{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:25:14Z","timestamp":1759134314847,"version":"3.41.2"},"reference-count":25,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T00:00:00Z","timestamp":1527724800000},"content-version":"vor","delay-in-days":150,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61702403","61472298","61662009","61472310"],"award-info":[{"award-number":["61702403","61472298","61662009","61472310"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2018M633473"],"award-info":[{"award-number":["2018M633473"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Wireless Communications and Mobile Computing"],"published-print":{"date-parts":[[2018,1]]},"abstract":"<jats:p>P2P network is one of the most extensive network frameworks for wireless sensor network (WSN) in Internet of Things (IoT). The peers in WSN are rational and often free ride to save power of electricity and calculation, due to the fact that the usability is of great variability and unpredictability. Such a phenomenon tremendously reduces the quality of service (QoS) in WSN. Rational exchange protocol aims at promoting QoS and guaranteeing security and fairness. However, existing schemes have taken only complete information into account, which is not up to realistic environment. The peers in realistic environment indeed possess incomplete information, which is, however, still not thoroughly investigated so far. In this paper, under asymmetric information (a typical incomplete information), an entropy based incentive model is well designed based on Markov model and QoS evaluation model to help peers cooperate in WSNs. A concrete utility function with entropy is constructed to evaluate decision utility in P2P network. Finally, an entropy based rational exchange protocol is proposed based on the presented incentive model and concrete utility function, with analysis of correctness, security, fairness, and robustness, respectively. The proposed protocol can facilitate rational peers positively and sensibly participating in services and prevent free riding for rational peers. Hence, it further promotes QoS and guarantees security and fairness simultaneously in WSNs.<\/jats:p>","DOI":"10.1155\/2018\/9437936","type":"journal-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T23:39:24Z","timestamp":1527809964000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Rational Exchange Protocol under Asymmetric Information in Wireless Sensor Networks"],"prefix":"10.1155","volume":"2018","author":[{"given":"Zhen","family":"Lv","sequence":"first","affiliation":[]},{"given":"Changgen","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3210-0714","authenticated-orcid":false,"given":"Yanguo","family":"Peng","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1213-6031","authenticated-orcid":false,"given":"Junwei","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2018,5,31]]},"reference":[{"key":"e_1_2_11_1_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.11.002"},{"key":"e_1_2_11_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.33"},{"key":"e_1_2_11_3_2","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2198"},{"key":"e_1_2_11_4_2","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2193"},{"key":"e_1_2_11_5_2","doi-asserted-by":"crossref","unstructured":"HalpernJ.andTeagueV. Rational secret sharing and multiparty computation: extended abstract Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC 04) 2004 New York NY USA 623\u2013632 https:\/\/doi.org\/10.1145\/1007352.1007447 MR2121651.","DOI":"10.1145\/1007352.1007447"},{"key":"e_1_2_11_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11799-2_25"},{"key":"e_1_2_11_7_2","doi-asserted-by":"crossref","unstructured":"GarayJ. KatzJ. MaurerU. TackmannB. andZikasV. Rational protocol design: Cryptography against incentive-driven adversaries Annual Symposium on Foundations of Computer SCIence---FOCS 2013 648\u2013657 https:\/\/doi.org\/10.1109\/FOCS.2013.75 MR3246268.","DOI":"10.1109\/FOCS.2013.75"},{"key":"e_1_2_11_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2816656"},{"key":"e_1_2_11_9_2","doi-asserted-by":"crossref","unstructured":"SyversonP. Weakly secret bit commitment: applications to lotteries and fair exchange Proceedings of the 11th IEEE Computer Security Foundations Workshop Rockport MA USA 2\u201313 https:\/\/doi.org\/10.1109\/CSFW.1998.683149.","DOI":"10.1109\/CSFW.1998.683149"},{"key":"e_1_2_11_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45598-1_12"},{"key":"e_1_2_11_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/11766155_28"},{"key":"e_1_2_11_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87700-4_97"},{"key":"e_1_2_11_13_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2004-123-408"},{"key":"e_1_2_11_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76888-3_21"},{"key":"e_1_2_11_15_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2012.05.021"},{"key":"e_1_2_11_16_2","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1989.0125"},{"key":"e_1_2_11_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.006"},{"key":"e_1_2_11_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.006"},{"key":"e_1_2_11_19_2","unstructured":"AlwenJ. CachinC. NielsenJ. B. PereiraO. SadeghiA.-R. SchomakersB. ShelatA. andViscontiI. Summary report on rational cryptographic protocols University of Aarhus 2007."},{"key":"e_1_2_11_20_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-011-4382-9"},{"key":"e_1_2_11_21_2","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2011.3601"},{"key":"e_1_2_11_22_2","unstructured":"AsokanN. Fairness in electronic commerce [Ph.D. thesis] 1998 University of Waterloo."},{"key":"e_1_2_11_23_2","first-page":"151","article-title":"Cryptanalysis of syversons rational exchange protocol","volume":"7","author":"Alcaide A.","year":"2008","journal-title":"International Journal of Network Security"},{"key":"e_1_2_11_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_15"},{"key":"e_1_2_11_25_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_7"}],"container-title":["Wireless Communications and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/9437936.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/wcmc\/2018\/9437936.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1155\/2018\/9437936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T07:01:55Z","timestamp":1723014115000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1155\/2018\/9437936"}},"subtitle":[],"editor":[{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,1]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,1]]}},"alternative-id":["10.1155\/2018\/9437936"],"URL":"https:\/\/doi.org\/10.1155\/2018\/9437936","archive":["Portico"],"relation":{},"ISSN":["1530-8669","1530-8677"],"issn-type":[{"type":"print","value":"1530-8669"},{"type":"electronic","value":"1530-8677"}],"subject":[],"published":{"date-parts":[[2018,1]]},"assertion":[{"value":"2018-03-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-04-30","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-05-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"9437936"}}