{"id":"https://openalex.org/W4385236866","doi":"https://doi.org/10.1109/eit57321.2023.10187278","title":"Towards Blockchain-based Adaptive Trust Management in Wireless Sensor Networks","display_name":"Towards Blockchain-based Adaptive Trust Management in Wireless Sensor Networks","publication_year":2023,"publication_date":"2023-05-18","ids":{"openalex":"https://openalex.org/W4385236866","doi":"https://doi.org/10.1109/eit57321.2023.10187278"},"language":"en","primary_location":{"id":"doi:10.1109/eit57321.2023.10187278","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit57321.2023.10187278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029165876","display_name":"Shereen Ismail","orcid":"https://orcid.org/0000-0001-8580-1648"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Shereen Ismail","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of North Dakota,ND,USA,58202"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of North Dakota,ND,USA,58202","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059506565","display_name":"Diana W. Dawoud","orcid":"https://orcid.org/0000-0002-4777-2134"},"institutions":[{"id":"https://openalex.org/I132806614","display_name":"University of Dubai","ror":"https://ror.org/05h0z7c09","country_code":"AE","type":"education","lineage":["https://openalex.org/I132806614"]},{"id":"https://openalex.org/I1323252656","display_name":"Information Technology University","ror":"https://ror.org/00ngv8j44","country_code":"PK","type":"education","lineage":["https://openalex.org/I1323252656"]}],"countries":["AE","PK"],"is_corresponding":false,"raw_author_name":"Diana W. Dawoud","raw_affiliation_strings":["College of Engineering and Information Technology, University of Dubai,Dubai,UAE","College of Engineering and Information Technology, University of Dubai, Dubai, UAE"],"affiliations":[{"raw_affiliation_string":"College of Engineering and Information Technology, University of Dubai,Dubai,UAE","institution_ids":["https://openalex.org/I132806614","https://openalex.org/I1323252656"]},{"raw_affiliation_string":"College of Engineering and Information Technology, University of Dubai, Dubai, UAE","institution_ids":["https://openalex.org/I132806614","https://openalex.org/I1323252656"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092537885","display_name":"Tamara Al-Zyoud","orcid":null},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Tamara Al-Zyoud","raw_affiliation_strings":["University of Jordan,Department of Computer Engineering,Amman,Jordan,11942"],"affiliations":[{"raw_affiliation_string":"University of Jordan,Department of Computer Engineering,Amman,Jordan,11942","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064528963","display_name":"Hassan Reza","orcid":"https://orcid.org/0000-0002-7593-9624"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hassan Reza","raw_affiliation_strings":["School of Electrical Engineering and Computer Science, University of North Dakota,ND,USA,58202"],"affiliations":[{"raw_affiliation_string":"School of Electrical Engineering and Computer Science, University of North Dakota,ND,USA,58202","institution_ids":["https://openalex.org/I24571045"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5029165876"],"corresponding_institution_ids":["https://openalex.org/I24571045"],"apc_list":null,"apc_paid":null,"fwci":2.2944,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.90323074,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"163","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9830999970436096,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.82793128490448},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7911578416824341},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7215964794158936},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6742963790893555},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.6553053855895996},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6316486597061157},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5361108183860779},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4840471148490906},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.4464176595211029},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3770827054977417},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.3007652461528778},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10129132866859436}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.82793128490448},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7911578416824341},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7215964794158936},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6742963790893555},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.6553053855895996},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6316486597061157},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5361108183860779},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4840471148490906},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.4464176595211029},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3770827054977417},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.3007652461528778},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10129132866859436},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/eit57321.2023.10187278","is_oa":false,"landing_page_url":"https://doi.org/10.1109/eit57321.2023.10187278","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Electro Information Technology (eIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1971536490","https://openalex.org/W2008337238","https://openalex.org/W2020372320","https://openalex.org/W2149525424","https://openalex.org/W2523327726","https://openalex.org/W2622349292","https://openalex.org/W2804867869","https://openalex.org/W2915872201","https://openalex.org/W2920852263","https://openalex.org/W3128699734","https://openalex.org/W3129682923","https://openalex.org/W3158284639","https://openalex.org/W3165778968","https://openalex.org/W3200032784","https://openalex.org/W4206769398","https://openalex.org/W4281632831","https://openalex.org/W4285407529","https://openalex.org/W6739005891"],"related_works":["https://openalex.org/W4210406818","https://openalex.org/W4306779889","https://openalex.org/W4386732777","https://openalex.org/W3211706803","https://openalex.org/W4382775358","https://openalex.org/W4246942721","https://openalex.org/W3209862047","https://openalex.org/W4304136894","https://openalex.org/W2989851257","https://openalex.org/W2799059781"],"abstract_inverted_index":{"Blockchain":[0],"is":[1,74,116,159],"an":[2],"emerging":[3],"technology":[4],"that":[5,82,101],"can":[6,56],"be":[7,57],"utilized":[8],"to":[9,36,47,76,118,161],"enhance":[10],"Wireless":[11],"Sensor":[12],"Networks":[13],"(WSNs)":[14],"security":[15],"level":[16],"in":[17,29],"various":[18],"Internet":[19],"of":[20,27,50,86,89,109,122,137],"Things":[21],"(IoT)":[22],"applications.":[23],"However,":[24],"the":[25,37,53,65,84,107,120,131],"implementation":[26],"blockchain":[28],"WSNs":[30,44],"remains":[31],"a":[32,78,94,135],"challenging":[33],"task":[34],"due":[35],"high":[38],"demands":[39],"for":[40],"processing":[41],"and":[42,52,105,153,166],"communication.":[43],"are":[45,64],"prone":[46],"different":[48],"types":[49],"cyber-attacks":[51,165],"sensor":[54,124,170],"nodes":[55],"compromised":[58],"or":[59],"become":[60],"unreliable":[61],"as":[62,141],"they":[63],"primary":[66],"data":[67],"sources.":[68],"To":[69],"address":[70],"this":[71],"issue,":[72],"it":[73],"crucial":[75],"incorporate":[77],"blockchain-based":[79,96],"trust":[80,98,104,113],"mechanism":[81,100,158],"guarantees":[83],"selection":[85],"trusted":[87],"sources":[88],"data-gathering.":[90],"This":[91],"paper":[92],"proposes":[93],"lightweight":[95],"adaptive":[97],"management":[99],"maintains":[102],"nodes'":[103],"facilitates":[106],"identification":[108],"malicious":[110],"nodes.":[111,171],"A":[112],"smart":[114],"contract":[115],"introduced":[117],"evaluate":[119],"trustworthiness":[121,168],"each":[123],"node":[125,142],"based":[126],"on":[127],"its":[128],"behavior":[129],"during":[130],"network":[132],"operation":[133],"using":[134],"set":[136],"assessment":[138],"metrics":[139],"such":[140],"status,":[143],"Transmitted":[144],"Signal":[145],"Strength,":[146],"Packet":[147,150],"Sending":[148],"Rate,":[149,152],"Forwarding":[151,154],"Delay.":[155],"The":[156],"proposed":[157],"shown":[160],"help":[162],"mitigate":[163],"potential":[164],"maintain":[167],"among":[169]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
