{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T15:14:17Z","timestamp":1720624457923},"reference-count":163,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T00:00:00Z","timestamp":1543622400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1016\/j.adhoc.2018.07.009","type":"journal-article","created":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T17:00:32Z","timestamp":1532710832000},"page":"143-159","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":10,"special_numbering":"C","title":["Toward trust based protocols in a pervasive and mobile computing environment: A survey"],"prefix":"10.1016","volume":"81","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-4973-3585","authenticated-orcid":false,"given":"Aminu","family":"Bello Usman","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2103-8636","authenticated-orcid":false,"given":"Jairo","family":"Gutierrez","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/j.adhoc.2018.07.009_sbref0001","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1016\/j.jnca.2010.12.003","article-title":"Towards nature-inspired pervasive service ecosystems: concepts and simulation experiences","volume":"34","author":"Villalba","year":"2011","journal-title":"J. Netw. Comput. Appl."},{"issue":"Supplement C","key":"10.1016\/j.adhoc.2018.07.009_bib0002","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.pmcj.2017.07.009","article-title":"The internet of people (iop): a new wave in pervasive mobile computing","volume":"41","author":"Conti","year":"2017","journal-title":"Pervasive Mob. Comput."},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.009_bib0003","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1186\/1743-0003-9-21","article-title":"A review of wearable sensors and systems with application in rehabilitation","volume":"9","author":"Patel","year":"2012","journal-title":"J. Neuroeng. Rehabil."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0004","series-title":"Design and Control of Swarm Dynamics","author":"Bouffanais","year":"2016"},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0005","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/98.943998","article-title":"Pervasive computing: vision and challenges","volume":"8","author":"Satyanarayanan","year":"2001","journal-title":"IEEE Pers. Commun."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0006","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1016\/j.adhoc.2016.09.019","article-title":"PrivHab: a privacy preserving georouting protocol based on a multiagent system for podcast distribution on disconnected areas","volume":"53","author":"S\u00e1nchez-Carmona","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0007","unstructured":"K. Fysarakis, G. Hatzivasilis, K. Rantos, A. Papanikolaou, C. Manifavas, Embedded systems security challenges., in: Proceedings of the PECCS, 2014, pp. 255\u2013266."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0008","doi-asserted-by":"crossref","unstructured":"R. Grimm, T. Anderson, B. Bershad, D. Wetherall, A system architecture for pervasive computing, in: Proceedings of the Ninth Workshop on ACM SIGOPS European workshop: Beyond the PC: New Challenges for the Operating System, ACM, 2000, pp. 177\u2013182.","DOI":"10.1145\/566726.566763"},{"issue":"10","key":"10.1016\/j.adhoc.2018.07.009_bib0009","doi-asserted-by":"crossref","first-page":"e77488","DOI":"10.1371\/journal.pone.0077488","article-title":"Using trust to secure geographic and energy aware routing against multiple attacks","volume":"8","author":"Zhang","year":"2013","journal-title":"PLoS ONE"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0010","series-title":"Information Science and Applications (ICISA)","first-page":"279","article-title":"Cooperative caching strategies for mobile peer-to-peer networks: A survey","author":"Zhou","year":"2016"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0011","doi-asserted-by":"crossref","unstructured":"A.B. Usman, J. Gutierrez, A reliability-based trust model for efficient collaborative routing in wireless networks, in: Proceedings of the Eleventh International Conference on Queueing Theory and Network Applications, QTNA \u201916, ACM, New York, NY, USA, 2016, pp. 15:1\u201315:7. doi:10.1145\/3016032.3016057.","DOI":"10.1145\/3016032.3016057"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0012","series-title":"Calculating and aggregating direct trust and reputation in organic computing systems","author":"Kiefhaber","year":"2014"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0013","series-title":"Trust beyond reputation: Novel trust mechanisms for distributed environments","author":"Xin","year":"2011"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0014","series-title":"Secured trust and reputation system: analysis of malicious behaviors and optimization","author":"Bradai","year":"2014"},{"issue":"12","key":"10.1016\/j.adhoc.2018.07.009_bib0015","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MCOM.2009.5350376","article-title":"Opportunistic routing for wireless ad hoc and sensor networks: present and future directions","volume":"47","author":"Liu","year":"2009","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0016","unstructured":"A. J\u00f8sang, R. Hayward, S. Pope, Trust network analysis with subjective logic, in: Proceedings of the Twenty-Ninth Australasian Computer Science Conference-Volume 48, Australian Computer Society, Inc., 2006, pp. 85\u201394."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0017","unstructured":"A. J\u00f8sang, An algebra for assessing trust in certification chains., in: Proceedings of the NDSS, vol.\u00a0 99, 1999, p.\u00a080."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0018","series-title":"Formalising trust as a computational concept","author":"Marsh","year":"1994"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0019","doi-asserted-by":"crossref","unstructured":"A. Gutscher, A trust model for an open, decentralized reputation system, in: Proceedings of the IFIP International Conference on Trust Management, Springer, 2007, pp. 285\u2013300.","DOI":"10.1007\/978-0-387-73655-6_19"},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.009_bib0020","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","article-title":"A survey of trust and reputation systems for online service provision","volume":"43","author":"J\u00f8sang","year":"2007","journal-title":"Decis. Support Syst."},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0021","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/S0167-9236(00)00084-1","article-title":"Collaborative reputation mechanisms for electronic marketplaces","volume":"29","author":"Zacharia","year":"2000","journal-title":"Decis. Support Syst."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0022","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.peva.2015.06.009","article-title":"Modeling ebay-like reputation systems: analysis, characterization and insurance mechanism design","volume":"91","author":"Xie","year":"2015","journal-title":"Perform. Eval."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0023","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1146\/annurev-economics-080315-015325","article-title":"Reputation and feedback systems in online platform markets","volume":"8","author":"Tadelis","year":"2016","journal-title":"Annu. Rev. Econ."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0024","series-title":"Reputation System Based Trust-Enabled Routing for Wireless Sensor Networks","author":"Naseer","year":"2012"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0025","series-title":"Advanced Communications and Multimedia Security","first-page":"107","article-title":"Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks","author":"Michiardi","year":"2002"},{"issue":"5","key":"10.1016\/j.adhoc.2018.07.009_bib0026","doi-asserted-by":"crossref","first-page":"1200","DOI":"10.1109\/TPDS.2013.116","article-title":"Dynamic trust management for delay tolerant networks and its application to secure routing","volume":"25","author":"Chen","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0027","series-title":"Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks","article-title":"Reputation-and-trust-based systems for Ad Hoc networks","volume":"375","author":"Srinivasan","year":"2009"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0028","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.jpdc.2014.08.004","article-title":"Reputation systems: a survey and taxonomy","volume":"75","author":"Hendrikx","year":"2015","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0029","series-title":"Security and Privacy Management, Techniques, and Protocols","first-page":"47","article-title":"Trust-based analytical models for secure wireless sensor networks","author":"Usman","year":"2018"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0030","series-title":"Trust-Based Collective View Prediction","author":"Luo","year":"2013"},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0031","doi-asserted-by":"crossref","first-page":"494","DOI":"10.1109\/TDSC.2011.65","article-title":"Zonetrust: fast zone-based node compromise detection and revocation in wireless sensor networks using sequential hypothesis testing","volume":"9","author":"Ho","year":"2012","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.009_bib0032","doi-asserted-by":"crossref","first-page":"3299","DOI":"10.3390\/s150203299","article-title":"Centera: a centralized trust-based efficient routing protocol with authentication for wireless sensor networks","volume":"15","author":"Tajeddine","year":"2015","journal-title":"Sensors"},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.009_bib0033","doi-asserted-by":"crossref","first-page":"856","DOI":"10.3390\/s18030856","article-title":"3Vsr: three valued secure routing for vehicular ad hoc networks using sensing logic in adversarial environment","volume":"18","author":"Sohail","year":"2018","journal-title":"Sensors"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0034","doi-asserted-by":"crossref","unstructured":"A. Srinivasan, F. Li, J. Wu, A novel CDS-based reputation monitoring system for wireless sensor networks, in: Proceedings of the Twenty-Eighth International Conference on Distributed Computing Systems Workshops, IEEE, 2008, pp. 364\u2013369.","DOI":"10.1109\/ICDCS.Workshops.2008.17"},{"issue":"12","key":"10.1016\/j.adhoc.2018.07.009_bib0035","doi-asserted-by":"crossref","first-page":"85","DOI":"10.14257\/ijmue.2014.9.12.08","article-title":"A trust management model for mobile P2P networks based on multiple-fuzzy theory","volume":"9","author":"Meijuan","year":"2014","journal-title":"Int. J. Multimed. Ubiquitous Eng."},{"issue":"Supplement C","key":"10.1016\/j.adhoc.2018.07.009_bib0036","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.jnca.2016.04.018","article-title":"A model-driven approach for engineering trust and reputation into software services","volume":"69","author":"Moyano","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0037","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2018.04.013","article-title":"A selective multipath routing protocol for ubiquitous networks","author":"Ladas","year":"2018","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0038","doi-asserted-by":"crossref","unstructured":"J. Wang, H. Wang, Trust-based qos routing algorithm for wireless sensor networks, in: Proceedings of the Twenty-Sixth Chinese Control and Decision Conference, IEEE, 2014, pp. 2492\u20132495.","DOI":"10.1109\/CCDC.2014.6852592"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0039","unstructured":"W.R. Heinzelman, A. Chandrakasan, H. Balakrishnan, Energy-efficient communication protocol for wireless microsensor networks, in: Proceedings of the Thrirty-Third Annual Hawaii International Conference on System Sciences, IEEE, 2000, pp. 10\u2013pp."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0040","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1016\/j.adhoc.2014.02.005","article-title":"Trust management in mobile ad hoc networks for bias minimization and application performance maximization","volume":"19","author":"Chen","year":"2014","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0041","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.adhoc.2015.12.004","article-title":"Trust based reliable transmissions strategies for smart home energy consumption management in cognitive radio based smart grid","volume":"41","author":"Premarathne","year":"2016","journal-title":"Ad Hoc Netw."},{"issue":"16","key":"10.1016\/j.adhoc.2018.07.009_bib0042","doi-asserted-by":"crossref","first-page":"3594","DOI":"10.1016\/j.comnet.2012.07.010","article-title":"The social internet of things (SIoT)\u2013when social networks meet the internet of things: concept, architecture and network characterization","volume":"56","author":"Atzori","year":"2012","journal-title":"Comput. Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0043","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for internet of things","volume":"42","author":"Yan","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"10.1016\/j.adhoc.2018.07.009_bib0044","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1016\/j.jnca.2012.12.028","article-title":"Opportunistic IoT: exploring the harmonious interaction between human and the internet of things","volume":"36","author":"Guo","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0045","doi-asserted-by":"crossref","unstructured":"E. Bulut, B.K. Szymanski, Friendship based routing in delay tolerant mobile social networks, in: Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2010), IEEE, 2010, pp. 1\u20135.","DOI":"10.1109\/GLOCOM.2010.5683082"},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.009_bib0046","first-page":"107","article-title":"Location-aware, trust-based detection and isolation of compromised nodes in wireless sensor networks.","volume":"12","author":"Crosby","year":"2011","journal-title":"Int. J. Netw. Secur."},{"issue":"6","key":"10.1016\/j.adhoc.2018.07.009_bib0047","doi-asserted-by":"crossref","first-page":"160196","DOI":"10.1098\/rsos.160196","article-title":"Spatio-temporal networks: reachability, centrality and robustness","volume":"3","author":"Williams","year":"2016","journal-title":"R. Soc. Open Sci."},{"issue":"11","key":"10.1016\/j.adhoc.2018.07.009_bib0048","doi-asserted-by":"crossref","first-page":"2944","DOI":"10.1109\/TPDS.2013.309","article-title":"Mobifuzzytrust: an efficient fuzzy trust inference mechanism in mobile social networks","volume":"25","author":"Hao","year":"2014","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0049","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.adhoc.2016.02.014","article-title":"Trust threshold based public key management in mobile ad hoc networks","volume":"44","author":"Cho","year":"2016","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0050","series-title":"A framework for decentralised trust reasoning.","author":"Abdul-Rahman","year":"2005"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0051","doi-asserted-by":"crossref","first-page":"17896","DOI":"10.1109\/ACCESS.2017.2740219","article-title":"A fuzzy logic trust model for secure routing in smart grid networks","volume":"5","author":"Alnasser","year":"2017","journal-title":"IEEE Access"},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.009_bib0052","article-title":"Trust based power aware secure source routing protocol using fuzzy logic for mobile Adhoc networks.","volume":"23","author":"Jayalakshmi","year":"2016","journal-title":"IAENG Int. J. Comput. Sci."},{"issue":"10","key":"10.1016\/j.adhoc.2018.07.009_bib0053","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.4304\/jsw.4.10.1091-1101","article-title":"Trust evaluation and dynamic routing decision based on fuzzy theory for manets","volume":"4","author":"Dai","year":"2009","journal-title":"J. Softw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0054","doi-asserted-by":"crossref","unstructured":"S. Renubala, K.S. Dhanalakshmi, Trust based secure routing protocol using fuzzy logic in wireless sensor networks, in: Proceedings of the IEEE International Conference on Computational Intelligence and Computing Research, 2014, pp. 1\u20135. doi:10.1109\/ICCIC.2014.7238435.","DOI":"10.1109\/ICCIC.2014.7238435"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0055","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.1016\/j.adhoc.2012.02.009","article-title":"Trust prediction and trust-based source routing in mobile ad hoc networks","volume":"11.7","author":"Xia","year":"2013","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0056","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1016\/j.adhoc.2015.03.004","article-title":"Trust based routing mechanism for securing OSLR-based MANET","volume":"30","author":"Tan","year":"2015","journal-title":"Ad Hoc Netw."},{"issue":"5","key":"10.1016\/j.adhoc.2018.07.009_bib0057","doi-asserted-by":"crossref","first-page":"547","DOI":"10.1016\/j.future.2010.03.006","article-title":"A novel reputation computation model based on subjective logic for mobile ad hoc networks","volume":"27","author":"Liu","year":"2011","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0058","doi-asserted-by":"crossref","unstructured":"V. Balakrishnan, V. Varadharajan, U. Tupakula, Subjective logic based trust model for mobile ad hoc networks, in: Proceedings of the Fourth International Conference on Security and Privacy in Communication Netowrks, ACM, 2008, p.\u00a030.","DOI":"10.1145\/1460877.1460916"},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0059","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1049\/iet-wss.2011.0042","article-title":"Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory","volume":"1","author":"Xia","year":"2011","journal-title":"IET Wirel. Sens. Syst."},{"issue":"6","key":"10.1016\/j.adhoc.2018.07.009_bib0060","doi-asserted-by":"crossref","first-page":"546","DOI":"10.4236\/ijcns.2009.26060","article-title":"A trust model based on the multinomial subjective logic for p2p network.","volume":"2","author":"Tian","year":"2009","journal-title":"IJCNS"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0061","doi-asserted-by":"crossref","unstructured":"J. Golbeck, Combining provenance with trust in social networks for semantic web content filtering, in: Proceedings of the International Provenance and Annotation Workshop, Springer, 2006, pp. 101\u2013108.","DOI":"10.1007\/11890850_12"},{"issue":"10","key":"10.1016\/j.adhoc.2018.07.009_sbref0046","doi-asserted-by":"crossref","first-page":"2280","DOI":"10.1016\/j.comnet.2012.11.020","article-title":"Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet","volume":"57","author":"Martinez-Julia","year":"2013","journal-title":"Comput. Netw."},{"issue":"Supplement C","key":"10.1016\/j.adhoc.2018.07.009_bib0063","first-page":"29","article-title":"Uninorm trust propagation and aggregation methods for group decision making in social network with four tuple information","volume":"96","author":"Wu","year":"2016","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.adhoc.2018.07.009_sbref0048","series-title":"Proceedings of the International Workshop on Self-aware Internet of Things","first-page":"1","article-title":"Dynamic trust management for internet of things applications","author":"Bao","year":"2012"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0065","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jnca.2015.06.013","article-title":"BTRES: beta-based trust and reputation evaluation system for wireless sensor networks","volume":"59","author":"Fang","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0066","doi-asserted-by":"crossref","unstructured":"Y. Wang, J. Vassileva, Bayesian Network Trust Model in Peer-to-Peer Networks, Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 23\u201334. doi:10.1007\/978-3-540-25840-7_3.","DOI":"10.1007\/978-3-540-25840-7_3"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0067","doi-asserted-by":"crossref","unstructured":"R.K. Sinha, A.K. Jagannatham, Gaussian trust and reputation for fading MIMO wireless sensor networks, in: Proceedings of the IEEE International Conference on Electronics, Computing and Communication Technologies (IEEE CONECCT), IEEE, 2014, pp. 1\u20136.","DOI":"10.1109\/CONECCT.2014.6740282"},{"issue":"10","key":"10.1016\/j.adhoc.2018.07.009_bib0068","doi-asserted-by":"crossref","first-page":"1865","DOI":"10.1002\/sec.1026","article-title":"Trust dynamic task allocation algorithm with Nash equilibrium for heterogeneous wireless sensor network","volume":"8","author":"Guo","year":"2015","journal-title":"Secur. Commun. Netw."},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0069","doi-asserted-by":"crossref","first-page":"e3487","DOI":"10.1002\/dac.3487","article-title":"A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks","volume":"31","author":"Chhabra","year":"2018","journal-title":"Int. J. Commun. Syst."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0070","doi-asserted-by":"crossref","unstructured":"S. Song, K. Hwang, M. Macwan, Fuzzy trust integration for security enforcement in grid computing, in: Proceedings of the IFIP International Conference on Network and Parallel Computing, Springer, 2004, pp. 9\u201321.","DOI":"10.1007\/978-3-540-30141-7_6"},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.009_bib0071","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1016\/j.adhoc.2007.03.005","article-title":"Trust model for certificate revocation in Ad Hoc networks","volume":"6","author":"Chinni","year":"2008","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0072","doi-asserted-by":"crossref","unstructured":"R. Kohlas, J. Jonczy, R. Haenni, A trust evaluation method based on logic and probability theory, in: Proceedings of the IFIP International Conference on Trust Management, Springer, 2008, pp. 17\u201332.","DOI":"10.1007\/978-0-387-09428-1_2"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0073","article-title":"DATM: a dynamic attribute trust model for efficient collaborative routing","author":"Usman","year":"2018","journal-title":"Ann. Oper. Res."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0074","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1016\/j.pmcj.2013.06.004","article-title":"A light-weight trust-based QoS routing algorithm for ad hoc networks","volume":"13","author":"Wang","year":"2014","journal-title":"Pervasive Mob. Comput."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0075","author":"Chakraborty","year":"2013","journal-title":"A trust based Fuzzy algorithm for congestion control in Wireless Multimedia Sensor Networks (TFCC)"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0076","doi-asserted-by":"crossref","unstructured":"R. Chen, J. Guo, F. Bao, J.-H. Cho, Integrated social and quality of service trust management of mobile groups in ad hoc networks, in: Proceedings of the Ninth International Conference on Information, Communications and Signal Processing (ICICS), IEEE, 2013, pp. 1\u20135.","DOI":"10.1109\/ICICS.2013.6782950"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0077","author":"Ganguly","year":"2013","journal-title":"A Trust-based Framework for Congestion-aware Energy Efficient Routing in Wireless Multimedia Sensor Networks"},{"issue":"7","key":"10.1016\/j.adhoc.2018.07.009_bib0078","doi-asserted-by":"crossref","first-page":"2096","DOI":"10.1016\/j.adhoc.2012.02.009","article-title":"Trust prediction and trust-based source routing in mobile ad hoc networks","volume":"11","author":"Xia","year":"2013","journal-title":"Ad Hoc Netw."},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.009_bib0079","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1049\/iet-ifs.2011.0234","article-title":"Regression-based trust model for mobile ad hoc networks","volume":"6","author":"Venkataraman","year":"2012","journal-title":"IET Inf. Secur."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0080","doi-asserted-by":"crossref","unstructured":"A. J\u00f8sang, S. Marsh, S. Pope, Exploring different types of trust propagation, in: Proceedings of the International Conference on Trust Management, Springer, 2006, pp. 179\u2013192.","DOI":"10.1007\/11755593_14"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0081","first-page":"4077","author":"Engle","year":"2001","journal-title":"Structural holes and Simmelian ties: Exploring social capital, task interdependence, and individual effectiveness"},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.009_bib0082","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1086\/421787","article-title":"Structural holes and good ideas1","volume":"110","author":"Burt","year":"2004","journal-title":"Am. J. Sociol."},{"issue":"5","key":"10.1016\/j.adhoc.2018.07.009_bib0083","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MITP.2017.3680960","article-title":"Authentication and authorization for the internet of things","volume":"19","author":"Kim","year":"2017","journal-title":"IT Prof."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0084","doi-asserted-by":"crossref","unstructured":"T. Thenmozhi, R. Somasundaram, Towards modelling a trusted and secured centralised reputation system for VANET\u2019s, in: Proceedings of the International Conference on Soft Computing Systems, Springer, 2016, pp. 675\u2013688.","DOI":"10.1007\/978-81-322-2674-1_64"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0085","doi-asserted-by":"crossref","unstructured":"F. Hajibabaei, M.H.Y. Moghaddam, Proposing a centralized trust management system to detect compromised node in wsn, in: Prceedings of the ICCKE, 2013, pp. 315\u2013320. doi:10.1109\/ICCKE.2013.6682866.","DOI":"10.1109\/ICCKE.2013.6682866"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0086","doi-asserted-by":"crossref","first-page":"S95","DOI":"10.1086\/228943","article-title":"Social capital in the creation of human capital","author":"Coleman","year":"1988","journal-title":"Am. J. Sociol."},{"issue":"Supplement C","key":"10.1016\/j.adhoc.2018.07.009_bib0087","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.socnet.2014.10.005","article-title":"Reciprocity, transitivity, and the mysterious three-cycle","volume":"40","author":"Block","year":"2015","journal-title":"Soc. Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0088","doi-asserted-by":"crossref","unstructured":"A. J\u00f8sang, T. A\u017ederska, S. Marsh, Trust transitivity and conditional belief reasoning, in: Proceedings of the IFIP International Conference on Trust Management, Springer, 2012, pp. 68\u201383.","DOI":"10.1007\/978-3-642-29852-3_5"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0089","doi-asserted-by":"crossref","unstructured":"A. Bello, W. Liu, Q. Bai, A. Narayanan, Revealing the role of topological transitivity in efficient trust and reputation system in smart metering network, in: Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, IEEE, 2015, pp. 337\u2013342.","DOI":"10.1109\/DSDIS.2015.114"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0090","doi-asserted-by":"crossref","unstructured":"S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in p2p networks, in: Proceedings of the Twelfth International Conference on World Wide Web, ACM, 2003, pp. 640\u2013651.","DOI":"10.1145\/775152.775242"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0091","series-title":"Influence: the Psychology of Persuasion (Rev. Ed.)","author":"Cialdini Robert","year":"1993"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0092","article-title":"Optimal interdependence between networks for the evolution of cooperation","volume":"3","author":"Wang","year":"2013","journal-title":"Sci. Rep."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0093","series-title":"Trust and Reciprocity: Interdisciplinary Lessons for Experimental Research","author":"Ostrom","year":"2003"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0094","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1086\/406755","article-title":"The evolution of reciprocal altruism","author":"Trivers","year":"1971","journal-title":"Q. Rev. Biol."},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0095","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1109\/TPDS.2007.1021","article-title":"Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing","volume":"18","author":"Zhou","year":"2007","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0096","doi-asserted-by":"crossref","unstructured":"R. Landa, D. Griffin, R.G. Clegg, E. Mykoniati, M. Rio, A sybilproof indirect reciprocity mechanism for peer-to-peer networks, in: Proceedings of the IEEE INFOCOM, IEEE, 2009, pp. 343\u2013351.","DOI":"10.1109\/INFCOM.2009.5061938"},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.009_bib0097","doi-asserted-by":"crossref","first-page":"036121","DOI":"10.1103\/PhysRevE.72.036121","article-title":"Dynamics of social balance on networks","volume":"72","author":"Antal","year":"2005","journal-title":"Phys. Rev. E"},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.009_bib0098","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/S0378-8733(02)00019-9","article-title":"Some dynamics of social balance processes: bringing Heider back into balance theory","volume":"25","author":"Hummon","year":"2003","journal-title":"Soc. Netw."},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0099","doi-asserted-by":"crossref","first-page":"e18384","DOI":"10.1371\/journal.pone.0018384","article-title":"Trust transitivity in social networks","volume":"6","author":"Richters","year":"2011","journal-title":"PLoS ONE"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0100","doi-asserted-by":"crossref","unstructured":"J. Golbeck, Combining provenance with trust in social networks for semantic web content filtering, in: Proceedings of the International Provenance and Annotation Workshop, Springer, 2006, pp. 101\u2013108.","DOI":"10.1007\/11890850_12"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0101","doi-asserted-by":"crossref","unstructured":"L. Akoglu, P.O.V. de Melo, C. Faloutsos, Quantifying reciprocity in large weighted communication networks, in: Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer, 2012, pp. 85\u201396.","DOI":"10.1007\/978-3-642-30220-6_8"},{"issue":"26","key":"10.1016\/j.adhoc.2018.07.009_bib0102","doi-asserted-by":"crossref","first-page":"268701","DOI":"10.1103\/PhysRevLett.93.268701","article-title":"Patterns of link reciprocity in directed networks","volume":"93","author":"Garlaschelli","year":"2004","journal-title":"Phys. Rev. Lett."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0103","series-title":"The Evolution of Cooperation","author":"Axelrod","year":"2006"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0104","first-page":"43","article-title":"Design of a proficient hybrid protocol for efficient route discovery and secure data transmission in CEAACK MANETs","volume":"36","author":"Sathiamoorthy","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0105","doi-asserted-by":"crossref","unstructured":"R. Landa, D. Griffin, R.G. Clegg, E. Mykoniati, M. Rio, A sybilproof indirect reciprocity mechanism for peer-to-peer networks, in: Proceedings of the IEEE INFOCOM, IEEE, 2009, pp. 343\u2013351.","DOI":"10.1109\/INFCOM.2009.5061938"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0106","first-page":"64","article-title":"Design of authentication protocol for wireless sensor network-based smart vehicular system","volume":"9","author":"Mohit","year":"2017","journal-title":"Veh. Commun."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0107","article-title":"VANet security challenges and solutions: a survey","author":"Hasrouny","year":"2017","journal-title":"Veh. Commun."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0108","doi-asserted-by":"crossref","unstructured":"B.B. Chen, M.C. Chan, Mobicent: a credit-based incentive system for disruption tolerant network, in: Proceedings of the IEEE INFOCOM, IEEE, 2010, pp. 1\u20139.","DOI":"10.1109\/INFCOM.2010.5462136"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0109","doi-asserted-by":"crossref","unstructured":"L. Buttyan, L. Dora, M. Felegyhazi, I. Vajda, Barter-based cooperation in delay-tolerant personal wireless networks, in: proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, IEEE, 2007, pp. 1\u20136.","DOI":"10.1109\/WOWMOM.2007.4351689"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0110","author":"Kayarkar","year":"2012","journal-title":"A survey on security issues in ad hoc routing protocols and their mitigation techniques"},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0111","first-page":"453","article-title":"Rushing attack and its prevention techniques","volume":"2","author":"Shrivastava","year":"2013","journal-title":"Int. J. Appl. Innov. Eng. Manag."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0112","first-page":"3","article-title":"Attacks and defenses of routing mechanisms in ad hoc and sensor networks","author":"Wang","year":"2007","journal-title":"Secur. Sens. Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0113","doi-asserted-by":"crossref","unstructured":"S.A. Chhoeun, K.S.N. Ayutaya, C. Charnsripinyo, K. Chamnongthai, P. Kumhom, A novel message fabrication detection for beaconless routing in VANets, in: Proceedings of the International Conference on Communication Software and Networks, ICCSN\u201909., IEEE, 2009, pp. 453\u2013457.","DOI":"10.1109\/ICCSN.2009.29"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0114","series-title":"Proceedings of the 6th annual international conference on Mobile computing and networking","first-page":"255","article-title":"Mitigating routing misbehaviour in mobile ad hoc networks","author":"Marti","year":"2000"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0115","doi-asserted-by":"crossref","unstructured":"T. Zahariadis, P. Trakadas, S. Maniatis, P. Karkazis, H.C. Leligou, S. Voliotis, Efficient detection of routing attacks in wireless sensor networks, in: Proceedings of the Sixteenth International Conference on Systems, Signals and Image Processing, IEEE, 2009, pp. 1\u20134.","DOI":"10.1109\/IWSSIP.2009.5367775"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0116","doi-asserted-by":"crossref","unstructured":"J. Touch, Defending TCP against spoofing attacks(No. RFC 4953) (2007).","DOI":"10.17487\/rfc4953"},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.009_bib0117","doi-asserted-by":"crossref","first-page":"281","DOI":"10.3390\/s16030281","article-title":"A new MAC address spoofing detection technique based on random forests","volume":"16","author":"Alotaibi","year":"2016","journal-title":"Sensors"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0118","series-title":"A Survey of Solutions to the Sybil Attack","first-page":"224","volume":"7","author":"Levine","year":"2006"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0119","doi-asserted-by":"crossref","unstructured":"J. Wang, H. Shi, A secure DSR protocol based on the request sequence-number, in: Proceedings of the Fifth International Conference on Wireless Communications, Networking and Mobile Computing, WiCom\u201909., IEEE, 2009, pp. 1\u20134.","DOI":"10.1109\/WICOM.2009.5301631"},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.009_bib0120","first-page":"775","article-title":"Detecting black and gray hole attacks in mobile ad hoc network using an adaptive method","volume":"2","author":"Kariya","year":"2012","journal-title":"Int. J. Emerg. Technol. Adv. Eng."},{"issue":"6","key":"10.1016\/j.adhoc.2018.07.009_bib0121","first-page":"35","article-title":"Review of black hole and grey hole attack","volume":"6","author":"Kaur","year":"2014","journal-title":"Int. J. Multimed. Appl."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0122","doi-asserted-by":"crossref","unstructured":"J. Sen, M.G. Chandra, S. Harihara, H. Reddy, P. Balamuralidhar, A mechanism for detection of gray hole attack in mobile ad hoc networks, in: Proceedings of the Sixth International Conference on Information, Communications & Signal Processing, IEEE, 2007, pp. 1\u20135.","DOI":"10.1109\/ICICS.2007.4449664"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0123","doi-asserted-by":"crossref","unstructured":"P. Sharma, A. Trivedi, An approach to defend against wormhole attack in ad hoc network using digital signature, in: Proceedings of the IEEE Third International Conference on Communication Software and Networks (ICCSN), IEEE, 2011, pp. 307\u2013311.","DOI":"10.1109\/ICCSN.2011.6014728"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0124","doi-asserted-by":"crossref","unstructured":"G. Lee, J. Seo, D.-k. Kim, An approach to mitigate wormhole attack in wireless ad hoc networks, in: Proceedings of the International Conference on Information Security and Assurance, 2008. ISA, IEEE, 2008, pp. 220\u2013225.","DOI":"10.1109\/ISA.2008.44"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0125","author":"Bhattasali","year":"2012","journal-title":"Sleep deprivation attack detection in wireless sensor network"},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0126","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","article-title":"A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks","volume":"15","author":"Zargar","year":"2013","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"9","key":"10.1016\/j.adhoc.2018.07.009_bib0127","first-page":"4063","article-title":"A survey of mobile ad hoc network attacks","volume":"2","author":"Jawandhiya","year":"2010","journal-title":"Int. J. Eng. Sci. Technol."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0128","doi-asserted-by":"crossref","unstructured":"A. Garg, S. Kumar, K. Dutta, An analytical survey of state of the art jellyfish attack detection and prevention techniques, in: Proceedings of the Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), IEEE, 2016, pp. 38\u201343.","DOI":"10.1109\/PDGC.2016.7913181"},{"issue":"17","key":"10.1016\/j.adhoc.2018.07.009_bib0129","article-title":"Anomaly based DDoS attack detection","volume":"123","author":"Buragohain","year":"2015","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0130","series-title":"Computer Communication, Networking and Internet Security","first-page":"11","article-title":"Anomaly detection system in a cluster based MANET","author":"Narayandas","year":"2017"},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.009_bib0131","first-page":"338","article-title":"Detecting blackhole attack on aodv-based mobile ad hoc networks by dynamic learning method.","volume":"5","author":"Kurosawa","year":"2007","journal-title":"Int. J. Netw. Secur."},{"issue":"14","key":"10.1016\/j.adhoc.2018.07.009_bib0132","doi-asserted-by":"crossref","first-page":"2484","DOI":"10.1002\/sec.1484","article-title":"Intrusion detection in mobile ad hoc networks: techniques, systems, and future challenges","volume":"9","author":"Kumar","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0133","series-title":"Reputation System Based Trust-Enabled Routing for Wireless Sensor Networks","author":"Naseer","year":"2012"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0134","first-page":"3","article-title":"Collaborative routing protocol based on hydrodynamics for wireless sensor networks","volume":"2015","author":"Wei","year":"2015","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0135","first-page":"280","article-title":"A survey of trust based routing protocols in MANETs","volume":"1","author":"Kukreja","year":"2013","journal-title":"J. Adv. Comput. Netw."},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.009_bib0136","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2009\/718318","article-title":"Cautious rating for trust-enabled routing in wireless sensor networks","volume":"2009","author":"Maarouf","year":"2010","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.009_bib0137","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/SURV.2011.042711.00083","article-title":"Trust computations and trust dynamics in mobile Adhoc networks: a survey","volume":"14","author":"Govindan","year":"2012","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.009_bib0138","doi-asserted-by":"crossref","first-page":"13","DOI":"10.4018\/IJISP.2015040102","article-title":"Trust of the same: rethinking trust and reputation management from a structural homophily perspective","volume":"9","author":"Usman","year":"2015","journal-title":"Int. J. Inf. Secur. Priv. (IJISP)"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0139","doi-asserted-by":"crossref","unstructured":"H. Alzaid, M. Alfaraj, S. Ries, A. J\u00f8sang, M. Albabtain, A. Abuhaimed, Reputation-based trust systems for wireless sensor networks: a comprehensive review, in: Proceedings of the IFIP International Conference on Trust Management, Springer, 2013, pp. 66\u201382.","DOI":"10.1007\/978-3-642-38323-6_5"},{"issue":"10","key":"10.1016\/j.adhoc.2018.07.009_bib0140","doi-asserted-by":"crossref","first-page":"e77488","DOI":"10.1371\/journal.pone.0077488","article-title":"Using trust to secure geographic and energy aware routing against multiple attacks","volume":"8","author":"Zhang","year":"2013","journal-title":"PLoS ONE"},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0141","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","article-title":"A survey on trust management for mobile ad hoc networks","volume":"13","author":"Cho","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"10.1016\/j.adhoc.2018.07.009_bib0142","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1007\/s11036-011-0328-0","article-title":"Trust-based routing mechanism in MANET: design and implementation","volume":"18","author":"Eissa","year":"2013","journal-title":"Mob. Netw. Appl."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0143","doi-asserted-by":"crossref","unstructured":"C. Zhang, X. Zhu, Y. Song, Y. Fang, A formal study of trust-based routing in wireless ad hoc networks, in: Proceedings of the IEEE INFOCOM, IEEE, 2010, pp. 1\u20139.","DOI":"10.1109\/INFCOM.2010.5462116"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0144","article-title":"Survey of trust models in different network domains","volume":"abs\/1010.0168","author":"Momani","year":"2010","journal-title":"CoRR"},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0145","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","article-title":"A survey on trust management for mobile ad hoc networks","volume":"13","author":"Cho","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0146","first-page":"2833","article-title":"A survey of trust management in mobile ad hoc networks","volume":"11","author":"Vijayan","year":"2016","journal-title":"Int. J. Appl. Eng. Res."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0147","article-title":"Machine learning for internet of things data analysis: a survey","author":"Mahdavinejad","year":"2017","journal-title":"Digit. Commun. Netw."},{"issue":"8","key":"10.1016\/j.adhoc.2018.07.009_bib0148","doi-asserted-by":"crossref","first-page":"2217","DOI":"10.1016\/j.adhoc.2013.05.004","article-title":"On the tradeoff between altruism and selfishness in MANET trust management","volume":"11","author":"Cho","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0149","doi-asserted-by":"crossref","unstructured":"L. Capra, M. Musolesi, Autonomic trust prediction for pervasive systems, in: Proceedings of the Twentieth International Conference on Advanced Information Networking and Applications, vol.\u00a0 2, IEEE, 2006, pp. 5\u2013pp.","DOI":"10.1109\/AINA.2006.113"},{"issue":"6","key":"10.1016\/j.adhoc.2018.07.009_bib0150","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.3390\/s17061346","article-title":"Toward a trust evaluation mechanism in the social internet of things","volume":"17","author":"Truong","year":"2017","journal-title":"Sensors"},{"issue":"3\u20134","key":"10.1016\/j.adhoc.2018.07.009_bib0151","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1007\/s10660-010-9064-y","article-title":"The design of a reliable reputation system","volume":"10","author":"Swamynathan","year":"2010","journal-title":"Electron. Commer. Res."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0152","doi-asserted-by":"crossref","unstructured":"R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, M. Tennenholtz, Trust-based recommendation systems: an axiomatic approach, in: Proceedings of the Seventeenth International Conference on World Wide Web, ACM, 2008, pp. 199\u2013208.","DOI":"10.1145\/1367497.1367525"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0153","series-title":"Reputation System Based Trust-Enabled Routing for Wireless Sensor Networks","author":"Naseer","year":"2012"},{"issue":"6","key":"10.1016\/j.adhoc.2018.07.009_bib0154","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1002\/sec.147","article-title":"A guide to trust in mobile ad hoc networks","volume":"3","author":"Balfe","year":"2010","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.adhoc.2018.07.009_bib0155","unstructured":"H. Huang, G. Gartner, Collaborative filtering based route recommendation for assisting pedestrian wayfinding. Available online: http:\/\/www.geo.uzh.ch\/~hhuang\/pdfs\/lbs2010.pdf"},{"issue":"2","key":"10.1016\/j.adhoc.2018.07.009_bib0156","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1016\/j.jnca.2012.12.001","article-title":"A systematic review on clustering and routing techniques based upon leach protocol for wireless sensor networks","volume":"36","author":"Tyagi","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.009_bib0157","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1109\/JSYST.2013.2281262","article-title":"Socially aware networking: a survey","volume":"9","author":"Xia","year":"2015","journal-title":"IEEE Syst. J."},{"issue":"7","key":"10.1016\/j.adhoc.2018.07.009_bib0158","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1109\/TMC.2010.44","article-title":"Uncertainty modeling and reduction in manets","volume":"9","author":"Li","year":"2010","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"10.1016\/j.adhoc.2018.07.009_bib0159","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/TNSM.2010.1009.I9P0339","article-title":"Trust management in mobile ad hoc networks using a scalable maturity-based model","volume":"7","author":"Velloso","year":"2010","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"4","key":"10.1016\/j.adhoc.2018.07.009_bib0160","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s00778-009-0138-1","article-title":"RATEWeb: reputation assessment for trust establishment among web services","volume":"18","author":"Malik","year":"2009","journal-title":"VLDB J."},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.009_sbref0109","doi-asserted-by":"crossref","first-page":"5:1","DOI":"10.1145\/1921641.1921646","article-title":"Trustworthy service selection and composition","volume":"6","author":"Hang","year":"2011","journal-title":"ACM Trans. Auton. Adapt. Syst."},{"issue":"1","key":"10.1016\/j.adhoc.2018.07.009_bib0162","doi-asserted-by":"crossref","first-page":"48","DOI":"10.4018\/jdst.2012010104","article-title":"Trust management for VANETs: challenges, desired properties and future directions","volume":"3","author":"Zhang","year":"2012","journal-title":"Int. J. Distrib. Syst. Technol. (IJDST)"},{"key":"10.1016\/j.adhoc.2018.07.009_bib0163","series-title":"Ad-hoc, Mobile, and Wireless Network","first-page":"1","article-title":"Design and assessment of a reputation-based trust framework in wireless testbeds utilizing user experience","author":"Kapoukakis","year":"2013"}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870518304906?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870518304906?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,11,13]],"date-time":"2020-11-13T16:41:04Z","timestamp":1605285664000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870518304906"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":163,"alternative-id":["S1570870518304906"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2018.07.009","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2018,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Toward trust based protocols in a pervasive and mobile computing environment: A survey","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2018.07.009","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}