{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T22:02:30Z","timestamp":1765231350974,"version":"3.41.0"},"reference-count":123,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,12,8]],"date-time":"2024-12-08T00:00:00Z","timestamp":1733616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2024,12,31]]},"abstract":"<jats:p>With the growing popularity of the Internet of Things (IoT), billions of devices are anticipated to be deployed in various industries without establishing trust between them. In environments without pre-established trust, reputation systems provide an effective method of assessing the trustworthiness of IoT devices. There has been considerable literature on deploying reputation systems in industries that have not yet established trust among themselves. Therefore, the article reviews published studies on reputation systems for IoT applications to date, focusing on decentralised systems and decentralised systems using blockchain technology. These studies are evaluated regarding security (including integrity and privacy) and non-security requirements to highlight open research challenges. In alignment with this, an analysis and summary of the existing review studies on reputation systems for particular IoT applications are presented, demonstrating the need for a review article to consider all IoT applications and those that have not been explored. The IoT applications and sub-applications are described, and their problem statement, literature to date and research gap are comprehensively evaluated. Finally, the open research challenges concerning reputation systems are reviewed and addressed to provide the researcher with a road map of potential research directions.<\/jats:p>","DOI":"10.1145\/3674156","type":"journal-article","created":{"date-parts":[[2024,6,20]],"date-time":"2024-06-20T15:04:35Z","timestamp":1718895875000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Systematic Review of Blockchain-Based Privacy-Preserving Reputation Systems for IoT Applications"],"prefix":"10.1145","volume":"3","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9313-8663","authenticated-orcid":false,"given":"Haitham","family":"Mahmoud","sequence":"first","affiliation":[{"name":"Birmingham City University, Birmingham, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0424-9498","authenticated-orcid":false,"given":"Junaid","family":"Arshad","sequence":"additional","affiliation":[{"name":"Birmingham City University, Birmingham, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8021-445X","authenticated-orcid":false,"given":"Adel","family":"Aneiba","sequence":"additional","affiliation":[{"name":"Birmingham City University, Birmingham, UK"}]}],"member":"320","published-online":{"date-parts":[[2024,12,8]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"[n.d.]. Find & pay for parking\u2014On-street. Retrieved June 8 2022 from https:\/\/www.parkmobile.io\/"},{"key":"e_1_3_1_3_2","unstructured":"[n. d.]. Get everywhere easier: Reserve parking and save. Retrieved June 8 2022 from https:\/\/spothero.com\/"},{"key":"e_1_3_1_4_2","unstructured":"[n. d.]. Parking just got a lot simpler. Retrieved June 8 2022 from https:\/\/www.parkwhiz.com\/"},{"key":"e_1_3_1_5_2","unstructured":"[n. d.]. People. places. connected. Retrieved June 8 2022 from https:\/\/www.fybr.com\/"},{"key":"e_1_3_1_6_2","unstructured":"[n. d.]. Sources of greenhouse gas emissions. Retrieved June 8 2022 from https:\/\/www.epa.gov\/ghgemissions\/sources-greenhouse-gas-emissions"},{"key":"e_1_3_1_7_2","unstructured":"[n. d.]. We make parking easy. Retrieved June 8 2022 from https:\/\/www.parkme.com\/"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2019.06.003"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tra.2018.10.019"},{"key":"e_1_3_1_10_2","volume-title":"A Blockchain-Based Smart Parking System with Privacy Preservation and Reputation Management","author":"Amiri Wesam Al","year":"2019","unstructured":"Wesam Al Amiri. 2019. A Blockchain-Based Smart Parking System with Privacy Preservation and Reputation Management. Ph.D. Dissertation. Tennessee Technological University."},{"key":"e_1_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS48487.2020.00014"},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102814"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCGI.2008.45"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70630-4_13"},{"key":"e_1_3_1_15_2","volume-title":"Proceedings of the 3rd Annual Scientific Conference of the LORNET Research Network","volume":"6","author":"Anwar Mohd","year":"2006","unstructured":"Mohd Anwar and Jim Greer. 2006. Reputation management in privacy-enhanced E-learning. In Proceedings of the 3rd Annual Scientific Conference of the LORNET Research Network. 6."},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69132-7_76"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3098976"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2962282"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3016945"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.05.005"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/PIERS-FALL.2017.8293243"},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969820"},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3236008"},{"key":"e_1_3_1_24_2","first-page":"304","article-title":"Trust in tourism via blockchain technology: Results from a systematic review","author":"Calvaresi Davide","year":"2019","unstructured":"Davide Calvaresi, Maxine Leis, Alevtina Dubovitskaya, Roland Schegg, and Michael Schumacher. 2019. Trust in tourism via blockchain technology: Results from a systematic review. Information and Communication Technologies in Tourism 2019, 304\u2013317.","journal-title":"Information and Communication Technologies in Tourism 2019"},{"key":"e_1_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2019.2917149"},{"issue":"2","key":"e_1_3_1_26_2","first-page":"2018","article-title":"South China Morning Post","volume":"5","author":"Chan Minnie","year":"2017","unstructured":"Minnie Chan. 2017. South China Morning Post. Retrieved 5, 2 (2017), 2018.","journal-title":"Retrieved"},{"key":"e_1_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00114"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.3390\/en12234527"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/SSS47320.2020.9174269"},{"key":"e_1_3_1_30_2","unstructured":"Hana Creger Joel Espino and Alvaro S. Sanchez. 2019. Autonomous vehicle heaven or hell? Creating a transportation revolution that benefits all. Retrieved from https:\/\/trid.trb.org\/View\/1591302"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169419"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2020.3044890"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3133958"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2958355"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2015.7412073"},{"key":"e_1_3_1_36_2","unstructured":"D. Dhinakaran S. M. Sankar D. Selvaraj and S. Edwin Raja. 2024. Privacy-preserving data in IoT-based cloud systems: A comprehensive survey with AI integration. arXiv:2401.00794. Retrieved from https:\/\/arxiv.org\/abs\/2401.00794"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(15)60659-8"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110332"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.103071"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2021.3103938"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2012.09.856"},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06154-y"},{"key":"e_1_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.003"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3490236"},{"key":"e_1_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1093\/jigpal\/jzp077"},{"key":"e_1_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.3390\/s20030791"},{"key":"e_1_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"key":"e_1_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2457491"},{"key":"e_1_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3105273"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100350"},{"key":"e_1_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2020.115598"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0225688"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"e_1_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2794991"},{"key":"e_1_3_1_55_2","volume-title":"Guidelines for Performing SYSTEMATIC Literature Reviews in Software Engineering","author":"Keele Staffs","year":"2007","unstructured":"Staffs Keele and Stuart M. Charters. 2007. Guidelines for Performing SYSTEMATIC Literature Reviews in Software Engineering. Technical Report. Version 2.3 EBSE Technical Report. EBSE."},{"key":"e_1_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/1655188.1655197"},{"key":"e_1_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2017.10.070"},{"key":"e_1_3_1_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2018.8581849"},{"key":"e_1_3_1_59_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi14020031"},{"key":"e_1_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00450-017-0348-5"},{"key":"e_1_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2021.02.024"},{"key":"e_1_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.3934\/mbe.2022194"},{"key":"e_1_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2016.7881106"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.899"},{"key":"e_1_3_1_65_2","unstructured":"Todd Litman. 2020. Autonomous vehicle implementation predictions: Implications for transport planning. Retrieved from https:\/\/trid.trb.org\/View\/1678741"},{"key":"e_1_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2010-00290-3"},{"key":"e_1_3_1_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2020.3011693"},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864189"},{"key":"e_1_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00025"},{"key":"e_1_3_1_70_2","author":"Manyika James","year":"2015","unstructured":"James Manyika, Michael Chui, Peter Bisson, Jonathan Woetzel, Richard Dobbs, Jacques Bughin, and Dan Aharon. 2015. Unlocking the Potential of the Internet of Things. McKinsey Global Institute.","journal-title":"Unlocking the Potential of the Internet of Things"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.005"},{"key":"e_1_3_1_72_2","first-page":"1","article-title":"Drivers spend an average of 17 hours a year searching for parking spots","author":"McCoy Kevin","year":"2017","unstructured":"Kevin McCoy. 2017. Drivers spend an average of 17 hours a year searching for parking spots. USA Today, 1\u20132.","journal-title":"USA Today"},{"key":"e_1_3_1_73_2","author":"Menon Nikhil","year":"2016","unstructured":"Nikhil Menon, Abdul Pinjari, Yu Zhang, and Linghong Zou. 2016. Consumer Perception and Intended Adoption of Autonomous-Vehicle Technology: Findings from a University Population Survey. Technical Report.","journal-title":"Consumer Perception and Intended Adoption of Autonomous-Vehicle Technology: Findings from a University Population Survey"},{"key":"e_1_3_1_74_2","unstructured":"Seyed Amid Moeinzadeh Mirhosseini Ali Fanian and T. Aaron Gulliver. 2021. A trust and reputation system for IoT exploiting distributed ledger technology. arXiv:2111.13500. Retrieved from https:\/\/arxiv.org\/abs\/2111.13500"},{"key":"e_1_3_1_75_2","doi-asserted-by":"publisher","DOI":"10.35940\/ijeat.F9274.088619"},{"key":"e_1_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0183-8"},{"key":"e_1_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2018.2834472"},{"key":"e_1_3_1_78_2","doi-asserted-by":"publisher","DOI":"10.1080\/17440572.2022.2156863"},{"key":"e_1_3_1_79_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103402"},{"key":"e_1_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2016.7572524"},{"key":"e_1_3_1_81_2","first-page":"230","volume-title":"Proceedings of the International Conference on User Modeling, Adaptation, and Personalization","author":"Nusrat Sabrina","year":"2011","unstructured":"Sabrina Nusrat and Julita Vassileva. 2011. Recommending services in a trust-based decentralized user modeling system. In Proceedings of the International Conference on User Modeling, Adaptation, and Personalization. Springer, 230\u2013242."},{"key":"e_1_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9061050"},{"key":"e_1_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3210284.3219776"},{"key":"e_1_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2660461"},{"key":"e_1_3_1_85_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS56262.2023.10041348"},{"key":"e_1_3_1_86_2","first-page":"48","volume-title":"Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024) (AINA\u201924)","author":"Rabah Mourad","year":"2024","unstructured":"Mourad Rabah, Ronan Champagnat, Yacine Ghamri-Doudane, and Mouhamed Amine Bouchiha. 2024. DARS: Empowering trust in blockchain-based real-world applications with a decentralized anonymous reputation system. In Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024) (AINA\u201924). 48\u201361."},{"key":"e_1_3_1_87_2","unstructured":"Hasnae Rahimi and Hanan El Bekkali. 2017. State of the art of trust and reputation systems in E-commerce context. arXiv:1710.10061."},{"key":"e_1_3_1_88_2","volume-title":"The Future of Free Speech, Trolls, Anonymity and Fake News Online","author":"Rainie Harrison","year":"2017","unstructured":"Harrison Rainie, Janna Quitney Anderson, and Jonathan Albright. 2017. The Future of Free Speech, Trolls, Anonymity and Fake News Online. Pew Research Center, Washington, DC."},{"key":"e_1_3_1_89_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"e_1_3_1_90_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-011-0372-x"},{"key":"e_1_3_1_91_2","unstructured":"Jose Rivera and Hans Arno Jacobsen. 2017. On the effects of distributed electric vehicle network utility maximization in low voltage feeders. arXiv:1706.10074. Retrieved from https:\/\/arxiv.org\/abs\/1706.10074"},{"key":"e_1_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-08-2021-0230"},{"key":"e_1_3_1_93_2","first-page":"647","volume-title":"Proceedings of the International Conference on Complex Networks and Their Applications","author":"Schiedermeier Maximilian","year":"2019","unstructured":"Maximilian Schiedermeier, Omar Hasan, Lionel Brunie, Tobias Mayer, and Harald Kosch. 2019. A transparent referendum protocol with immutable proceedings and verifiable outcome for trustless networks. In Proceedings of the International Conference on Complex Networks and Their Applications. Springer, 647\u2013658."},{"key":"e_1_3_1_94_2","first-page":"209","volume-title":"Proceedings of the European Public Key Infrastructure Workshop","author":"Schiffner Stefan","year":"2009","unstructured":"Stefan Schiffner, Sebastian Clau\u00c3\u0178, and Sandra Steinbrecher. 2009. Privacy and liveliness for reputation systems. In Proceedings of the European Public Key Infrastructure Workshop. Springer, 209\u2013224."},{"key":"e_1_3_1_95_2","doi-asserted-by":"publisher","DOI":"10.1109\/MITS.2009.932716"},{"key":"e_1_3_1_96_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.tranpol.2006.05.005"},{"key":"e_1_3_1_97_2","first-page":"1577","article-title":"Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce","author":"Singh Sachchidanand","year":"2015","unstructured":"Sachchidanand Singh and Nirmala Singh. 2015. Internet of Things (IoT): Security challenges, business opportunities & reference architecture for E-commerce. In Proceedings of the International Conference on Green Computing and Internet of Things (ICGCIoT\u201915). IEEE, 1577\u20131581.","journal-title":"Proceedings of the International Conference on Green Computing and Internet of Things (ICGCIoT\u201915)"},{"key":"e_1_3_1_98_2","doi-asserted-by":"publisher","DOI":"10.1109\/SYSOSE.2017.7994973"},{"key":"e_1_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869297"},{"key":"e_1_3_1_100_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781003081487-5"},{"key":"e_1_3_1_101_2","first-page":"1","article-title":"Global EV outlook: Understanding the electric vehicle landscape to 2020","volume":"1","author":"Trigg Tali","year":"2013","unstructured":"Tali Trigg, Paul Telleen, R. Boyd, F. Cuenot, D. D\u2019Ambrosio, R. Gaghen, J. Gagn\u00e9, A. Hardcastle, D. Houssin, A. Jones, et al. 2013. Global EV outlook: Understanding the electric vehicle landscape to 2020. International Energy Agency, Thibaut Abergel, Till Bunsen, Marine Gorner, Pierre Leduc, Sarbojit Pal, Leonardo Paoli, Seshadri Raghavan, Jacopo Tattini, Jacob Teter, Sadanand Wachche and Per-Anders Widell. Hanjiro Ambrose, Jessica Dunn, Margaret Slattery, California Davis and Shahmeer Mohsin (Eds.), 1 (2013), 1\u201340.","journal-title":"International Energy Agency, Thibaut Abergel, Till Bunsen, Marine Gorner, Pierre Leduc, Sarbojit Pal, Leonardo Paoli, Seshadri Raghavan, Jacopo Tattini, Jacob Teter, Sadanand Wachche and Per-Anders Widell. Hanjiro Ambrose, Jessica Dunn, Margaret Slattery, California Davis and Shahmeer Mohsin"},{"key":"e_1_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.25046\/aj050150"},{"key":"e_1_3_1_103_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijin.2021.09.007"},{"key":"e_1_3_1_104_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9163027"},{"key":"e_1_3_1_105_2","doi-asserted-by":"publisher","DOI":"10.1007\/s40685-018-0080-4"},{"key":"e_1_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2805837"},{"key":"e_1_3_1_107_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2021.117056"},{"key":"e_1_3_1_108_2","first-page":"13","article-title":"PPCS: An intelligent privacy-preserving mobile-edge crowdsensing strategy for industrial IoT","volume":"8","author":"Wang Xiaoding","year":"2020","unstructured":"Xiaoding Wang, Sahil Garg, Hui Lin, Georges Kaddoum, Jia Hu, and M. Shamim Hossain. 2020. PPCS: An intelligent privacy-preserving mobile-edge crowdsensing strategy for industrial IoT. IEEE Internet of Things Journal 8, 13 (2020), 10288\u201310298.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_1_109_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3147478"},{"key":"e_1_3_1_110_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.retrec.2018.06.006"},{"key":"e_1_3_1_111_2","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000166"},{"key":"e_1_3_1_112_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2737968"},{"key":"e_1_3_1_113_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"key":"e_1_3_1_114_2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2015.7180511"},{"key":"e_1_3_1_115_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2836144"},{"key":"e_1_3_1_116_2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3106297"},{"key":"e_1_3_1_117_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848195"},{"key":"e_1_3_1_118_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2013.6654927"},{"key":"e_1_3_1_119_2","doi-asserted-by":"publisher","DOI":"10.1109\/SECON48991.2020.9158420"},{"key":"e_1_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2894108"},{"key":"e_1_3_1_121_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2920922"},{"key":"e_1_3_1_122_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819134"},{"key":"e_1_3_1_123_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2753245"},{"key":"e_1_3_1_124_2","first-page":"614","volume-title":"Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC\u201913)","author":"Zhou Ming","year":"2013","unstructured":"Ming Zhou, Jiafeng Shen, Huifang Chen, and Lei Xie. 2013. A cooperative spectrum sensing scheme based on the Bayesian reputation model in cognitive radio networks. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC\u201913). IEEE, 614\u2013619."}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674156","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:57:26Z","timestamp":1750291046000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,8]]},"references-count":123,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12,31]]}},"alternative-id":["10.1145\/3674156"],"URL":"https:\/\/doi.org\/10.1145\/3674156","relation":{},"ISSN":["2769-6480"],"issn-type":[{"type":"electronic","value":"2769-6480"}],"subject":[],"published":{"date-parts":[[2024,12,8]]},"assertion":[{"value":"2023-11-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}