{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:37:38Z","timestamp":1775421458023,"version":"3.50.1"},"reference-count":0,"publisher":"National Library of Serbia","issue":"4","license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ComSIS","COMPUT SCI INF SYST","COMPUT SCI INFORM SY","COMPUTER SCI INFORM","COMSIS J"],"published-print":{"date-parts":[[2011]]},"abstract":"<jats:p>Since a large scale Wireless Sensor Network (WSN) is to be completely\n   integrated into Internet as a core part of Internet of Things (IoT) or Cyber\n   Physical System (CPS), it is necessary to consider various security\n   challenges that come with IoT\/CPS, such as the detection of malicious\n   attacks. Sensors or sensor embedded things may establish direct communication\n   between each other using 6LoWPAN protocol. A trust and reputation model is\n   recognized as an important approach to defend a large distributed sensor\n   networks in IoT\/CPS against malicious node attacks, since trust establishment\n   mechanisms can stimulate collaboration among distributed computing and\n   communication entities, facilitate the detection of untrustworthy entities,\n   and assist decision-making process of various protocols. In this paper, based\n   on in-depth understanding of trust establishment process and quantitative\n   comparison among trust establishment methods, we present a trust and\n   reputation model TRM-IoT to enforce the cooperation between things in a\n   network of IoT\/CPS based on their behaviors. The accuracy, robustness and\n   lightness of the proposed model is validated through a wide set of\n   simulations.<\/jats:p>","DOI":"10.2298\/csis110303056c","type":"journal-article","created":{"date-parts":[[2011,10,13]],"date-time":"2011-10-13T06:59:22Z","timestamp":1318489162000},"page":"1207-1228","source":"Crossref","is-referenced-by-count":280,"title":["TRM-IoT: A trust management model based on fuzzy reputation for internet of things"],"prefix":"10.2298","volume":"8","author":[{"given":"Dong","family":"Chen","sequence":"first","affiliation":[{"name":"College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"given":"Guiran","family":"Chang","sequence":"additional","affiliation":[{"name":"Computing Center, Northeastern University, Shenyang, China"}]},{"given":"Dawei","family":"Sun","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"given":"Jiajia","family":"Li","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"given":"Jie","family":"Jia","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Northeastern University, Shenyang, China"}]},{"given":"Xingwei","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Information Science and Engineering, Northeastern University, Shenyang, China"}]}],"member":"1078","container-title":["Computer Science and Information Systems"],"original-title":[],"language":"en","deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T08:30:27Z","timestamp":1685349027000},"score":1,"resource":{"primary":{"URL":"https:\/\/doiserbia.nb.rs\/Article.aspx?ID=1820-02141100056C"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"references-count":0,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011]]}},"URL":"https:\/\/doi.org\/10.2298\/csis110303056c","relation":{},"ISSN":["1820-0214","2406-1018"],"issn-type":[{"value":"1820-0214","type":"print"},{"value":"2406-1018","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}