{"id":"https://openalex.org/W1966928540","doi":"https://doi.org/10.1145/1982185.1982547","title":"Hierarchical trust management for wireless sensor networks and its application to trust-based routing","display_name":"Hierarchical trust management for wireless sensor networks and its application to trust-based routing","publication_year":2011,"publication_date":"2011-03-21","ids":{"openalex":"https://openalex.org/W1966928540","doi":"https://doi.org/10.1145/1982185.1982547","mag":"1966928540"},"language":"en","primary_location":{"id":"doi:10.1145/1982185.1982547","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1982185.1982547","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 ACM Symposium on Applied Computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103188330","display_name":"Fenye Bao","orcid":"https://orcid.org/0000-0002-3156-447X"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fenye Bao","raw_affiliation_strings":["Virginia Tech"],"affiliations":[{"raw_affiliation_string":"Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090682032","display_name":"Ing-Ray Chen","orcid":"https://orcid.org/0000-0003-1657-6728"},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ing-Ray Chen","raw_affiliation_strings":["Virginia Tech"],"affiliations":[{"raw_affiliation_string":"Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032754653","display_name":"Moonjeong Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I859038795","display_name":"Virginia Tech","ror":"https://ror.org/02smfhw86","country_code":"US","type":"education","lineage":["https://openalex.org/I859038795"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Moonjeong Chang","raw_affiliation_strings":["Virginia Tech"],"affiliations":[{"raw_affiliation_string":"Virginia Tech","institution_ids":["https://openalex.org/I859038795"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011649304","display_name":"Jin-Hee Cho","orcid":"https://orcid.org/0000-0002-5908-4662"},"institutions":[{"id":"https://openalex.org/I166416128","display_name":"DEVCOM Army Research Laboratory","ror":"https://ror.org/011hc8f90","country_code":"US","type":"government","lineage":["https://openalex.org/I1304082316","https://openalex.org/I1330347796","https://openalex.org/I166416128","https://openalex.org/I2802705668","https://openalex.org/I4210154437"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jin-Hee Cho","raw_affiliation_strings":["Army Research Laboratory","Army Research :Laboratory"],"affiliations":[{"raw_affiliation_string":"Army Research Laboratory","institution_ids":["https://openalex.org/I166416128"]},{"raw_affiliation_string":"Army Research :Laboratory","institution_ids":["https://openalex.org/I166416128"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103188330"],"corresponding_institution_ids":["https://openalex.org/I859038795"],"apc_list":null,"apc_paid":null,"fwci":2.1925,"has_fulltext":false,"cited_by_count":27,"citation_normalized_percentile":{"value":0.87544799,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1732","last_page":"1738"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8546026945114136},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.7288598418235779},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7139863967895508},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.6732256412506104},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5996776819229126},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5372109413146973},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.524674117565155},{"id":"https://openalex.org/keywords/geographic-routing","display_name":"Geographic routing","score":0.5026116371154785},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.49543893337249756},{"id":"https://openalex.org/keywords/zone-routing-protocol","display_name":"Zone Routing Protocol","score":0.49481362104415894},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4776257872581482},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.46185362339019775},{"id":"https://openalex.org/keywords/wireless-routing-protocol","display_name":"Wireless Routing Protocol","score":0.4568908214569092},{"id":"https://openalex.org/keywords/hierarchical-routing","display_name":"Hierarchical routing","score":0.44308286905288696},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4338243007659912},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.41526585817337036},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.15991005301475525}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8546026945114136},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.7288598418235779},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7139863967895508},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.6732256412506104},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5996776819229126},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5372109413146973},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.524674117565155},{"id":"https://openalex.org/C50558702","wikidata":"https://www.wikidata.org/wiki/Q5535067","display_name":"Geographic routing","level":5,"score":0.5026116371154785},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.49543893337249756},{"id":"https://openalex.org/C189884158","wikidata":"https://www.wikidata.org/wiki/Q8073926","display_name":"Zone Routing Protocol","level":5,"score":0.49481362104415894},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4776257872581482},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.46185362339019775},{"id":"https://openalex.org/C47318570","wikidata":"https://www.wikidata.org/wiki/Q8026863","display_name":"Wireless Routing Protocol","level":4,"score":0.4568908214569092},{"id":"https://openalex.org/C177818476","wikidata":"https://www.wikidata.org/wiki/Q12878103","display_name":"Hierarchical routing","level":5,"score":0.44308286905288696},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4338243007659912},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.41526585817337036},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.15991005301475525},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1982185.1982547","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1982185.1982547","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2011 ACM Symposium on Applied Computing","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.299.4644","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.299.4644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://people.cs.vt.edu/~irchen/ps/Bao-TNSM12a.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.353.106","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.353.106","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://people.cs.vt.edu/~irchen/5214/pdf/Bao-TNSM12.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1587236616","https://openalex.org/W1991027789","https://openalex.org/W2024759950","https://openalex.org/W2034419870","https://openalex.org/W2057644422","https://openalex.org/W2070215238","https://openalex.org/W2086824628","https://openalex.org/W2101963262","https://openalex.org/W2118544495","https://openalex.org/W2123793655","https://openalex.org/W2129849999","https://openalex.org/W2136259338","https://openalex.org/W2155492251","https://openalex.org/W2160092409","https://openalex.org/W2166735950","https://openalex.org/W4242656826","https://openalex.org/W6672579688"],"related_works":["https://openalex.org/W4309395325","https://openalex.org/W613020663","https://openalex.org/W3023444014","https://openalex.org/W1593279778","https://openalex.org/W2397211897","https://openalex.org/W2362732388","https://openalex.org/W2047411873","https://openalex.org/W2152443275","https://openalex.org/W2358140933","https://openalex.org/W4205804648"],"abstract_inverted_index":{"In":[0],"this":[1],"work,":[2,27],"we":[3,28],"propose":[4],"a":[5,45,63,92,176],"highly":[6],"scalable":[7],"cluster-based":[8,55],"hierarchical":[9,56,108],"trust":[10,31,43,50,78,89,99,109,165],"management":[11,79,110],"protocol":[12,84,95,111],"for":[13,58],"wireless":[14],"sensor":[15,46],"networks":[16,38],"to":[17,39,71,112],"effectively":[18],"deal":[19],"with":[20],"selfish":[21],"or":[22],"malicious":[23],"nodes.":[24],"Unlike":[25],"prior":[26],"consider":[29],"multidimensional":[30],"attributes":[32],"derived":[33],"from":[34,101],"communication":[35],"and":[36,144],"social":[37],"evaluate":[40],"the":[41,54,73,76,83,132],"overall":[42],"of":[44,75,94,179],"node.":[47],"Our":[48,119],"peer-to-peer":[49],"evaluation":[51],"method":[52],"leverages":[53],"structure":[57],"efficient":[59],"communications.":[60],"We":[61,81,105],"develop":[62],"probability":[64],"model":[65],"using":[66],"stochastic":[67],"Petri":[68],"net":[69],"techniques":[70],"analyze":[72],"performance":[74,134],"proposed":[77],"protocol.":[80],"validate":[82],"design":[85,128,180],"by":[86,137],"comparing":[87],"subjective":[88],"generated":[90],"as":[91,116],"result":[93],"execution":[96],"against":[97],"objective":[98],"obtained":[100],"actual":[102],"node":[103],"status.":[104],"apply":[106],"our":[107],"trust-based":[113,123],"geographical":[114],"routing":[115,125,139,159],"an":[117],"application.":[118],"results":[120],"demonstrate":[121],"that":[122,161],"geographic":[124,158],"under":[126],"identified":[127],"settings":[129],"can":[130,154],"approach":[131],"ideal":[133],"level":[135],"achievable":[136],"flooding-based":[138],"in":[140,167,171],"message":[141,145,150,172],"delivery":[142,173],"ratio":[143,174],"delay":[146],"without":[147],"incurring":[148],"substantial":[149],"overhead.":[151],"Furthermore,":[152],"it":[153],"significantly":[155],"outperform":[156],"traditional":[157],"protocols":[160],"do":[162],"not":[163],"use":[164],"concept":[166],"selecting":[168],"forwarding":[169],"nodes":[170],"over":[175],"wide":[177],"range":[178],"parameter":[181],"settings.":[182]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
