{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T06:39:06Z","timestamp":1776926346337,"version":"3.51.2"},"reference-count":32,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T00:00:00Z","timestamp":1754179200000},"content-version":"vor","delay-in-days":214,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063537","type":"journal-article","created":{"date-parts":[[2025,7,10]],"date-time":"2025-07-10T09:14:33Z","timestamp":1752138873000},"page":"5555-5575","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Three-Level Intrusion Detection Model for Wireless Sensor Networks Based on Dynamic Trust Evaluation"],"prefix":"10.32604","volume":"84","author":[{"given":"Xiaogang","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Huan","family":"Pei","sequence":"additional","affiliation":[]},{"given":"Yanlin","family":"Wu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","first-page":"12","article-title":"Survey of trust management mechanism in wireless sensor network","volume":"20","author":"Jiang","year":"2020","journal-title":"Inf Netw Secur"},{"key":"ref2","first-page":"1211","article-title":"Based on credibility evaluation mechanism of WSN security routing protocol research","volume":"20","author":"Yang","year":"2010","journal-title":"High Technol Commun"},{"key":"ref3","first-page":"29","article-title":"A secure clustering routing protocol based on trust and balancing energy consumption","volume":"42","author":"Pan","year":"2019","journal-title":"J Beijing Univ Posts Telecommun"},{"key":"ref4","unstructured":"Fang Y. Research on privacy protection technology of wireless sensor network routing protocol [master\u2019s thesis]. Nanjing, China: Nanjing University of Aeronautics and Astronautics; 2020."},{"key":"ref5","series-title":"The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy; 2020 Nov 6\u20138","first-page":"394","article-title":"CS-based homomorphism encryption and trust scheme for underwater acoustic sensor networks","author":"Liang"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"109997","DOI":"10.1016\/j.comnet.2023.109997","article-title":"A dynamic and multi-level key management method in wireless sensor networks (WSNs)","volume":"236","author":"Khah","year":"2023","journal-title":"Comput Netw"},{"key":"ref7","series-title":"Proceedings of the International Conference on Informatics and Analytics; 2016 Aug 25\u201328","first-page":"1","article-title":"Beta reputation and direct trust model for secure communication in wireless sensor networks","author":"Priayoheswari","year":"2016"},{"key":"ref8","first-page":"174","article-title":"Feedback trust model for wireless sensor networks based on double cluster heads","volume":"47","author":"Zhou","year":"2021","journal-title":"Comput Eng"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"3534","DOI":"10.1007\/s11227-018-2669-y","article-title":"A lightweight trust management algorithm based on subjective logic for interconnected cloud computing environments","volume":"75","author":"Kurdi","year":"2019","journal-title":"J Supercomput"},{"key":"ref10","unstructured":"Liu Y. Trust model based on hierarchical trust management in wireless sensor networks [master\u2019s thesis]. Taiyuan, China: Taiyuan University of Technology; 2012. doi:10.7666\/d.y2156817."},{"key":"ref11","first-page":"1644","article-title":"Intrusion detection scheme based node trust value in WSNs","volume":"37","author":"Tong","year":"2015","journal-title":"Syst Eng Electron"},{"key":"ref12","first-page":"739","article-title":"Multi-protocol intrusion detection method based on trust mechanism in wireless sensor networks","volume":"32","author":"Xu","year":"2019","journal-title":"J Sens Technol"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"11872","DOI":"10.1109\/ACCESS.2021.3051491","volume":"9","author":"Tahboush","year":"2021","journal-title":"IEEE Access"},{"key":"ref14","first-page":"62","article-title":"TTSASA: three tier security against Sybil attack","volume":"13","author":"Bharti","year":"2022","journal-title":"J Algebr Stat"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"e2196","DOI":"10.1002\/nem.2196","article-title":"Optimization assisted deep learning based intrusion detection system in wireless sensor network with two-tier trust evaluation","volume":"32","author":"Kagade","year":"2022","journal-title":"Int J Netw Mgmt"},{"key":"ref16","first-page":"1423","article-title":"WSN fast identification trust attack model based on trust","volume":"60","author":"Tao","year":"2022","journal-title":"J Jilin Univ (Nat Sci Ed)"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"4407","DOI":"10.3390\/s23094407","article-title":"A hybrid trust model against insider packet drop attacks in wireless sensor networks","volume":"23","author":"Cho","year":"2023","journal-title":"Sensors"},{"key":"ref18","first-page":"76","article-title":"WSN dynamic trust evaluation prediction model based on multi-index fusion","volume":"44","author":"Teng","year":"2023","journal-title":"J Zhengzhou Univ (Eng Sci Ed)"},{"key":"ref19","first-page":"294","article-title":"IWSN of intrusion detection based on the variation of the properties, the global trust","volume":"36","author":"Li","year":"2023","journal-title":"J Sens Technol"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1799","DOI":"10.1007\/s11277-019-06357-3","article-title":"Secure and trust-aware routing scheme in wireless sensor networks","volume":"107","author":"Beheshtiasl","year":"2019","journal-title":"Wirel Pers Commun"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"10585","DOI":"10.1109\/ACCESS.2021.3075959","article-title":"Trust based secure and energy efficient routing protocol for wireless sensor networks","volume":"10","author":"Hu","year":"2021","journal-title":"IEEE Access"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"894","DOI":"10.1016\/j.compeleceng.2018.01.013","article-title":"Trust based data prediction, aggregation and reconstruction using compressed sensing for clustered wireless sensor networks","volume":"72","author":"Gilbert","year":"2018","journal-title":"Comput Electr Eng"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1963","DOI":"10.1109\/TII.2019.2938778","article-title":"A distributed deep learning system for web attack detection on edge devices","volume":"16","author":"Tian","year":"2020","journal-title":"IEEE Trans Ind Inf"},{"key":"ref24","unstructured":"Dang N. Research on trust-based intrusion detection in wireless sensor network [master\u2019s thesis]. Qufu, China: Qufu Normal University; 2019."},{"key":"ref25","unstructured":"Cao Y. Research on key distribution and Sybil attack detection in wireless sensor networks [master\u2019s thesis]. Liaoning, China: Liaoning University; 2023."},{"key":"ref26","first-page":"80","article-title":"Sybil attack detection method in WSN based on multiple trust factors","volume":"9","author":"Cao","year":"2023","journal-title":"Inf Technol Informatiz"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"103354","DOI":"10.1016\/j.micpro.2020.103354","article-title":"Data validation and integrity verification for trust based data aggregation protocol in WSN","volume":"80","author":"Daniel","year":"2021","journal-title":"Microprocess Microsyst"},{"key":"ref28","first-page":"153","article-title":"Water quality prediction of Nansi Lake based on Grey Markov model","volume":"5","author":"Ma","year":"2021","journal-title":"Water Resour Prot"},{"key":"ref29","first-page":"3758","article-title":"A reputation evaluation model based on Grey Markov model and its secure routing protocol","volume":"30","author":"Zeng","year":"2013","journal-title":"Appl Res Comput"},{"key":"ref30","first-page":"46","article-title":"5G network function trust prediction mechanism based on Markov process","volume":"8","author":"Zhang","year":"2023","journal-title":"J Cyber Secur"},{"key":"ref31","first-page":"1725","article-title":"Multi-step network intrusion detection using improved DBSCAN clustering","volume":"41","author":"Luo","year":"2020","journal-title":"Small Microcomput Syst"},{"key":"ref32","unstructured":"Li C. Trust-based intrusion detection model in industrial wireless sensor networks [master\u2019s thesis]. Wuxi, China: Jiangnan University; 2023."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-3\/TSP_CMC_63537\/TSP_CMC_63537.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T05:45:32Z","timestamp":1776923132000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n3\/63128"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":32,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063537","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-01-17","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-06-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-30","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}