{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:16:57Z","timestamp":1761401817600},"reference-count":35,"publisher":"SAGE Publications","issue":"7","license":[{"start":{"date-parts":[[2016,7,1]],"date-time":"2016-07-01T00:00:00Z","timestamp":1467331200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2016,7]]},"abstract":"<jats:p> A sparse wireless sensor network for forest fire detection is considered. It is assumed that two types of malicious nodes can exist in this network. The malicious behaviors are assumed to be concealed through some statistical behavior. A lightweight centralized trust-based model is proposed to detect malicious or misbehaving nodes. We assume that all nodes contribute to this process through the gathering of statistical data related to communication with their neighbors. These data are periodically sent to a base station, where all trust functions are executed. A simulation model is built to evaluate system performance, and the results show that the proposed model is efficient in detecting all types of considered malicious nodes. <\/jats:p>","DOI":"10.1177\/1550147716657246","type":"journal-article","created":{"date-parts":[[2016,7,29]],"date-time":"2016-07-29T02:08:34Z","timestamp":1469758114000},"page":"155014771665724","update-policy":"http:\/\/dx.doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":13,"title":["Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks"],"prefix":"10.1177","volume":"12","author":[{"given":"Nasser-Eddine","family":"Rikli","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, King Saud University, Saudi Arabia"}]},{"given":"Aljawharah","family":"Alnasser","sequence":"additional","affiliation":[{"name":"Department of Information Technology, King Saud University, Saudi Arabia"}]}],"member":"179","published-online":{"date-parts":[[2016,7,28]]},"reference":[{"key":"bibr1-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"bibr2-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6882303"},{"key":"bibr3-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1016\/j.compenvurbsys.2012.03.002"},{"key":"bibr4-1550147716657246","first-page":"232","volume-title":"IEEE joint intelligence and security informatics conference (JISIC)","author":"Patton M"},{"issue":"5","key":"bibr5-1550147716657246","first-page":"51","volume":"14","author":"Yu Z","year":"2014","journal-title":"Cybern Inf Technol"},{"key":"bibr6-1550147716657246","first-page":"040","volume":"8","author":"Dan L","year":"2011","journal-title":"J Northeast For Univ"},{"key":"bibr7-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1007\/s00267-012-9961-z"},{"key":"bibr8-1550147716657246","first-page":"1","volume-title":"American Geophysical Union fall meeting","volume":"1","author":"Spruce J"},{"key":"bibr9-1550147716657246","first-page":"35","volume-title":"1st ACM workshop on IoT privacy, trust, and security","author":"Szalachowski P"},{"key":"bibr10-1550147716657246","first-page":"355","volume-title":"8th international conference on body area networks","author":"Phan DH"},{"key":"bibr11-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.05.007"},{"issue":"3","key":"bibr12-1550147716657246","first-page":"15","volume":"4","author":"Ganeriwal S","year":"2008","journal-title":"ACM Trans Sens Networks"},{"key":"bibr13-1550147716657246","first-page":"496","volume-title":"IEEE international conference on wireless communications, networking and information security (WCNIS)","author":"Liqin T"},{"key":"bibr14-1550147716657246","first-page":"110","volume-title":"Mosharaka international conference on communications, computers and applications (MIC-CCA)","author":"Momani M"},{"key":"bibr15-1550147716657246","volume-title":"Bayesian methods for modelling and management of trust in wireless sensor networks","author":"Momani M.","year":"2008"},{"key":"bibr16-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1007\/11610496_27"},{"key":"bibr17-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.258"},{"key":"bibr18-1550147716657246","first-page":"264","volume-title":"35th IEEE conference on local computer networks (LCN)","author":"Zhang J"},{"key":"bibr19-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.01.023"},{"key":"bibr20-1550147716657246","first-page":"5576","volume-title":"39th annual conference of the IEEE industrial electronics society (IECON)","author":"Duan J"},{"key":"bibr21-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.031912.110179"},{"key":"bibr22-1550147716657246","first-page":"464","volume-title":"2nd international conference on computational intelligence, modelling and simulation (CIMSiM)","author":"Ukil A."},{"key":"bibr23-1550147716657246","first-page":"1","volume-title":"3rd international conference on wireless communications, vehicular technology, information theory and aerospace & electronic systems (VITAE)","author":"Mahalle PN"},{"key":"bibr24-1550147716657246","first-page":"186","volume-title":"11th international conference on information technology: new generations (ITNG)","author":"Meghanathan N"},{"key":"bibr25-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2402120"},{"key":"bibr26-1550147716657246","first-page":"520","volume-title":"4th IEEE conference on industrial electronics and applications (ICIEA)","author":"Zhang J"},{"key":"bibr27-1550147716657246","first-page":"1","volume-title":"21st signal processing and communications applications conference (SIU)","author":"Tunca C"},{"key":"bibr28-1550147716657246","first-page":"351","volume-title":"20th international parallel and distributed processing symposium (IPDPS)","author":"Yu B"},{"key":"bibr29-1550147716657246","first-page":"828","volume-title":"17th international conference on telecommunications (ICT)","author":"Erdene-Ochir O"},{"key":"bibr30-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-014-9879-2"},{"key":"bibr31-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2005.09.007"},{"key":"bibr32-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-009-9215-4"},{"key":"bibr33-1550147716657246","first-page":"10359","volume-title":"1st workshop on security and privacy for internet of things and cyber-physical systems (ICC)","author":"Alnasser A"},{"key":"bibr34-1550147716657246","first-page":"105","volume-title":"10th ACM symposium on QoS and security for wireless and mobile networks","author":"Alnasser A"},{"key":"bibr35-1550147716657246","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03748-1_11"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147716657246","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147716657246","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147716657246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T20:06:47Z","timestamp":1616616407000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147716657246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7]]},"references-count":35,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016,7,1]]}},"alternative-id":["10.1177\/1550147716657246"],"URL":"https:\/\/doi.org\/10.1177\/1550147716657246","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7]]}}}