{"id":"https://openalex.org/W2082778186","doi":"https://doi.org/10.2298/csis110303056c","title":"TRM-IoT: A trust management model based on fuzzy reputation for internet of things","display_name":"TRM-IoT: A trust management model based on fuzzy reputation for internet of things","publication_year":2011,"publication_date":"2011-01-01","ids":{"openalex":"https://openalex.org/W2082778186","doi":"https://doi.org/10.2298/csis110303056c","mag":"2082778186"},"language":"en","primary_location":{"id":"doi:10.2298/csis110303056c","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis110303056c","pdf_url":null,"source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.2298/csis110303056c","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100319457","display_name":"Dong Chen","orcid":"https://orcid.org/0000-0002-2209-2183"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dong Chen","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China","[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100895623","display_name":"Guiran Chang","orcid":null},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guiran Chang","raw_affiliation_strings":["Computing Center, Northeastern University, Shenyang, China","Computing Center, Northeastern University, Shenyang, China#TAB#"],"affiliations":[{"raw_affiliation_string":"Computing Center, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"Computing Center, Northeastern University, Shenyang, China#TAB#","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101897478","display_name":"Dawei Sun","orcid":"https://orcid.org/0000-0002-5937-3093"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawei Sun","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China","[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100454306","display_name":"Jiajia Li","orcid":"https://orcid.org/0000-0003-1565-1036"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiajia Li","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China","[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018065603","display_name":"Jie Jia","orcid":"https://orcid.org/0000-0001-7296-5061"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Jia","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China","[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100326915","display_name":"Xingwei Wang","orcid":"https://orcid.org/0000-0003-2856-4716"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingwei Wang","raw_affiliation_strings":["College of Information Science and Engineering, Northeastern University, Shenyang, China","[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"[College of Information Science & Engineering, Northeastern University, Shenyang, CHINA]","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100319457"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":null,"apc_paid":null,"fwci":9.1357,"has_fulltext":false,"cited_by_count":344,"citation_normalized_percentile":{"value":0.98071811,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"8","issue":"4","first_page":"1207","last_page":"1228"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8873811364173889},{"id":"https://openalex.org/keywords/6lowpan","display_name":"6LoWPAN","score":0.8661342263221741},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.7590527534484863},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.6995291113853455},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6670756340026855},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6314382553100586},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5687611103057861},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5461323261260986},{"id":"https://openalex.org/keywords/reputation-system","display_name":"Reputation system","score":0.534415602684021},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.4911062717437744},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.48888319730758667},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.45796990394592285},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39241823554039},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2257538139820099},{"id":"https://openalex.org/keywords/ipv6","display_name":"IPv6","score":0.16784682869911194}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8873811364173889},{"id":"https://openalex.org/C99400001","wikidata":"https://www.wikidata.org/wiki/Q109775","display_name":"6LoWPAN","level":4,"score":0.8661342263221741},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.7590527534484863},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.6995291113853455},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6670756340026855},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6314382553100586},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5687611103057861},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5461323261260986},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.534415602684021},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.4911062717437744},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48888319730758667},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.45796990394592285},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39241823554039},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2257538139820099},{"id":"https://openalex.org/C84555802","wikidata":"https://www.wikidata.org/wiki/Q2551624","display_name":"IPv6","level":3,"score":0.16784682869911194},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.2298/csis110303056c","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis110303056c","pdf_url":null,"source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},{"id":"pmh:oai:doiserbia:1820-02141100056C","is_oa":false,"landing_page_url":"http://doi.org/10.2298/CSIS110303056C","pdf_url":null,"source":{"id":"https://openalex.org/S4306400515","display_name":"Digital Object Identifier (DOI) Repository Serbia (National Library of Serbia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210142455","host_organization_name":"National Library of Serbia","host_organization_lineage":["https://openalex.org/I4210142455"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":". 8(4) 1207-1228"}],"best_oa_location":{"id":"doi:10.2298/csis110303056c","is_oa":true,"landing_page_url":"https://doi.org/10.2298/csis110303056c","pdf_url":null,"source":{"id":"https://openalex.org/S206939107","display_name":"Computer Science and Information Systems","issn_l":"1820-0214","issn":["1820-0214","2406-1018"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310321031","host_organization_name":"ComSIS Consortium","host_organization_lineage":["https://openalex.org/P4310321031"],"host_organization_lineage_names":["ComSIS Consortium"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer Science and Information Systems","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6200000047683716,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W1435028668","https://openalex.org/W1502759548","https://openalex.org/W1891363781","https://openalex.org/W1986757338","https://openalex.org/W1986836425","https://openalex.org/W2008337238","https://openalex.org/W2047346596","https://openalex.org/W2089075678","https://openalex.org/W2096029285","https://openalex.org/W2096698292","https://openalex.org/W2097726984","https://openalex.org/W2099376754","https://openalex.org/W2102258543","https://openalex.org/W2105103777","https://openalex.org/W2105294751","https://openalex.org/W2105975290","https://openalex.org/W2115373791","https://openalex.org/W2116269350","https://openalex.org/W2118153514","https://openalex.org/W2120726752","https://openalex.org/W2121540817","https://openalex.org/W2122053504","https://openalex.org/W2122426592","https://openalex.org/W2134970254","https://openalex.org/W2135782021","https://openalex.org/W2136702347","https://openalex.org/W2140728844","https://openalex.org/W2155348263","https://openalex.org/W2156652273","https://openalex.org/W2157547711","https://openalex.org/W2575007773","https://openalex.org/W4246200670"],"related_works":["https://openalex.org/W2294042815","https://openalex.org/W2157328853","https://openalex.org/W2517839752","https://openalex.org/W1986034399","https://openalex.org/W126629215","https://openalex.org/W2780022989","https://openalex.org/W2946007437","https://openalex.org/W2142891234","https://openalex.org/W2952470056","https://openalex.org/W2082778186"],"abstract_inverted_index":{"Since":[0],"a":[1,16,76,133,146,166],"large":[2,77],"scale":[3],"Wireless":[4],"Sensor":[5],"Network":[6],"(WSN)":[7],"is":[8,30,68,163],"to":[9,32,74,139],"be":[10],"completely":[11],"integrated":[12],"into":[13],"Internet":[14,20],"as":[15,42,70],"core":[17],"part":[18],"of":[19,21,45,103,110,120,148,159,169],"Things":[22],"(IoT)":[23],"or":[24,49],"Cyber":[25],"Physical":[26],"System":[27],"(CPS),":[28],"it":[29],"necessary":[31],"consider":[33],"various":[34,111],"security":[35],"challenges":[36],"that":[37],"come":[38],"with":[39],"IoT/CPS,":[40],"such":[41],"the":[43,101,141,160],"detection":[44,102],"malicious":[46,84],"attacks.":[47],"Sensors":[48],"sensor":[50,79],"embedded":[51],"things":[52,144],"may":[53],"establish":[54],"direct":[55],"communication":[56,98],"between":[57,143],"each":[58],"other":[59],"using":[60],"6LoWPAN":[61],"protocol.":[62],"A":[63],"trust":[64,88,121,128,134],"and":[65,97,106,124,135,157],"reputation":[66,136],"model":[67,137,162],"recognized":[69],"an":[71],"important":[72],"approach":[73],"defend":[75],"distributed":[78,95],"networks":[80],"in":[81,145],"IoT/CPS":[82,149],"against":[83],"node":[85],"attacks,":[86],"since":[87],"establishment":[89,122,129],"mechanisms":[90],"can":[91],"stimulate":[92],"collaboration":[93],"among":[94,127],"computing":[96],"entities,":[99,105],"facilitate":[100],"untrustworthy":[104],"assist":[107],"decision-making":[108],"process":[109,123],"protocols.":[112],"In":[113],"this":[114],"paper,":[115],"based":[116,150],"on":[117,151],"in-depth":[118],"understanding":[119],"quantitative":[125],"comparison":[126],"methods,":[130],"we":[131],"present":[132],"TRM-IoT":[138],"enforce":[140],"cooperation":[142],"network":[147],"their":[152],"behaviors.":[153],"The":[154],"accuracy,":[155],"robustness":[156],"lightness":[158],"proposed":[161],"validated":[164],"through":[165],"wide":[167],"set":[168],"simulations.":[170]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":25},{"year":2022,"cited_by_count":31},{"year":2021,"cited_by_count":45},{"year":2020,"cited_by_count":35},{"year":2019,"cited_by_count":40},{"year":2018,"cited_by_count":40},{"year":2017,"cited_by_count":35},{"year":2016,"cited_by_count":28},{"year":2015,"cited_by_count":15},{"year":2014,"cited_by_count":17},{"year":2013,"cited_by_count":5},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-06T07:47:59.780226","created_date":"2025-10-10T00:00:00"}
