{"id":"https://openalex.org/W4310793438","doi":"https://doi.org/10.1109/wincom55661.2022.9966466","title":"TTIDS : A Time-Driven Trust Based Intrusion Detection System for IoT Networks","display_name":"TTIDS : A Time-Driven Trust Based Intrusion Detection System for IoT Networks","publication_year":2022,"publication_date":"2022-10-26","ids":{"openalex":"https://openalex.org/W4310793438","doi":"https://doi.org/10.1109/wincom55661.2022.9966466"},"language":"en","primary_location":{"id":"doi:10.1109/wincom55661.2022.9966466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom55661.2022.9966466","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012613254","display_name":"Mouad Choukhairi","orcid":"https://orcid.org/0009-0000-8971-009X"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Mouad Choukhairi","raw_affiliation_strings":["Ibn Tofail University,LARI,Department of Computer Science,Kenitra,Morocco","Department of Computer Science, LARI, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,LARI,Department of Computer Science,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"Department of Computer Science, LARI, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089704230","display_name":"Youssef Fakhri","orcid":"https://orcid.org/0000-0002-5647-303X"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Youssef Fakhri","raw_affiliation_strings":["Ibn Tofail University,LARI,Department of Computer Science,Kenitra,Morocco","Department of Computer Science, LARI, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,LARI,Department of Computer Science,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"Department of Computer Science, LARI, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052978980","display_name":"Mohamed Amnai","orcid":"https://orcid.org/0000-0002-2139-0824"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohamed Amnai","raw_affiliation_strings":["Ibn Tofail University,LARI,Department of Computer Science,Kenitra,Morocco","Department of Computer Science, LARI, Ibn Tofail University, Kenitra, Morocco"],"affiliations":[{"raw_affiliation_string":"Ibn Tofail University,LARI,Department of Computer Science,Kenitra,Morocco","institution_ids":["https://openalex.org/I3121676899"]},{"raw_affiliation_string":"Department of Computer Science, LARI, Ibn Tofail University, Kenitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012613254"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":0.142,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.50699743,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8171926736831665},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6595644950866699},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.6592088937759399},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6308428049087524},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.630131185054779},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5830020904541016},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.5712892413139343},{"id":"https://openalex.org/keywords/energy-consumption","display_name":"Energy consumption","score":0.5386497974395752},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4866195619106293},{"id":"https://openalex.org/keywords/sort","display_name":"sort","score":0.48626673221588135},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4653421640396118},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4284132122993469},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3934589922428131},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3337614834308624},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11820414662361145}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8171926736831665},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6595644950866699},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.6592088937759399},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6308428049087524},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.630131185054779},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5830020904541016},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.5712892413139343},{"id":"https://openalex.org/C2780165032","wikidata":"https://www.wikidata.org/wiki/Q16869822","display_name":"Energy consumption","level":2,"score":0.5386497974395752},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4866195619106293},{"id":"https://openalex.org/C88548561","wikidata":"https://www.wikidata.org/wiki/Q347599","display_name":"sort","level":2,"score":0.48626673221588135},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4653421640396118},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4284132122993469},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3934589922428131},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3337614834308624},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11820414662361145},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/wincom55661.2022.9966466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/wincom55661.2022.9966466","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 9th International Conference on Wireless Networks and Mobile Communications (WINCOM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","score":0.8999999761581421,"id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1972012147","https://openalex.org/W1973378923","https://openalex.org/W1976262362","https://openalex.org/W1985231046","https://openalex.org/W1997404295","https://openalex.org/W2018911484","https://openalex.org/W2026609766","https://openalex.org/W2085647245","https://openalex.org/W2096059127","https://openalex.org/W2097726984","https://openalex.org/W2110689325","https://openalex.org/W2111619626","https://openalex.org/W2119046642","https://openalex.org/W2128953308","https://openalex.org/W2138252894","https://openalex.org/W2154189239","https://openalex.org/W2155908598","https://openalex.org/W2156937700","https://openalex.org/W2217512864","https://openalex.org/W2325877089","https://openalex.org/W2479071993","https://openalex.org/W2521425361","https://openalex.org/W2542747939","https://openalex.org/W2555705884","https://openalex.org/W2604778462","https://openalex.org/W2613257643","https://openalex.org/W2613741294","https://openalex.org/W2626923231","https://openalex.org/W2738412532","https://openalex.org/W2779732796","https://openalex.org/W2923477440","https://openalex.org/W3006589602","https://openalex.org/W6653467504","https://openalex.org/W6688741434","https://openalex.org/W6730074421"],"related_works":["https://openalex.org/W2033347526","https://openalex.org/W2588358127","https://openalex.org/W2154478511","https://openalex.org/W4234451713","https://openalex.org/W2061699822","https://openalex.org/W2521264178","https://openalex.org/W3099995967","https://openalex.org/W3037906321","https://openalex.org/W2563040182","https://openalex.org/W4327926374"],"abstract_inverted_index":{"Consumers":[0],"are":[1,35,117],"increasingly":[2],"adopting":[3],"multiple":[4],"smart":[5],"\u201cthings\u201d":[6],"connected":[7],"via":[8],"the":[9,22,26,70,83,101,111,153,159,174],"Internet,":[10],"such":[11],"as":[12,67,69,173],"home":[13],"appliances,":[14],"vehicles,":[15],"and":[16,44,72,77,106,152,156],"mobile":[17],"medical":[18],"equipment,":[19],"due":[20,109],"to":[21,57,61,87,99,110,176],"rapid":[23],"growth":[24],"of":[25,28,32,79,85,113,141,145,158],"Internet":[27],"Things":[29],"(IoT).":[30],"Many":[31],"these":[33,80,114],"connections":[34],"made":[36],"possible":[37],"by":[38],"IPv6":[39],"Routing":[40],"Protocol":[41],"for":[42,134],"Low-Power":[43],"Lossy":[45],"Networks":[46],"(RPL),":[47],"a":[48,59,95],"distance":[49],"vector":[50],"routing":[51],"protocol":[52],"used":[53],"in":[54,138],"IoT":[55,102],"networks":[56],"build":[58],"route":[60],"send":[62],"packets.":[63],"The":[64,143],"diverse":[65],"nature,":[66],"well":[68],"limitations":[71,112],"constraints":[73],"(Low":[74],"energy,":[75],"memory,":[76],"storage)":[78],"objects,":[81],"drive":[82],"development":[84],"techniques":[86],"ensure":[88],"their":[89],"safety":[90],"from":[91],"malicious":[92],"attacks.":[93],"As":[94],"result,":[96],"various":[97],"approaches":[98],"protect":[100],"have":[103],"been":[104],"designed":[105],"developed,":[107],"however":[108],"methods,":[115],"they":[116],"still":[118],"insufficient.":[119],"In":[120],"this":[121,139],"paper":[122],"an":[123],"Intrusion":[124],"Detection":[125],"System":[126],"(IDS),":[127],"based":[128],"on":[129],"trust":[130],"mechanism,":[131],"was":[132],"proposed":[133],"detecting":[135],"topology":[136],"attacks":[137],"sort":[140],"environment.":[142],"number":[144],"identified":[146],"nodes,":[147],"energy":[148],"consumption,":[149],"memory":[150],"utilization":[151],"detection":[154],"time":[155],"rate":[157],"IDS":[160],"were":[161],"all":[162],"taken":[163],"into":[164],"consideration":[165],"when":[166],"evaluating":[167],"it.":[168],"We":[169],"chose":[170],"Cooja":[171],"software":[172],"simulator":[175],"accomplish":[177],"this.":[178]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
