{"id":"https://openalex.org/W7153013137","doi":"https://doi.org/10.1007/s12083-026-02222-w","title":"TITAN: Logarithm-based trust-aware integrated technique for robust anomaly neutralization in industrial WSNs","display_name":"TITAN: Logarithm-based trust-aware integrated technique for robust anomaly neutralization in industrial WSNs","publication_year":2026,"publication_date":"2026-04-10","ids":{"openalex":"https://openalex.org/W7153013137","doi":"https://doi.org/10.1007/s12083-026-02222-w"},"language":"en","primary_location":{"id":"doi:10.1007/s12083-026-02222-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12083-026-02222-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12083-026-02222-w.pdf","source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s12083-026-02222-w.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005681216","display_name":"Khushboo Tripathi","orcid":"https://orcid.org/0000-0002-3344-4359"},"institutions":[{"id":"https://openalex.org/I74885063","display_name":"Sharda University","ror":"https://ror.org/03b6ffh07","country_code":"IN","type":"education","lineage":["https://openalex.org/I74885063"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Khushboo Tripathi","raw_affiliation_strings":["Department of Computer Science & Applications, Sharda University, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Applications, Sharda University, Greater Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I74885063"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133372748","display_name":"Shalu","orcid":null},"institutions":[{"id":"https://openalex.org/I126193024","display_name":"London Metropolitan University","ror":"https://ror.org/00ae33288","country_code":"GB","type":"education","lineage":["https://openalex.org/I126193024"]},{"id":"https://openalex.org/I55016150","display_name":"Manav Rachna International Institute of Research and Studies","ror":"https://ror.org/02kf4r633","country_code":"IN","type":"education","lineage":["https://openalex.org/I4405253735","https://openalex.org/I55016150"]}],"countries":["GB","IN"],"is_corresponding":false,"raw_author_name":"Shalu","raw_affiliation_strings":["London Metropolitan University, London, UK","Manav Rachna University Faridabad, Delhi, India"],"affiliations":[{"raw_affiliation_string":"London Metropolitan University, London, UK","institution_ids":["https://openalex.org/I126193024"]},{"raw_affiliation_string":"Manav Rachna University Faridabad, Delhi, India","institution_ids":["https://openalex.org/I55016150"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069716592","display_name":"Sheetal Kaushik","orcid":"https://orcid.org/0000-0001-6521-4075"},"institutions":[{"id":"https://openalex.org/I4210089240","display_name":"Shanti Business School","ror":"https://ror.org/006hdqg38","country_code":"IN","type":"education","lineage":["https://openalex.org/I4210089240"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sheetal Kaushik","raw_affiliation_strings":["Department of Computer Applications, Shanti Business School, Ahmedabad, Gujarat, 380058, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Applications, Shanti Business School, Ahmedabad, Gujarat, 380058, India","institution_ids":["https://openalex.org/I4210089240"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5133340968","display_name":"Shubham Vyas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shubham Vyas","raw_affiliation_strings":["Amity Institute of Information Technology, Amity University Haryana, Gwaliar, Haryana, 122413, India"],"affiliations":[{"raw_affiliation_string":"Amity Institute of Information Technology, Amity University Haryana, Gwaliar, Haryana, 122413, India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065409919","display_name":"Mohd Anas Khan","orcid":null},"institutions":[{"id":"https://openalex.org/I152429107","display_name":"Jawaharlal Nehru University","ror":"https://ror.org/0567v8t28","country_code":"IN","type":"education","lineage":["https://openalex.org/I152429107"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Mohd Anas Khan","raw_affiliation_strings":["School of Engineering, Jawaharlal Nehru University, New Delhi, 110067, India"],"affiliations":[{"raw_affiliation_string":"School of Engineering, Jawaharlal Nehru University, New Delhi, 110067, India","institution_ids":["https://openalex.org/I152429107"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121769958","display_name":"Ali Ahmadian","orcid":null},"institutions":[{"id":"https://openalex.org/I885383172","display_name":"National University of Malaysia","ror":"https://ror.org/00bw8d226","country_code":"MY","type":"education","lineage":["https://openalex.org/I885383172"]},{"id":"https://openalex.org/I96268669","display_name":"Okan University","ror":"https://ror.org/054d5vq03","country_code":"TR","type":"education","lineage":["https://openalex.org/I96268669"]}],"countries":["MY","TR"],"is_corresponding":true,"raw_author_name":"Ali Ahmadian","raw_affiliation_strings":["Faculty of Engineering and Natural Sciences, Istanbul Okan University, Istanbul, Turkey","Institute of Visual Informatics, Universiti Kebangsaan Malaysia (UKM), Selangor, 43600,  Bangi, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Natural Sciences, Istanbul Okan University, Istanbul, Turkey","institution_ids":["https://openalex.org/I96268669"]},{"raw_affiliation_string":"Institute of Visual Informatics, Universiti Kebangsaan Malaysia (UKM), Selangor, 43600,  Bangi, Malaysia","institution_ids":["https://openalex.org/I885383172"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5121769958"],"corresponding_institution_ids":["https://openalex.org/I885383172","https://openalex.org/I96268669"],"apc_list":{"value":2790,"currency":"EUR","value_usd":3590},"apc_paid":{"value":2790,"currency":"EUR","value_usd":3590},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.91280488,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":null,"biblio":{"volume":"19","issue":"3","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.7875999808311462,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.7875999808311462,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.07320000231266022,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.07119999825954437,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7422999739646912},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5548999905586243},{"id":"https://openalex.org/keywords/efficient-energy-use","display_name":"Efficient energy use","score":0.40799999237060547},{"id":"https://openalex.org/keywords/beacon","display_name":"Beacon","score":0.40459999442100525},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.397599995136261},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.36820000410079956},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.36469998955726624},{"id":"https://openalex.org/keywords/logarithm","display_name":"Logarithm","score":0.36340001225471497},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.3506999909877777}],"concepts":[{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7422999739646912},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5949000120162964},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5548999905586243},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.439300000667572},{"id":"https://openalex.org/C2742236","wikidata":"https://www.wikidata.org/wiki/Q924713","display_name":"Efficient energy use","level":2,"score":0.40799999237060547},{"id":"https://openalex.org/C102168758","wikidata":"https://www.wikidata.org/wiki/Q7321258","display_name":"Beacon","level":2,"score":0.40459999442100525},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.397599995136261},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.36820000410079956},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3659000098705292},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.36469998955726624},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.36340001225471497},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.3506999909877777},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.34950000047683716},{"id":"https://openalex.org/C46686674","wikidata":"https://www.wikidata.org/wiki/Q466303","display_name":"Boosting (machine learning)","level":2,"score":0.32409998774528503},{"id":"https://openalex.org/C85617194","wikidata":"https://www.wikidata.org/wiki/Q2072794","display_name":"Particle swarm optimization","level":2,"score":0.32280001044273376},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.3111000061035156},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.30640000104904175},{"id":"https://openalex.org/C48105269","wikidata":"https://www.wikidata.org/wiki/Q1141160","display_name":"Header","level":2,"score":0.29840001463890076},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29820001125335693},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.29190000891685486},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.29109999537467957},{"id":"https://openalex.org/C155512373","wikidata":"https://www.wikidata.org/wiki/Q287450","display_name":"Residual","level":2,"score":0.2865999937057495},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28619998693466187},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2773999869823456},{"id":"https://openalex.org/C164866538","wikidata":"https://www.wikidata.org/wiki/Q367351","display_name":"Cluster (spacecraft)","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C82578977","wikidata":"https://www.wikidata.org/wiki/Q16773055","display_name":"Data aggregator","level":3,"score":0.26840001344680786},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.2533000111579895},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.25130000710487366}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s12083-026-02222-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12083-026-02222-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12083-026-02222-w.pdf","source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},{"id":"pmh:oai:repository.londonmet.ac.uk:11420","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400140","display_name":"London Met Repository (London Metropolitan University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I126193024","host_organization_name":"London Metropolitan University","host_organization_lineage":["https://openalex.org/I126193024"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"doi:10.1007/s12083-026-02222-w","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s12083-026-02222-w","pdf_url":"https://link.springer.com/content/pdf/10.1007/s12083-026-02222-w.pdf","source":{"id":"https://openalex.org/S177487720","display_name":"Peer-to-Peer Networking and Applications","issn_l":"1936-6442","issn":["1936-6442","1936-6450"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Peer-to-Peer Networking and Applications","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/7","score":0.6537894010543823,"display_name":"Affordable and clean energy"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7153013137.pdf","grobid_xml":"https://content.openalex.org/works/W7153013137.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W1997023312","https://openalex.org/W2118419698","https://openalex.org/W2160092409","https://openalex.org/W2560444018","https://openalex.org/W2586561049","https://openalex.org/W2904964577","https://openalex.org/W2972233456","https://openalex.org/W2995851867","https://openalex.org/W2998519605","https://openalex.org/W2999733746","https://openalex.org/W3000659744","https://openalex.org/W3021649193","https://openalex.org/W3026196198","https://openalex.org/W3044251871","https://openalex.org/W3045505722","https://openalex.org/W3080639904","https://openalex.org/W3120609170","https://openalex.org/W3180114603","https://openalex.org/W4285137681","https://openalex.org/W4306705805","https://openalex.org/W4315465180","https://openalex.org/W4318999387","https://openalex.org/W4322739659","https://openalex.org/W4322743859","https://openalex.org/W4328118455","https://openalex.org/W4365505756","https://openalex.org/W4382049493","https://openalex.org/W4383069985","https://openalex.org/W4385552039","https://openalex.org/W4385877232","https://openalex.org/W4385986611","https://openalex.org/W4386220302","https://openalex.org/W4388419884","https://openalex.org/W4389609686","https://openalex.org/W4389777920","https://openalex.org/W4390610500","https://openalex.org/W4391136780","https://openalex.org/W4391837232","https://openalex.org/W4392241646","https://openalex.org/W4393140314","https://openalex.org/W4396514580","https://openalex.org/W4399994563","https://openalex.org/W4401201303","https://openalex.org/W4402003155","https://openalex.org/W4402891386","https://openalex.org/W4403557311","https://openalex.org/W4407940202","https://openalex.org/W4412630559","https://openalex.org/W4413380461"],"related_works":[],"abstract_inverted_index":{"Trust":[0],"between":[1,190],"sensor":[2,56,183,227],"nodes":[3,57,109,228,290,371,379],"is":[4,127,186,229,349,404,450],"very":[5],"essential":[6],"to":[7,24,51,76,139,147,188,208,307,320,324,330,336,355,364,412,433,438],"improve":[8],"security,":[9],"dependability,":[10],"energy":[11,67,206,448],"efficiency,":[12],"scalability,":[13],"and":[14,27,53,58,79,93,137,159,176,192,205,219,276,278,291,311,326,342,393,399,414,427,467,474],"cooperation":[15,26],"in":[16,33,65,332,351,409,442],"Industrial":[17],"Wireless":[18],"Sensor":[19],"Networks":[20],"(IWSNs).":[21],"In":[22,163],"order":[23],"enhance":[25],"security":[28,314],"on":[29,104,129,179,231],"a":[30,37,114,125,215,245,251,407],"large":[31],"scale":[32],"IWSNs,":[34,316],"we":[35],"suggest":[36],"Trust-based":[38],"Integrated":[39],"Techniques":[40],"for":[41],"Anomaly":[42],"Neutralization":[43],"(TITAN),":[44],"where":[45],"unequal":[46],"clustering":[47,63],"can":[48],"be":[49,321],"used":[50],"detect":[52],"shrink":[54],"unacceptable":[55],"save":[59],"resources.":[60],"Disparate":[61],"strategic":[62],"helps":[64],"boosting":[66],"efficiency":[68],"through":[69,113],"the":[70,77,83,87,98,105,108,111,140,180,239,248,257,260,292,308,346,366,369,377,400,429,443,447,457,465],"creation":[71],"of":[72,91,97,107,124,174,182,200,226,233,241,262,294,303,315,368,424,459,469],"smaller":[73],"clusters":[74,99],"close":[75],"sink":[78],"larger":[80,246],"ones":[81],"at":[82],"distances,":[84],"therefore":[85],"encouraging":[86],"more":[88,439],"tolerable":[89],"distribution":[90,173],"power":[92],"communication":[94,201,338],"encumbrance.":[95],"Heads":[96],"are":[100,380],"dynamically":[101],"selected":[102],"depending":[103],"fitness":[106,123],"within":[110],"cluster":[112],"new":[115],"Optimal":[116],"Cluster":[117],"Representative":[118],"Election":[119],"Algorithm":[120],"(OCREA).":[121],"The":[122,301,395],"node":[126,258],"based":[128,178],"its":[130,337,352],"residual":[131],"power,":[132],"connection":[133],"quality,":[134],"signal":[135],"strength":[136,466],"distance":[138],"sink.":[141],"TITAN":[142,165,213,273,362,417,470],"applies":[143,166],"distributed":[144],"intra-cluster":[145],"trust":[146,157,161,171,211,280,295,340],"make":[148],"decisions":[149],"combining":[150],"with":[151,270,359,372,406],"centralized":[152],"inter-cluster":[153],"methodologies,":[154],"merging":[155],"attack-resistant":[156],"evaluations":[158],"effective":[160],"aggregation.":[162],"addition,":[164],"an":[167,298],"appealing":[168],"dynamic":[169,216],"logarithmic":[170,252],"fund":[172],"rewards":[175],"sanctions":[177],"actions":[181],"nodes,":[184,345],"it":[185,196,283],"possible":[187],"distinguish":[189],"reliable":[191,277],"faulty":[193],"nodes.":[194,272],"Also,":[195,446],"includes":[197],"key":[198],"indicators":[199],"trust,":[202,204],"data":[203],"measurement":[207],"allow":[209],"proper":[210],"measurement.":[212],"considers":[214],"aging":[217],"factor":[218],"damping":[220],"factor,":[221],"which":[222,317],"ensures":[223],"that":[224,255,455],"reliability":[225],"considered":[230],"account":[232],"recent":[234],"exchanges,":[235],"and,":[236],"therefore,":[237],"minimizing":[238],"influence":[240],"old":[242],"information.":[243],"To":[244],"extent,":[247],"model":[249],"incorporates":[250,284],"penalty":[253],"term":[254],"punishes":[256],"when":[259,376],"rate":[261,398,403],"unsuccessful":[263],"interactions":[264],"goes":[265],"up":[266],"hence":[267],"effectively":[268],"isolating":[269],"untrustworthy":[271],"enhances":[274],"better":[275,322,386],"robust":[279],"assessment":[281],"as":[282,391,436],"feedback":[285],"provided":[286],"by":[287,452],"trustworthy":[288],"neighbor\u2019s":[289],"manipulation":[293],"levels":[296],"using":[297],"extensive":[299,360],"analysis.":[300],"combination":[302],"these":[304],"features":[305],"contributes":[306],"overall":[309],"performance":[310,473],"improves":[312],"it\u2019s":[313],"enables":[318],"them":[319],"resistant":[323],"attacks":[325],"use":[327],"less":[328,381],"resource":[329],"run":[331],"resource-constrained":[333],"environments.":[334],"Due":[335],"overhead,":[339],"evaluation":[341],"detected":[343],"malicious":[344,370,378],"solution":[347],"proposed":[348],"superior":[350],"capabilities":[353],"compared":[354,437],"other":[356],"solutions":[357],"authenticated":[358],"simulations.":[361],"manages":[363],"recognize":[365],"presence":[367],"87":[373],"percent":[374],"even":[375],"than":[382,387,440],"60":[383,441],"percent,":[384],"meaningfully":[385],"such":[388],"comparative":[389],"models":[390],"SDTS":[392],"DTMS.":[394],"positive":[396],"error":[397,402],"negative":[401],"minimized":[405],"precision":[408],"detection":[410],"increased":[411],"9%":[413],"6%":[415],"respectively.":[416],"also":[418],"maintains":[419],"high":[420],"packets":[421],"delivery":[422],"ratio":[423],"above":[425],"89%":[426],"reduced":[428],"average":[430],"packet":[431],"loss":[432],"only":[434],"36":[435],"baseline":[444],"schemes.":[445],"consumption":[449],"lowered":[451],"about":[453],"14%":[454],"confirms":[456],"effectiveness":[458],"TITAN.":[460],"These":[461],"findings":[462],"all":[463],"indicate":[464],"scalability":[468],"Energy-constrained":[471],"environment":[472],"threat-prone":[475],"IWSN":[476],"environments":[477],"performance.":[478]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2026-04-11T00:00:00"}
