{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:17Z","timestamp":1773655877050,"version":"3.50.1"},"reference-count":5,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.3103\/s0146411618080205","type":"journal-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T10:50:13Z","timestamp":1551955813000},"page":"1042-1048","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Security Provision in Wireless Sensor Networks on the Basis of the Trust Model"],"prefix":"10.3103","volume":"52","author":[{"given":"T. D.","family":"Ovasapyan","sequence":"first","affiliation":[]},{"given":"D. V.","family":"Ivanov","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2019,3,7]]},"reference":[{"key":"7078_CR1","doi-asserted-by":"publisher","first-page":"835","DOI":"10.3103\/S0146411617080272","volume":"51","author":"D.P. Zegzhda","year":"2017","unstructured":"Zegzhda, D.P., Poltavtseva, M.A., and Lavrova, D.S., Systematization and security assessment of cyber-physical systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 835\u2013843.","journal-title":"Autom. Control Comput. Sci."},{"key":"7078_CR2","unstructured":"Amitoj, K., Gursimrat, S., and Jagroop, K., SPIN: A Data Centric Protocol For Wireless Sensor Networks. https:\/\/www.ijert.org\/view-pdf\/2701\/spin-a-data-centric-protocol-for-wireless-sensor-networks. Accessed October 10, 2017."},{"key":"7078_CR3","unstructured":"Idrees, S., Chee-Onn, C., Hiroshi, I., and Tanveer, A., Threat Models and Security Issues in Wireless Sensor Networks. https:\/\/www.ijcte.org\/papers\/806-Z1040.pdf. Accessed October 10, 2017."},{"key":"7078_CR4","unstructured":"Aitmagambetov, A. and Postol\u2019skii, S., Review of problem areas in the security of wireless sensor networks, attacks and their defense mechanisms. https:\/\/sibac.info\/studconf\/tech\/xxxii\/42203. Accessed October 10, 2017."},{"key":"7078_CR5","unstructured":"Zahariadis, T., Leligou, H., and Karkazis, P., Design and implementation of a trust-aware routing protocol for large WSNs. https:\/\/www.ics.uci.edu\/~dsm\/ics280sensor\/readings\/networks\/routing-survey.pdf. Accessed October 10, 2017."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080205.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411618080205","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411618080205.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:07:40Z","timestamp":1773612460000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411618080205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":5,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["7078"],"URL":"https:\/\/doi.org\/10.3103\/s0146411618080205","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"12 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2019","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}