{"id":"https://openalex.org/W2119276331","doi":"https://doi.org/10.1109/glocom.2009.5425782","title":"A Trust Management Scheme for Enhancing Security in Pervasive Wireless Networks","display_name":"A Trust Management Scheme for Enhancing Security in Pervasive Wireless Networks","publication_year":2009,"publication_date":"2009-11-01","ids":{"openalex":"https://openalex.org/W2119276331","doi":"https://doi.org/10.1109/glocom.2009.5425782","mag":"2119276331"},"language":"en","primary_location":{"id":"doi:10.1109/glocom.2009.5425782","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2009.5425782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110052330","display_name":"Mieso K. Denko","orcid":null},"institutions":[{"id":"https://openalex.org/I79817857","display_name":"University of Guelph","ror":"https://ror.org/01r7awg59","country_code":"CA","type":"education","lineage":["https://openalex.org/I79817857"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Mieso K. Denko","raw_affiliation_strings":["Department of Computing and Information Science, University of Guelph, Guelph, Canada","[University of Guelph, Guelph, Canada]"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Information Science, University of Guelph, Guelph, Canada","institution_ids":["https://openalex.org/I79817857"]},{"raw_affiliation_string":"[University of Guelph, Guelph, Canada]","institution_ids":["https://openalex.org/I79817857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109303607","display_name":"Tao Sun","orcid":"https://orcid.org/0009-0009-8565-2545"},"institutions":[{"id":"https://openalex.org/I79817857","display_name":"University of Guelph","ror":"https://ror.org/01r7awg59","country_code":"CA","type":"education","lineage":["https://openalex.org/I79817857"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Tao Sun","raw_affiliation_strings":["Department of Computing and Information Science, University of Guelph, Guelph, Canada","[University of Guelph, Guelph, Canada]"],"affiliations":[{"raw_affiliation_string":"Department of Computing and Information Science, University of Guelph, Guelph, Canada","institution_ids":["https://openalex.org/I79817857"]},{"raw_affiliation_string":"[University of Guelph, Guelph, Canada]","institution_ids":["https://openalex.org/I79817857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058166217","display_name":"Isaac Woungang","orcid":"https://orcid.org/0000-0003-2484-4649"},"institutions":[{"id":"https://openalex.org/I530967","display_name":"Toronto Metropolitan University","ror":"https://ror.org/05g13zd79","country_code":"CA","type":"education","lineage":["https://openalex.org/I530967"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Isaac Woungang","raw_affiliation_strings":["Department of Computer Science, Ryerson University, Toronto, Canada","Ryerson University  Toronto Canada"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Ryerson University, Toronto, Canada","institution_ids":["https://openalex.org/I530967"]},{"raw_affiliation_string":"Ryerson University  Toronto Canada","institution_ids":["https://openalex.org/I530967"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5076776322","display_name":"Joel J. P. C. Rodrigues","orcid":"https://orcid.org/0000-0001-8657-3800"},"institutions":[{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]},{"id":"https://openalex.org/I161321875","display_name":"University of Beira Interior","ror":"https://ror.org/03nf36p02","country_code":"PT","type":"education","lineage":["https://openalex.org/I161321875"]}],"countries":["PT"],"is_corresponding":false,"raw_author_name":"Joel J. P. C. Rodrigues","raw_affiliation_strings":["Instituto de Telecomunica\u00e7\u00f5es, University of Beira Interior, Covilhaa, Portugal","University of Beira Interior, Covilh\u00e3, Portugal"],"affiliations":[{"raw_affiliation_string":"Instituto de Telecomunica\u00e7\u00f5es, University of Beira Interior, Covilhaa, Portugal","institution_ids":["https://openalex.org/I161321875","https://openalex.org/I4210120471"]},{"raw_affiliation_string":"University of Beira Interior, Covilh\u00e3, Portugal","institution_ids":["https://openalex.org/I161321875"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102824651","display_name":"Han\u2010Chieh Chao","orcid":"https://orcid.org/0000-0003-3222-1708"},"institutions":[{"id":"https://openalex.org/I75430998","display_name":"National Ilan University","ror":"https://ror.org/01npf0s58","country_code":"TW","type":"education","lineage":["https://openalex.org/I75430998"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Han-Chieh Chao","raw_affiliation_strings":["College of Electrical Engineering and Computer Science, National I-Lan University, I-Lan, Taiwan","National I-Lan University, I-Lan, Taiwan#TAB#"],"affiliations":[{"raw_affiliation_string":"College of Electrical Engineering and Computer Science, National I-Lan University, I-Lan, Taiwan","institution_ids":["https://openalex.org/I75430998"]},{"raw_affiliation_string":"National I-Lan University, I-Lan, Taiwan#TAB#","institution_ids":["https://openalex.org/I75430998"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5110052330"],"corresponding_institution_ids":["https://openalex.org/I79817857"],"apc_list":null,"apc_paid":null,"fwci":1.0285,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.78998688,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"3986","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7987582683563232},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.7282009124755859},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7162995934486389},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6506632566452026},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.6069287657737732},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5824390649795532},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.5821648836135864},{"id":"https://openalex.org/keywords/ubiquitous-computing","display_name":"Ubiquitous computing","score":0.5776011943817139},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.5687945485115051},{"id":"https://openalex.org/keywords/performance-metric","display_name":"Performance metric","score":0.49912118911743164},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4980506896972656},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.44218575954437256},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.44056257605552673},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38528522849082947},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.13589367270469666},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0829671323299408}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7987582683563232},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.7282009124755859},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7162995934486389},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6506632566452026},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.6069287657737732},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5824390649795532},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.5821648836135864},{"id":"https://openalex.org/C172195944","wikidata":"https://www.wikidata.org/wiki/Q541265","display_name":"Ubiquitous computing","level":2,"score":0.5776011943817139},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.5687945485115051},{"id":"https://openalex.org/C2780898871","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Performance metric","level":2,"score":0.49912118911743164},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4980506896972656},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.44218575954437256},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.44056257605552673},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38528522849082947},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.13589367270469666},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0829671323299408},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/glocom.2009.5425782","is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2009.5425782","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W47332856","https://openalex.org/W2026155725","https://openalex.org/W2076805781","https://openalex.org/W2081191534","https://openalex.org/W2109001163","https://openalex.org/W2112358122","https://openalex.org/W2113035975","https://openalex.org/W2118899955","https://openalex.org/W2130627031","https://openalex.org/W2130719936","https://openalex.org/W2162760237","https://openalex.org/W2163231058","https://openalex.org/W2163979071","https://openalex.org/W2168856501","https://openalex.org/W2501849041","https://openalex.org/W2743567326","https://openalex.org/W6601880674","https://openalex.org/W6676384928","https://openalex.org/W6683965424","https://openalex.org/W6684072568","https://openalex.org/W6742135294"],"related_works":["https://openalex.org/W4244076636","https://openalex.org/W2399184610","https://openalex.org/W4230176027","https://openalex.org/W2916277247","https://openalex.org/W2117806953","https://openalex.org/W1978647869","https://openalex.org/W2022505847","https://openalex.org/W2121787498","https://openalex.org/W2767823446","https://openalex.org/W2387920645"],"abstract_inverted_index":{"In":[0],"a":[1,80],"pervasive":[2,25,31],"wireless":[3,32],"network,":[4],"malicious":[5],"nodes":[6],"can":[7,27],"initiate":[8],"attacks":[9,40],"to":[10,34,50,74],"well-behaved":[11],"nodes.":[12],"This":[13],"paper":[14],"argues":[15],"that":[16],"our":[17],"recently":[18],"proposed":[19],"probabilistic":[20],"trust":[21],"management":[22],"scheme":[23],"for":[24],"computing":[26],"be":[28],"used":[29,61],"in":[30,79],"networks":[33],"provide":[35],"protection":[36],"against":[37],"few":[38],"typical":[39],"usually":[41],"targeted":[42],"at":[43],"such":[44],"systems.":[45],"Simulation":[46],"experiments":[47],"are":[48],"provided":[49],"assess":[51],"the":[52,55,63,69,75],"achievement":[53],"of":[54,71],"stated":[56],"goal.":[57],"The":[58],"performance":[59],"metric":[60],"is":[62],"average":[64],"packet":[65],"loss":[66],"ratio,":[67],"representing":[68],"ratio":[70],"packets":[72,77],"lost":[73],"total":[76],"generated":[78],"certain":[81],"time":[82],"period.":[83]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
