/TETC.2018.2844282 10.1109\/TETC.2018.2844282 Zhetao Li, Yuxin Liu, Anfeng Liu, Shiguo Wang, and Haolin Liu. 2018. Minimizing convergecast time and energy consumption in green internet of things. IEEE Trans. Emerg. Top. Comput. In Press. DOI:10.1109\/TETC.2018.2844282"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/s16040451"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2205284"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.09.008"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2836150"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2449314"},{"key":"e_1_2_1_16_1","volume-title":"Design and analysis of probing route to defense sink-hole attacks for internet of things security","author":"Liu Yuxin","unstructured":"Yuxin Liu , Ming Ma , Xiao Liu , Naixue Xiong , Anfeng Liu , and Ying Zhu . 2018. Design and analysis of probing route to defense sink-hole attacks for internet of things security . IEEE Trans. Netw. Sci. Eng. In Press . DOI:https:\/\/doi.org\/10.1109\/TNSE.2018.2881152 Yuxin Liu, Ming Ma, Xiao Liu, Naixue Xiong, Anfeng Liu, and Ying Zhu. 2018. Design and analysis of probing route to defense sink-hole attacks for internet of things security. IEEE Trans. Netw. Sci. Eng. In Press. DOI:https:\/\/doi.org\/10.1109\/TNSE.2018.2881152"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2570740"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2015.06.016"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3066167"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-018-9449-0"},{"key":"e_1_2_1_21_1","article-title":"A secure charging scheme for electric vehicles with smart communities in energy blockchain","volume":"10","author":"Su Zhou","year":"2018","unstructured":"Zhou Su , Yuntao Wang , Qichao Xu , Minrui Fei , Yu-Chu Tian , and Ning Zhang . 2018 . A secure charging scheme for electric vehicles with smart communities in energy blockchain . IEEE Internet Things J. DOI : 10 .1109\/JIOT.2018.2869297 10.1109\/JIOT.2018.2869297 Zhou Su, Yuntao Wang, Qichao Xu, Minrui Fei, Yu-Chu Tian, and Ning Zhang. 2018. A secure charging scheme for electric vehicles with smart communities in energy blockchain. IEEE Internet Things J. DOI:10.1109\/JIOT.2018.2869297","journal-title":"IEEE Internet Things J. DOI"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.36"},{"key":"e_1_2_1_23_1","volume-title":"A low redundancy data collection scheme to maximize lifetime using matrix completion technique. EURASIP J. Wireless Commun. Netw. 5","author":"Tan Jiawei","year":"2019","unstructured":"Jiawei Tan , Wei Liu , Mande Xie , Houbing Song , Anfeng Liu , Ming Zhao , and Guoping Zhang . 2019. A low redundancy data collection scheme to maximize lifetime using matrix completion technique. EURASIP J. Wireless Commun. Netw. 5 ( 2019 ). DOI:http:\/\/doi.org\/10.1186\/s13638-018-1313-0 Jiawei Tan, Wei Liu, Mande Xie, Houbing Song, Anfeng Liu, Ming Zhao, and Guoping Zhang. 2019. A low redundancy data collection scheme to maximize lifetime using matrix completion technique. EURASIP J. Wireless Commun. Netw. 5 (2019). DOI:http:\/\/doi.org\/10.1186\/s13638-018-1313-0"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18030751"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2740279"},{"key":"e_1_2_1_26_1","unstructured":"OMNET++ simulator. 2016. Retrieved from http:\/\/www.omnetpp.org\/.  OMNET++ simulator. 2016. Retrieved from http:\/\/www.omnetpp.org\/."}],"container-title":["ACM Transactions on Intelligent Systems and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321694","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321694"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,13]]},"references-count":26,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,11,30]]}},"alternative-id":["10.1145\/3321694"],"URL":"https:\/\/doi.org\/10.1145\/3321694","relation":{},"ISSN":["2157-6904","2157-6912"],"issn-type":[{"value":"2157-6904","type":"print"},{"value":"2157-6912","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,13]]},"assertion":[{"value":"2018-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}