{"id":"https://openalex.org/W2971604651","doi":"https://doi.org/10.1155/2019/2545129","title":"A Novel Trust Model Based on Node Recovery Technique for WSN","display_name":"A Novel Trust Model Based on Node Recovery Technique for WSN","publication_year":2019,"publication_date":"2019-09-03","ids":{"openalex":"https://openalex.org/W2971604651","doi":"https://doi.org/10.1155/2019/2545129","mag":"2971604651"},"language":"en","primary_location":{"id":"doi:10.1155/2019/2545129","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2019/2545129","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/2545129.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2019/2545129.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020834714","display_name":"Ping Qi","orcid":"https://orcid.org/0000-0001-6049-9729"},"institutions":[{"id":"https://openalex.org/I4210159152","display_name":"Tongling University","ror":"https://ror.org/04kqvjg13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210159152"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ping Qi","raw_affiliation_strings":["Department of Mathematics and Computer Science, Tongling University, Tongling 244061, China","The Institute of Server Computing, Tongling University, Tongling 244061, China"],"raw_orcid":"https://orcid.org/0000-0001-6049-9729","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Tongling University, Tongling 244061, China","institution_ids":["https://openalex.org/I4210159152"]},{"raw_affiliation_string":"The Institute of Server Computing, Tongling University, Tongling 244061, China","institution_ids":["https://openalex.org/I4210159152"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5077558519","display_name":"Fucheng Wang","orcid":"https://orcid.org/0000-0001-9186-3781"},"institutions":[{"id":"https://openalex.org/I4210159152","display_name":"Tongling University","ror":"https://ror.org/04kqvjg13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210159152"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fucheng Wang","raw_affiliation_strings":["Department of Mathematics and Computer Science, Tongling University, Tongling 244061, China"],"raw_orcid":"https://orcid.org/0000-0001-9186-3781","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Tongling University, Tongling 244061, China","institution_ids":["https://openalex.org/I4210159152"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101940401","display_name":"Shu Hong","orcid":"https://orcid.org/0000-0002-5990-6523"},"institutions":[{"id":"https://openalex.org/I4210159152","display_name":"Tongling University","ror":"https://ror.org/04kqvjg13","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210159152"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shu Hong","raw_affiliation_strings":["Department of Mathematics and Computer Science, Tongling University, Tongling 244061, China"],"raw_orcid":"https://orcid.org/0000-0002-5990-6523","affiliations":[{"raw_affiliation_string":"Department of Mathematics and Computer Science, Tongling University, Tongling 244061, China","institution_ids":["https://openalex.org/I4210159152"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101940401"],"corresponding_institution_ids":["https://openalex.org/I4210159152"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.5571,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.70652895,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"2019","issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9642000198364258,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9013640880584717},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.7471365928649902},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.7149035334587097},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6131177544593811},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.6061788201332092},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5402573943138123},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.46364083886146545},{"id":"https://openalex.org/keywords/sensor-node","display_name":"Sensor node","score":0.4629455804824829},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.4568645656108856},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39501795172691345},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3276718854904175},{"id":"https://openalex.org/keywords/key-distribution-in-wireless-sensor-networks","display_name":"Key distribution in wireless sensor networks","score":0.296781450510025},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.26517653465270996},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24764186143875122},{"id":"https://openalex.org/keywords/power","display_name":"Power (physics)","score":0.11310756206512451}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9013640880584717},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.7471365928649902},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7149035334587097},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6131177544593811},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.6061788201332092},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5402573943138123},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.46364083886146545},{"id":"https://openalex.org/C111185680","wikidata":"https://www.wikidata.org/wiki/Q3866206","display_name":"Sensor node","level":5,"score":0.4629455804824829},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.4568645656108856},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39501795172691345},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3276718854904175},{"id":"https://openalex.org/C41971633","wikidata":"https://www.wikidata.org/wiki/Q6398155","display_name":"Key distribution in wireless sensor networks","level":4,"score":0.296781450510025},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.26517653465270996},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24764186143875122},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.11310756206512451},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2019/2545129","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2019/2545129","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/2545129.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:f23aa1c5a7b34739860a6c620164350a","is_oa":true,"landing_page_url":"https://doaj.org/article/f23aa1c5a7b34739860a6c620164350a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2019 (2019)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2019/2545129","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2019/2545129","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2019/2545129","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2019/2545129","pdf_url":"https://downloads.hindawi.com/journals/scn/2019/2545129.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3328561311","display_name":null,"funder_award_id":"61802332","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4308733146","display_name":null,"funder_award_id":"61802332","funder_id":"https://openalex.org/F4320326664","funder_display_name":"Anhui Provincial Department of Education"},{"id":"https://openalex.org/G5761091753","display_name":null,"funder_award_id":"KJ2019A0704","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7357737122","display_name":null,"funder_award_id":"KJ2019A0704","funder_id":"https://openalex.org/F4320326664","funder_display_name":"Anhui Provincial Department of Education"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320326664","display_name":"Anhui Provincial Department of Education","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2971604651.pdf","grobid_xml":"https://content.openalex.org/works/W2971604651.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1525785895","https://openalex.org/W1548042613","https://openalex.org/W1551088129","https://openalex.org/W1871618398","https://openalex.org/W1971237054","https://openalex.org/W1985828090","https://openalex.org/W1994223040","https://openalex.org/W2015294701","https://openalex.org/W2024759950","https://openalex.org/W2028468875","https://openalex.org/W2034419870","https://openalex.org/W2048643145","https://openalex.org/W2057275046","https://openalex.org/W2134596443","https://openalex.org/W2149593381","https://openalex.org/W2296004703","https://openalex.org/W2340515955","https://openalex.org/W2517630295","https://openalex.org/W2775464031","https://openalex.org/W2795539449","https://openalex.org/W2922820438"],"related_works":["https://openalex.org/W2536494564","https://openalex.org/W1977342959","https://openalex.org/W2565425112","https://openalex.org/W2545116705","https://openalex.org/W2148549110","https://openalex.org/W28080522","https://openalex.org/W2525537297","https://openalex.org/W2026087469","https://openalex.org/W145760256","https://openalex.org/W2166724027"],"abstract_inverted_index":{"With":[0],"the":[1,53,76,80,86,91,95,124,154,157],"rapid":[2],"development":[3],"of":[4,32,59,79,126,160],"sensor":[5,12,33,60],"technology":[6],"and":[7,23,41,56,72,104,108,156],"wireless":[8,11],"network":[9,13],"technology,":[10],"(WSN)":[14],"has":[15],"been":[16],"widely":[17],"applied":[18],"in":[19,35],"many":[20],"resource-constrained":[21],"environments":[22],"application":[24],"scenarios.":[25],"As":[26],"there":[27],"are":[28,39,64],"a":[29,43,109],"large":[30],"number":[31],"nodes":[34],"WSN,":[36],"node":[37,62,115,147],"failures":[38,63,71],"inevitable":[40],"have":[42],"significant":[44],"impact":[45],"on":[46,114,146],"task":[47,129],"execution.":[48,130],"In":[49],"this":[50],"paper,":[51],"considering":[52],"vulnerability,":[54],"unreliability,":[55],"dynamic":[57],"characteristics":[58],"nodes,":[61],"classified":[65],"into":[66],"two":[67],"categories":[68],"including":[69],"unrecoverable":[70],"recoverable":[73],"failures.":[74],"Then,":[75],"traditional":[77],"description":[78],"interaction":[81,106],"results":[82,132],"is":[83,99,120],"extended":[84],"to":[85,90,122],"trinomial":[87],"distribution.":[88],"According":[89],"Bayesian":[92],"cognitive":[93],"model,":[94],"global":[96],"trust":[97,111,138],"degree":[98],"aggregated":[100],"by":[101],"both":[102],"direct":[103],"indirect":[105],"records,":[107],"novel":[110],"model":[112,144],"based":[113,145],"recovery":[116,148],"technique":[117],"for":[118,128],"WSNs":[119],"proposed":[121,141],"reduce":[123],"probability":[125],"failure":[127],"Simulation":[131],"show":[133],"that":[134],"compared":[135],"with":[136],"existing":[137],"models,":[139],"our":[140],"TMBNRT":[142],"(trust":[143],"technique)":[149],"algorithm":[150],"can":[151],"effectively":[152],"meet":[153],"security":[155],"reliability":[158],"requirements":[159],"WSN.":[161]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
