{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:13:36Z","timestamp":1773155616345,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T00:00:00Z","timestamp":1565049600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T00:00:00Z","timestamp":1565049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Wireless Com Network"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1186\/s13638-019-1524-z","type":"journal-article","created":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T22:02:12Z","timestamp":1565128932000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Trust evaluation model with entropy-based weight assignment for malicious node\u2019s detection in wireless sensor networks"],"prefix":"10.1186","volume":"2019","author":[{"given":"Xueqiang","family":"Yin","sequence":"first","affiliation":[]},{"given":"Shining","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,6]]},"reference":[{"issue":"3","key":"1524_CR1","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1016\/j.jcss.2013.06.014","volume":"80","author":"G Han","year":"2014","unstructured":"G. Han, J. Jiang, L. Shu, J. Niu, J. Comput. Syst. Sci. 80(3), 602\u2013617 (2014)","journal-title":"J. Comput. Syst. Sci."},{"issue":"1","key":"1524_CR2","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1007\/s12083-015-0421-4","volume":"10","author":"A Ahmed","year":"2017","unstructured":"A. Ahmed, K.A. Bakar, M.I. Channa, A.W. Khan, K. Haseeb, Peer-Peer Netw. Appl. 10(1), 216\u2013237 (2017)","journal-title":"Peer-Peer Netw. Appl."},{"issue":"10","key":"1524_CR3","doi-asserted-by":"publisher","first-page":"1936","DOI":"10.1111\/risa.12757","volume":"37","author":"B Wu","year":"2017","unstructured":"B. Wu, X. Yan, Y. Wang, C. Guedes Soares, Risk Anal. 37(10), 1936\u20131957 (2017)","journal-title":"Risk Anal."},{"issue":"1","key":"1524_CR4","doi-asserted-by":"publisher","first-page":"2591","DOI":"10.1016\/j.comnet.2010.04.010","volume":"54","author":"MA Simpl\u00edcio","year":"2010","unstructured":"M.A. Simpl\u00edcio, P. Barreto, C.B. Margi, Comput. Netw. 54(1), 2591\u20132612 (2010)","journal-title":"Comput. Netw."},{"issue":"7","key":"1524_CR5","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1109\/JSAC.2009.090505","volume":"24","author":"YM Huang","year":"2009","unstructured":"Y.M. Huang, M.Y. Hsieh, H.C. Chao, IEEE J. Sel. Areas Commun. 24(7), 400\u2013411 (2009)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"1","key":"1524_CR6","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/JIOT.2014.2314132","volume":"1","author":"J Duan","year":"2014","unstructured":"J. Duan, D. Gao, D. Yang, C.H. Foh, IEEE Internet Things J. 1(1), 58\u201369 (2014)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"1524_CR7","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.comcom.2010.01.023","volume":"34","author":"MK Denko","year":"2011","unstructured":"M.K. Denko, T. Sun, I. Woungang, Comput. Commun. 34(3), 398\u2013406 (2011)","journal-title":"Comput. Commun."},{"key":"1524_CR8","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1007\/s11227-017-2150-3","volume":"74","author":"W Zhang","year":"2018","unstructured":"W. Zhang, S. Zhu, J. Tang, J. Supercomput. 74, 1779\u20131801 (2018)","journal-title":"J. Supercomput."},{"key":"1524_CR9","doi-asserted-by":"publisher","first-page":"590","DOI":"10.1016\/j.oceaneng.2018.06.054","volume":"164","author":"B Wu","year":"2018","unstructured":"B. Wu, L. Zong, X. Yan, C. Guedes Soares, Ocean Eng. 164, 590\u2013603 (2018)","journal-title":"Ocean Eng."},{"issue":"4","key":"1524_CR10","doi-asserted-by":"publisher","first-page":"2590","DOI":"10.1109\/JSYST.2016.2544805","volume":"11","author":"D He","year":"2016","unstructured":"D. He, S. Zeadally, N. Kumar, J.H. Lee, IEEE Syst. J. 11(4), 2590\u20132601 (2016)","journal-title":"IEEE Syst. J."},{"key":"1524_CR11","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/1029102.1029115","volume-title":"Proceedings of the 2nd ACM Workshop on Security of Ad-Hoc and Sensor Networks Washington DC","author":"S Ganeriwal","year":"2004","unstructured":"S. Ganeriwal, M. Srivastava, Proceedings of the 2nd ACM Workshop on Security of Ad-Hoc and Sensor Networks Washington DC (2004), pp. 66\u201377"},{"key":"1524_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICPADS.2007.4447736","volume-title":"Proceedings of 2007 International Conference on Parallel and Distributed Systems","author":"MJ Probst","year":"2007","unstructured":"M.J. Probst, S.K. Kasera, Proceedings of 2007 International Conference on Parallel and Distributed Systems (2007), pp. 1\u20138"},{"issue":"6","key":"1524_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2013\/948641","volume":"9","author":"R Feng","year":"2013","unstructured":"R. Feng, S. Che, X. Wang, Int. J. Distrib. Sens. Netw. 9(6), 1\u20139 (2013)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"1524_CR14","doi-asserted-by":"crossref","unstructured":"X. Anita, M.A. Bhagyaveni, J. Manickam, Sci. World J. 8(1), 341\u2013356 (2014)","DOI":"10.1155\/2014\/480202"},{"issue":"5","key":"1524_CR15","doi-asserted-by":"publisher","first-page":"1493","DOI":"10.1007\/s11276-009-0216-8","volume":"16","author":"E Aivaloglou","year":"2010","unstructured":"E. Aivaloglou, S. Gritzalis, Wirel. Netw 16(5), 1493\u20131510 (2010)","journal-title":"Wirel. Netw"},{"issue":"9","key":"1524_CR16","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1007\/s00500-014-1377-7","volume":"18","author":"G Wu","year":"2014","unstructured":"G. Wu, Z. Du, Y. Hu, et al., Soft. Comput. 18(9), 1829\u20131840 (2014)","journal-title":"Soft. Comput."},{"issue":"5","key":"1524_CR17","first-page":"1228","volume":"26","author":"J Jiang","year":"2014","unstructured":"J. Jiang, G. Han, F. Wang, L. Shu, IEEE Trans. IEEE 26(5), 1228\u20131237 (2014)","journal-title":"IEEE Trans. IEEE"},{"issue":"2","key":"1524_CR18","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"F. Bao, I.R. Chen, M.J. Chang, et al., IEEE Trans. Netw. Serv. Manag. 9(2), 169\u2013183 (2012)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"1524_CR19","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.ssci.2017.03.015","volume":"96","author":"T Zhou","year":"2017","unstructured":"T. Zhou, C. Wu, J. Zhang, D. Zhang, Saf. Sci. 96, 183\u2013191 (2017)","journal-title":"Saf. Sci."},{"issue":"3","key":"1524_CR20","doi-asserted-by":"publisher","first-page":"751","DOI":"10.3390\/s18030751","volume":"18","author":"J Tang","year":"2018","unstructured":"J. Tang, A. Liu, J. Zhang, Sensors 18(3), 751 (2018)","journal-title":"Sensors"},{"key":"1524_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJSNET.2015.10001343","volume":"1","author":"H Liao","year":"2015","unstructured":"H. Liao, S. Ding, Int. J. Distrib. Sensor Netw. 1, 1\u201313 (2015)","journal-title":"Int. J. Distrib. Sensor Netw."},{"issue":"11","key":"1524_CR22","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"RA Shaikh","year":"2008","unstructured":"R.A. Shaikh, H. Jameel, B.J. D\u2019Auriol, et al., IEEE Trans. Parallel Distrib. Syst. 20(11), 1698\u20131712 (2008)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"9","key":"1524_CR23","first-page":"907","volume":"68","author":"JM Zhou","year":"2014","unstructured":"J.M. Zhou, F. Liu, Q.Y. Lu, J. Sensors 68(9), 907\u2013913 (2014)","journal-title":"J. Sensors"},{"key":"1524_CR24","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/DSSNS.2006.1","volume-title":"Proceedings of Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems","author":"GV Crosby","year":"2006","unstructured":"G.V. Crosby, N. Pissinou, J. Gadze, Proceedings of Second IEEE Workshop on Dependability and Security in Sensor Networks and Systems (IEEE, Columbia, 2006), pp. 13\u201322"},{"issue":"1","key":"1524_CR25","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.3390\/s150102021","volume":"15","author":"JS Fu","year":"2015","unstructured":"J.S. Fu, Y. Liu, Sensors 15(1), 2021\u20132040 (2015)","journal-title":"Sensors"},{"issue":"12","key":"1524_CR26","doi-asserted-by":"publisher","first-page":"2413","DOI":"10.1016\/j.comcom.2007.04.022","volume":"30","author":"A Boukerch","year":"2007","unstructured":"A. Boukerch, L. Xu, K. El-Khatib, Comput. Commun. 30(12), 2413\u20132427 (2007)","journal-title":"Comput. Commun."},{"issue":"1","key":"1524_CR27","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10916-010-9449-4","volume":"36","author":"M Al Ameen","year":"2012","unstructured":"M. Al Ameen, J. Liu, K. Kwak, J. Med. Syst. 36(1), 93\u2013101 (2012)","journal-title":"J. Med. Syst."},{"key":"1524_CR28","first-page":"64","volume-title":"Proc. of IEEE CIVEMSA","author":"H Marzi","year":"2014","unstructured":"H. Marzi, A. Marzi, Proc. of IEEE CIVEMSA (2014), pp. 64\u201369"},{"issue":"2","key":"1524_CR29","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1115\/1.2919393","volume":"116","author":"BK Kannan","year":"1994","unstructured":"B.K. Kannan, S.N. Kramer, J. Mech. Des. 116(2), 405\u2013411 (1994)","journal-title":"J. Mech. Des."},{"issue":"5","key":"1524_CR30","doi-asserted-by":"publisher","first-page":"2184","DOI":"10.1109\/JSEN.2018.2790422","volume":"18","author":"H Oh","year":"2018","unstructured":"H. Oh, C.T. Ngo, IEEE Sensors J. 18(5), 2184\u20132194 (2018)","journal-title":"IEEE Sensors J."},{"key":"1524_CR31","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/j.ijdrr.2018.10.019","volume":"33","author":"Y Wang","year":"2019","unstructured":"Y. Wang, E. Zio, X. Wei, D. Zhang, B. Wu, Int. J. Disaster Risk Reduct. 33, 343\u2013354 (2019)","journal-title":"Int. J. Disaster Risk Reduct."},{"key":"1524_CR32","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1016\/j.tre.2019.03.011","volume":"125","author":"C Wan","year":"2019","unstructured":"C. Wan, X. Yan, D. Zhang, Z. Qu, Z. Yang, Transport. Res. E-Log 125, 222\u2013240 (2019)","journal-title":"Transport. Res. E-Log"},{"key":"1524_CR33","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.ssci.2018.07.002","volume":"111","author":"MY Zhang","year":"2018","unstructured":"M.Y. Zhang, D. Zhang, F. Goerlandt, X. Yan, P. Kujala, Saf. Sci. 111, 128\u2013143 (2018)","journal-title":"Saf. Sci."},{"key":"1524_CR34","first-page":"836","volume-title":"Proceedings of the International Symposium on Simulation of Systems Security","author":"IM Atakli","year":"2008","unstructured":"I.M. Atakli, H. Hu, Y. Chen, et al., Proceedings of the International Symposium on Simulation of Systems Security (2008), pp. 836\u2013843"},{"key":"1524_CR35","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2015.06.013","volume":"59","author":"W Fang","year":"2016","unstructured":"W. Fang, C. Zhang, Z. Shi, J. Netw. Comput. Appl. 59, 88\u201394 (2016)","journal-title":"J. Netw. Comput. Appl."}],"container-title":["EURASIP Journal on Wireless Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1524-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s13638-019-1524-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s13638-019-1524-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,16]],"date-time":"2021-01-16T05:02:11Z","timestamp":1610773331000},"score":1,"resource":{"primary":{"URL":"https:\/\/jwcn-eurasipjournals.springeropen.com\/articles\/10.1186\/s13638-019-1524-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,6]]},"references-count":35,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["1524"],"URL":"https:\/\/doi.org\/10.1186\/s13638-019-1524-z","relation":{},"ISSN":["1687-1499"],"issn-type":[{"value":"1687-1499","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,8,6]]},"assertion":[{"value":"29 March 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 July 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no competing interests.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"198"}}