{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:59Z","timestamp":1740149039212,"version":"3.37.3"},"reference-count":25,"publisher":"Wiley","license":[{"start":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T00:00:00Z","timestamp":1567468800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010814","name":"Anhui Department of Education","doi-asserted-by":"publisher","award":["KJ2019A0704","61802332"],"award-info":[{"award-number":["KJ2019A0704","61802332"]}],"id":[{"id":"10.13039\/501100010814","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["KJ2019A0704","61802332"],"award-info":[{"award-number":["KJ2019A0704","61802332"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2019,9,3]]},"abstract":"<jats:p>With the rapid development of sensor technology and wireless network technology, wireless sensor network (WSN) has been widely applied in many resource-constrained environments and application scenarios. As there are a large number of sensor nodes in WSN, node failures are inevitable and have a significant impact on task execution. In this paper, considering the vulnerability, unreliability, and dynamic characteristics of sensor nodes, node failures are classified into two categories including unrecoverable failures and recoverable failures. Then, the traditional description of the interaction results is extended to the trinomial distribution. According to the Bayesian cognitive model, the global trust degree is aggregated by both direct and indirect interaction records, and a novel trust model based on node recovery technique for WSNs is proposed to reduce the probability of failure for task execution. Simulation results show that compared with existing trust models, our proposed TMBNRT (trust model based on node recovery technique) algorithm can effectively meet the security and the reliability requirements of WSN.<\/jats:p>","DOI":"10.1155\/2019\/2545129","type":"journal-article","created":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T19:30:30Z","timestamp":1567539030000},"page":"1-12","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Trust Model Based on Node Recovery Technique for WSN"],"prefix":"10.1155","volume":"2019","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6049-9729","authenticated-orcid":true,"given":"Ping","family":"Qi","sequence":"first","affiliation":[{"name":"Department of Mathematics and Computer Science, Tongling University, Tongling 244061, China"},{"name":"The Institute of Server Computing, Tongling University, Tongling 244061, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9186-3781","authenticated-orcid":true,"given":"Fucheng","family":"Wang","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Tongling University, Tongling 244061, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5990-6523","authenticated-orcid":true,"given":"Shu","family":"Hong","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science, Tongling University, Tongling 244061, China"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2012.01.002"},{"issue":"2","key":"2","first-page":"562","volume":"2","year":"2010","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"1","key":"4","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1155\/2014\/209436","volume":"10","year":"2014","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.08.048"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/sec.969"},{"issue":"8","key":"10","first-page":"530","volume":"5","year":"2015","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"issue":"5","key":"11","first-page":"444","volume":"2014","year":"2014","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/cc.2018.8331989"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/649392","volume":"2014","year":"2014","journal-title":"Journal of Sensors"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3666-1"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2009.11.025"},{"issue":"11","key":"16","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1155\/2015\/678926","volume":"11","year":"2015","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1080\/1206212x.2017.1396430"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-009-0216-8"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2905550"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1362542.1362546"},{"issue":"3","key":"22","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1002\/sec.350","volume":"5","year":"2012","journal-title":"Security & Communication Networks"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0050-8"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-015-1141-7"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/tvt.2012.2212734"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/jsen.2013.2255591"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-statistics-060116-054045"},{"issue":"2","key":"29","first-page":"53","volume":"9","year":"2013","journal-title":"International Journal of Engineering Research and Development"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1017"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.11.010"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/2545129.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/2545129.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2019\/2545129.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T23:39:14Z","timestamp":1569109154000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2019\/2545129\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,3]]},"references-count":25,"alternative-id":["2545129","2545129"],"URL":"https:\/\/doi.org\/10.1155\/2019\/2545129","relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2019,9,3]]}}}