{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T17:49:40Z","timestamp":1774288180858,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T00:00:00Z","timestamp":1528848000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1186\/s13638-018-1174-6","type":"journal-article","created":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T09:46:20Z","timestamp":1528883180000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks"],"prefix":"10.1186","volume":"2018","author":[{"given":"Yongmei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Min","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wanneng","family":"Shu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,13]]},"reference":[{"issue":"2","key":"1174_CR1","first-page":"1","volume":"10","author":"MR Eslaminejad","year":"2011","unstructured":"MR Eslaminejad, M Sookhak, SA Razak, M Haghparast, A review of routing mechanisms in wireless sensor networks. Int. J Comput. Sci. Telecommun. 10(2), 1\u20139 (2011)","journal-title":"Int. J Comput. Sci. Telecommun."},{"issue":"10","key":"1174_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4303\/ijsndc\/235548","volume":"1","author":"A Kellner","year":"2012","unstructured":"A Kellner, O Alfandi, DA Hogrefe, Survey on measures for secure routing in wireless sensor networks. Int. J. Sens. Netw. Data Commun 1(10), 1\u201317 (2012)","journal-title":"Int. J. Sens. Netw. Data Commun"},{"issue":"84","key":"1174_CR3","first-page":"159","volume":"1","author":"A Chakrabarti","year":"2012","unstructured":"A Chakrabarti, V Parekh, A Ruia, A trust based routing scheme for wireless sensor networks. Lect Notes Inst Comput Sci Soc Inf Telecommun Eng 1(84), 159\u2013168 (2012)","journal-title":"Lect Notes Inst Comput Sci Soc Inf Telecommun Eng"},{"issue":"1","key":"1174_CR4","first-page":"1","volume":"2014","author":"J Duan","year":"2014","unstructured":"J Duan, D Yang, H Zhu, et al., TSRF: a trust-aware secure routing framework in wireless sensor networks. Int. J. Distrib. Sens Netw. 2014(1), 1\u201314 (2014)","journal-title":"Int. J. Distrib. Sens Netw."},{"issue":"2","key":"1174_CR5","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1002\/ett.2674","volume":"26","author":"F Ishmanov","year":"2015","unstructured":"F Ishmanov, AS Malik, SW Kim, et al., Trust management system in wireless sensor networks: design considerations and research challenges. Trans. EmergiTelecommun. Technol. 26(2), 107\u2013130 (2015)","journal-title":"Trans. EmergiTelecommun. Technol."},{"issue":"22","key":"1174_CR6","doi-asserted-by":"publisher","first-page":"14203","DOI":"10.1007\/s11042-016-3363-9","volume":"75","author":"F Lin","year":"2016","unstructured":"F Lin, JB Xiahou, ZX Xu, TCM clinic records data mining approaches based on weighted-LDA and multi-relationship LDA model. Multimed. Tools. Appl. 75(22), 14203\u201314232 (2016)","journal-title":"Multimed. Tools. Appl."},{"issue":"5","key":"1174_CR7","doi-asserted-by":"publisher","first-page":"4794","DOI":"10.3390\/s110504794","volume":"11","author":"W Wei","year":"2011","unstructured":"W Wei, Q Yong, Information potential fields navigation in wireless ad-hoc sensor networks. Sensors 11(5), 4794\u20134807 (2011)","journal-title":"Sensors"},{"issue":"2","key":"1174_CR8","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1049\/iet-ifs.2010.0160","volume":"6","author":"N Marchangl","year":"2012","unstructured":"N Marchangl, R Datta, Light-weight trust-based routing protocol for mobile ad hoc networks. IET Inf. Secur.. 6(2), 77\u201383 (2012)","journal-title":"IET Inf. Secur.."},{"issue":"5","key":"1174_CR9","doi-asserted-by":"publisher","first-page":"958","DOI":"10.1109\/TPDS.2010.185","volume":"23","author":"A Rasheed","year":"2012","unstructured":"A Rasheed, RN Mahapatra, The three-tier security scheme in wireless sensor networks with mobile sinks. IEEE. Trans. Parallel. Distrib. Syst. 23(5), 958\u2013965 (2012)","journal-title":"IEEE. Trans. Parallel. Distrib. Syst."},{"issue":"2","key":"1174_CR10","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1016\/j.comcom.2005.05.018","volume":"29","author":"J Deng","year":"2006","unstructured":"J Deng, R Han, S Mishra, INSENS: intrusion-tolerant routing for wireless sensor networks. Comput. Commun.. 29(2), 216\u2013230 (2006)","journal-title":"Comput. Commun.."},{"issue":"5","key":"1174_CR11","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1023\/A:1016598314198","volume":"8","author":"A Perrig","year":"2002","unstructured":"A Perrig, R Szewczyk, JD Tygar, et al., SPINS: security protocols for sensor networks. Wirel. Netw 8(5), 521\u2013534 (2002)","journal-title":"Wirel. Netw"},{"issue":"3","key":"1174_CR12","first-page":"183","volume":"8","author":"MS Syed","year":"2015","unstructured":"MS Syed, HB Safdar, et al., Neighbor node trust based intrusion detection system for WSN. Procedia. Comput. Sci. 8(3), 183 (2015)","journal-title":"Procedia. Comput. Sci."},{"issue":"2","key":"1174_CR13","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1007\/s11276-009-0182-1","volume":"16","author":"H Safa","year":"2010","unstructured":"H Safa, H Artail, D Tabet, A cluster-based trust-aware routing protocol for mobile ad hoc networks. Wirel. Netw. 16(2), 969\u2013984 (2010)","journal-title":"Wirel. Netw."},{"issue":"6","key":"1174_CR14","first-page":"101","volume":"23","author":"L Lintao","year":"2010","unstructured":"L Lintao, H Lei, Z Na, Hierarchical routing trust model for wireless sensor networks. Comput. Eng. 23(6), 101\u2013103 (2010)","journal-title":"Comput. Eng."},{"issue":"3","key":"1174_CR15","first-page":"66","volume":"4","author":"S Ganeriwal","year":"2004","unstructured":"S Ganeriwal, LK Balzano, MB Srivastava, Reputation-based framework for high integrity sensor networks. ACM. Trans. Sens. Netw. 4(3), 66\u201377 (2004)","journal-title":"ACM. Trans. Sens. Netw."},{"issue":"11","key":"1174_CR16","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"RA Shaikh","year":"2009","unstructured":"RA Shaikh, H Jameel, BJ D'Auriol, et al., Group-based trust management scheme for clustered wireless sensor networks. IEEE. Trans. Parallel. Distrib. Syst. 20(11), 1698\u20131712 (2009)","journal-title":"IEEE. Trans. Parallel. Distrib. Syst."},{"issue":"2","key":"1174_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/401465","volume":"2015","author":"R Feng","year":"2015","unstructured":"R Feng, X Han, Q Liu, et al., A credible Bayesian-based trust management scheme for wireless sensor networks. Int. J. Distrib. Sens. Netw. 2015(2), 1\u20139 (2015)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"5","key":"1174_CR18","doi-asserted-by":"publisher","first-page":"1228","DOI":"10.1109\/TPDS.2014.2320505","volume":"26","author":"J Jiang","year":"2015","unstructured":"J Jiang, G Han, F Wang, et al., An efficient distributed trust model for wireless sensor networks. IEEE. Trans. Parallel. Distrib. Syst. 26(5), 1228\u20131237 (2015)","journal-title":"IEEE. Trans. Parallel. Distrib. Syst."},{"issue":"17","key":"1174_CR19","first-page":"1","volume":"9","author":"J Hossein","year":"2015","unstructured":"J Hossein, RA Mohammad, et al., A fuzzy fully distributed trust management system in wireless sensor networks. Int. J. Electron. Commun.. 9(17), 1\u201310 (2015)","journal-title":"Int. J. Electron. Commun.."},{"key":"1174_CR20","first-page":"879","volume-title":"Proc. of IEEE 7th International Conference on Information Technology, IEEE Press","author":"Y Reddy","year":"2010","unstructured":"Y Reddy, J Durand, S Kafle, in Proc. of IEEE 7th International Conference on Information Technology, IEEE Press. Detection of packet dropping in wireless sensor networks (2010), pp. 879\u2013884"},{"issue":"11","key":"1174_CR21","first-page":"2636","volume":"31","author":"HU Xiangdong","year":"2010","unstructured":"HU Xiangdong, W Qinfang, T Hui, Model and simulation of creditability-based data aggregation for the internet of things. Chin. J. Sci. Instrum. 31(11), 2636\u20132640 (2010)","journal-title":"Chin. J. Sci. Instrum."},{"issue":"12","key":"1174_CR22","first-page":"1","volume":"16","author":"AR Dhakne","year":"2016","unstructured":"AR Dhakne, PN Chatur, TCNPR: trust calculation based on nodes properties and recommendations for intrusion detection in wireless sensor network. Int. J. Comput. Sci. Netw. Secur. 16(12), 1\u201310 (2016)","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"1174_CR23","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/EUC.2010.80","volume-title":"Proc. of 2010 IEEE\/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, China","author":"J Zhang","year":"2010","unstructured":"J Zhang, R S Hankaran, MA Orgun, et al., in Proc. of 2010 IEEE\/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, China. A dynamic trust establishment and management framework for wireless sensor networks (2010), pp. 484\u2013491"},{"issue":"1","key":"1174_CR24","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.jnca.2010.09.007","volume":"34","author":"M Mejia","year":"2011","unstructured":"M Mejia, N Pe\u00f1a, JL Mu\u00f1oz, et al., A game theoretic trust model for online distributed evolution of cooperation in MANETs. J. Netw. Comput. Appl.. 34(1), 39\u201351 (2011)","journal-title":"J. Netw. Comput. Appl.."},{"issue":"2","key":"1174_CR25","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"F Bao, IR Chen, MJ Chang, et al., Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag.. 9(2), 169\u2013183 (2012)","journal-title":"IEEE Trans. Netw. Serv. Manag.."},{"issue":"3","key":"1174_CR26","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.comcom.2010.01.023","volume":"34","author":"MK Denko","year":"2011","unstructured":"MK Denko, T Sun, I Woungang, Trust management in ubiquitous computing: a Bayesian approach. Comput. Commun. 34(3), 398\u2013406 (2011)","journal-title":"Comput. Commun."},{"key":"1174_CR27","first-page":"1","volume-title":"An Emergent Ontology for Ambient Intelligence Based on an Ant Colony Optimization Algorithm, Computing Conference (CLEI), September 15\u201319, 2014","author":"M Mendonca","year":"2014","unstructured":"M Mendonca, JS Aguilar, N Perozo, An Emergent Ontology for Ambient Intelligence Based on an Ant Colony Optimization Algorithm, Computing Conference (CLEI), September 15\u201319, 2014 (IEEE Press, Montevideo, 2014), pp. 1\u201311"},{"issue":"2","key":"1174_CR28","doi-asserted-by":"publisher","first-page":"248","DOI":"10.15837\/ijccc.2016.2.2144","volume":"11","author":"F Lin","year":"2016","unstructured":"F Lin, XZ Zhou, WH Zeng, Sparse online learning for collaborative filtering. Int. J. Comput. Commun. Control. 11(2), 248\u2013258 (2016)","journal-title":"Int. J. Comput. Commun. Control."},{"key":"1174_CR29","doi-asserted-by":"crossref","unstructured":"N Iltaf, A Ghafoor, U Zia, A mechanism for detecting dishonest recommendation in indirect trust computation. EURASIP J. Wirel. Commun. Netw. 2013(1), 1\u201313 (2013)","DOI":"10.1186\/1687-1499-2013-189"},{"issue":"2","key":"1174_CR30","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/JCN.2013.000029","volume":"15","author":"M Majdi","year":"2013","unstructured":"M Majdi, K Lyes, N Hazem, Secure and robust clustering for quantized target tracking in wireless sensor networks. J. Commun. Netw. 15(2), 164\u2013172 (2013)","journal-title":"J. Commun. Netw."},{"issue":"3","key":"1174_CR31","first-page":"27","volume":"6","author":"P Padh","year":"2010","unstructured":"P Padh, RK Dash, K Martinez, A utility-based adaptive sensing and multihop communication protocol for wireless sensor networks. ACM. Trans. Sens. Netw 6(3), 27\u201339 (2010)","journal-title":"ACM. Trans. Sens. Netw"}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1174-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-018-1174-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-018-1174-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,19]],"date-time":"2019-10-19T07:25:59Z","timestamp":1571469959000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-018-1174-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,13]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["1174"],"URL":"https:\/\/doi.org\/10.1186\/s13638-018-1174-6","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,13]]},"assertion":[{"value":"17 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"Yongmei Wangreceived a M.S. degree from Anhui University, in 2011. She is an experimentalist in School of Computer Science and Technology, Hefei Normal University, Hefei, China. His research interests lie in computer application, intelligent arithmetic, and Internet of things.Min Zhangreceived a M.S. degree from Anhui University, in 2011. She is an experimentalist in College of Information and Computer, Anhui Agricultural University, Hefei, China. His research interests lie in network of computer and Internet of things.Wanneng Shureceived a M.S. and Ph.D. degree from Central China Normal University and Wuhan University, in 2007 and 2013. He is an assistant professor in the College of Computer Science, South-Central University for Nationalities, Wuhan 430074, China. His research interests lie in Green cloud computing, parallel computing, and Internet of things.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Authors\u2019 information"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Publisher\u2019s Note"}}],"article-number":"145"}}