{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T00:45:23Z","timestamp":1775609123414,"version":"3.50.1"},"reference-count":35,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2021,3,19]],"date-time":"2021-03-19T00:00:00Z","timestamp":1616112000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/100007219","name":"Natural Science Foundation of Shanghai","doi-asserted-by":"publisher","award":["17ZR1429100"],"award-info":[{"award-number":["17ZR1429100"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571004"],"award-info":[{"award-number":["61571004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571303"],"award-info":[{"award-number":["61571303"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB2101600"],"award-info":[{"award-number":["2019YFB2101600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB2101602"],"award-info":[{"award-number":["2019YFB2101602"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB2101602-03"],"award-info":[{"award-number":["2019YFB2101602-03"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013076","name":"National Major Science and Technology Projects of China","doi-asserted-by":"publisher","award":["2018ZX03001031"],"award-info":[{"award-number":["2018ZX03001031"]}],"id":[{"id":"10.13039\/501100013076","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Digital Communications and Networks"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1016\/j.dcan.2021.03.005","type":"journal-article","created":{"date-parts":[[2021,3,26]],"date-time":"2021-03-26T20:25:48Z","timestamp":1616790348000},"page":"470-478","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":92,"title":["Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks"],"prefix":"10.1016","volume":"7","author":[{"given":"Weidong","family":"Fang","sequence":"first","affiliation":[]},{"given":"Wuxiong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhannan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Weiwei","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yinxuan","family":"Yang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"5","key":"10.1016\/j.dcan.2021.03.005_bib1","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MNET.2018.1800029","article-title":"Social sensor cloud: framework, greenness, issues, and outlook","volume":"32","author":"Zhu","year":"2018","journal-title":"IEEE Network Magaz."},{"issue":"12","key":"10.1016\/j.dcan.2021.03.005_bib2","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCOM.2017.1700212","article-title":"Secure multimedia big data in trust-assisted sensor-cloud for Smart city","volume":"55","author":"Zhu","year":"2017","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.dcan.2021.03.005_bib3","doi-asserted-by":"crossref","first-page":"32754","DOI":"10.1109\/ACCESS.2019.2902865","article-title":"Modeling IoT equipment with graph neural networks","volume":"7","author":"Zhang","year":"2019","journal-title":"IEEE Access"},{"issue":"4","key":"10.1016\/j.dcan.2021.03.005_bib4","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1109\/TCC.2017.2649525","article-title":"Towards pricing for sensor-cloud","volume":"8","author":"Zhu","year":"2017","journal-title":"IEEE Trans. Cloud Comput."},{"issue":"5","key":"10.1016\/j.dcan.2021.03.005_bib5","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/MCOM.2017.1600822","article-title":"Multi-method data delivery for green sensor-cloud","volume":"55","author":"Zhu","year":"2017","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"10.1016\/j.dcan.2021.03.005_bib6","doi-asserted-by":"crossref","first-page":"6811","DOI":"10.1109\/JIOT.2019.2911564","article-title":"Edge computing-based ID and nID combined identification and resolution scheme in IoT","volume":"6","author":"Ning","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.dcan.2021.03.005_bib7","doi-asserted-by":"crossref","unstructured":"Fang W, Cui N, Chen W, Zhang W, Chen Y. A trust-based security system for data collecting in Smart city[J]. IEEE Trans. Indus. Inform., doi: 10.1109\/TII.2020.3006137 (Early Access).","DOI":"10.1109\/TII.2020.3006137"},{"issue":"6","key":"10.1016\/j.dcan.2021.03.005_bib8","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TVT.2014.2342236","article-title":"Energy efficiency maximization by jointly optimizing the positions and serving range of relay stations in cellular networks","volume":"65","author":"Li","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"8","key":"10.1016\/j.dcan.2021.03.005_bib9","doi-asserted-by":"crossref","first-page":"4093","DOI":"10.1109\/TWC.2015.2416715","article-title":"Energy-efficient optimal relay selection in cooperative cellular networks based on double auction","volume":"14","author":"Li","year":"2015","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.dcan.2021.03.005_bib10","first-page":"20","article-title":"Trust-based attack and defense in wireless sensor networks: a survey","author":"Fang","year":"2020","journal-title":"Wireless Commun. Mobile Comput."},{"issue":"6","key":"10.1016\/j.dcan.2021.03.005_bib11","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1109\/MWC.2013.6704480","article-title":"Energy efficient femtocell networks: challenges and opportunities","volume":"20","author":"Li","year":"2013","journal-title":"IEEE Wireless Commun."},{"issue":"1","key":"10.1016\/j.dcan.2021.03.005_bib12","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.jnca.2015.06.013","article-title":"BTRES: beta-based trust and reputation evaluation system for wireless sensor networks","volume":"59","author":"Fang","year":"2016","journal-title":"J.\u00a0Netw. Comput. Appl."},{"issue":"10","key":"10.1016\/j.dcan.2021.03.005_bib13","first-page":"158","article-title":"A\u00a0reputation-based model for Malicious node detection in WSN","author":"Yang","year":"2009","journal-title":"J.\u00a0Harbin Inst. Technol."},{"key":"10.1016\/j.dcan.2021.03.005_bib14","series-title":"Proceedings of 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM \u201908). September 19-21, 2008","first-page":"1","article-title":"A\u00a0novel reputation model for malicious node detection in wireless sensor network","author":"Yin","year":"2008"},{"issue":"5","key":"10.1016\/j.dcan.2021.03.005_bib15","doi-asserted-by":"crossref","first-page":"1228","DOI":"10.1109\/TPDS.2014.2320505","article-title":"An efficient distributed trust model for wireless sensor network","volume":"26","author":"Jiang","year":"2015","journal-title":"IEEE Trans. Parallel Distr. Syst."},{"key":"10.1016\/j.dcan.2021.03.005_bib16","doi-asserted-by":"crossref","first-page":"e3879","DOI":"10.1002\/ett.3879","article-title":"BTDS: Bayesian-based trust decision scheme for intelligent connected vehicles in VANETs","author":"Fang","year":"2020","journal-title":"Trans. Emerg. Telecommun. Technol."},{"issue":"4","key":"10.1016\/j.dcan.2021.03.005_bib17","doi-asserted-by":"crossref","DOI":"10.1007\/s11432-016-9028-0","article-title":"A\u00a0resilient trust management scheme for defending against reputation time-varying attacks based on Beta distribution","volume":"60","author":"Fang","year":"2017","journal-title":"Sci. China Inf. Sci."},{"key":"10.1016\/j.dcan.2021.03.005_bib18","series-title":"Proceedings of the 5th International Conference on Wireless Communications, Networking and Mobile Computing, September 24-26, 2009, Beijing, China","first-page":"1C4","article-title":"A\u00a0trust establishment scheme for cluster-based sensor networks","author":"Zhou","year":"2009"},{"issue":"1","key":"10.1016\/j.dcan.2021.03.005_bib19","doi-asserted-by":"crossref","first-page":"13476","DOI":"10.1109\/ACCESS.2019.2892712","article-title":"FETMS: Fast and efficient trust management scheme for information-centric networking in Internet of Things","volume":"7","author":"Fang","year":"2019","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.dcan.2021.03.005_bib20","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","article-title":"Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection","volume":"9","author":"Bao","year":"2012","journal-title":"IEEE Trans. Network Serv. Manag."},{"key":"10.1016\/j.dcan.2021.03.005_bib21","series-title":"Proceedings IEEE Roedunet International Conference 12th Edition Networking in Education and Research. September 26-28, 2013","first-page":"1","article-title":"Adaptive trust management protocol based on intrusion detection for wireless sensor network","author":"Gheorghe","year":"2013"},{"key":"10.1016\/j.dcan.2021.03.005_bib22","series-title":"Proceedings IEEE the Tenth Annual International Conference on Privacy, Security and Trust (PST). July 16-18, 2012, Paris, France","first-page":"195","article-title":"CENTER: a centralized trust-based efficient routing protocol for wireless sensor network","author":"Tajeddine","year":"2012"},{"key":"10.1016\/j.dcan.2021.03.005_bib23","series-title":"Proceedings the 2nd International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM). February 3-4, 2017, Tindivanam, India","article-title":"A\u00a0novel trust-based routing protocol to prevent the malicious nodes in wireless sensor networks","author":"Priayoheswari","year":"2017"},{"key":"10.1016\/j.dcan.2021.03.005_bib24","series-title":"Detection and prevention of Black Hole and selective forwarding attack in clustered WSN with active trust","first-page":"1","author":"Mehetre","year":"2018"},{"key":"10.1016\/j.dcan.2021.03.005_bib25","series-title":"Proceedings International Conference on Internet of Things, Embedded Systems and Communications (IINTEC), October 20-22, 2017, Gafsa, Tunisia","first-page":"53","article-title":"Improvement of the LEACH protocol in load balancing and energy-association conservation","author":"Gantassi","year":"2017"},{"key":"10.1016\/j.dcan.2021.03.005_bib26","series-title":"Proceedings the 31st National Radio Science Conference (NRSC), April 28-30, 2014, Cairo, Egypt","first-page":"252","article-title":"PR-LEACH: approach for balancing energy dissipation of LEACH protocol for wireless sensor networks","author":"Salim","year":"2014"},{"key":"10.1016\/j.dcan.2021.03.005_bib27","series-title":"Proceedings the Seventh International Conference on Information Technology: New Generations. April 12-14, 2010, Las Vegas, Nevada, USA","first-page":"822","article-title":"An energy balancing LEACH algorithm for wireless sensor networks","author":"Gou","year":"2010"},{"key":"10.1016\/j.dcan.2021.03.005_bib28","series-title":"Proceedings the 6th IEEE Joint International Information Technology and Artificial Intelligence Conference, August 20-22, 2011, Chongqing, China","first-page":"291","article-title":"Based on energy balance LEACH-DC protocol design","volume":"vol. 2","author":"Liu","year":"2011"},{"key":"10.1016\/j.dcan.2021.03.005_bib29","series-title":"Proceedings IEEE 18th International Conference on Communication Technology (ICCT), October 8-11, 2018, Chongqing, China","first-page":"528","article-title":"Adaptive unequal clustering using an improved LEACH protocol with energy balance","author":"Li","year":"2018"},{"key":"10.1016\/j.dcan.2021.03.005_bib30","series-title":"proceedings of International Conference on Engineering and Technology (ICET), August 21-23, 2017, Antalya, Turkey","first-page":"1","article-title":"A\u00a0new secure solution for clustering in wireless sensors networks based on LEACH","author":"Ouafaa","year":"2017"},{"key":"10.1016\/j.dcan.2021.03.005_bib31","series-title":"Proceedings the 9th International Conference on Industrial and Information Systems (ICIIS), December 15-17, 2014, Gwalior, MP, India","first-page":"1","article-title":"Improving the LEACH protocol for privacy preservation in secure data aggregation in Wireless Sensor Networks","author":"Patel","year":"2014"},{"key":"10.1016\/j.dcan.2021.03.005_bib32","series-title":"Proceedings IEEE International Conference on Electro\/Information Technology. May 6-8, 2012, Indianapolis, IN, USA","first-page":"1","article-title":"Enhancing S-LEACH security for wireless sensor networks","author":"EL Saadawy","year":"2012"},{"key":"10.1016\/j.dcan.2021.03.005_bib33","series-title":"Proceedings of the First International Conference on Networks & Soft Computing (ICNSC2014), August 19-20, 2014, Guntur, India","first-page":"198","article-title":"Multi-level secure leach protocol model using NS-3","author":"Kodali","year":"2014"},{"issue":"3","key":"10.1016\/j.dcan.2021.03.005_bib34","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1016\/j.compeleceng.2011.11.017","article-title":"A\u00a0clustering algorithm based on energy information and cluster heads expectation for wireless sensor networks","volume":"38","author":"Wang","year":"2012","journal-title":"Comput. Electr. Eng."},{"key":"10.1016\/j.dcan.2021.03.005_bib35","series-title":"Proceedings the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks, October 25-29, 2004, Washington, DC, USA","first-page":"66","article-title":"Reputation-based framework for high integrity sensor networks","author":"Ganeriwal","year":"2004"}],"container-title":["Digital Communications and Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S235286482100016X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S235286482100016X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T05:04:32Z","timestamp":1762491872000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S235286482100016X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":35,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["S235286482100016X"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.dcan.2021.03.005","relation":{},"ISSN":["2352-8648"],"issn-type":[{"value":"2352-8648","type":"print"}],"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Trust management-based and energy efficient hierarchical routing protocol in wireless sensor networks","name":"articletitle","label":"Article Title"},{"value":"Digital Communications and Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.dcan.2021.03.005","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Chongqing University of Posts and Telecommunications. Publishing Services by Elsevier B.V. on behalf of KeAi Communications Co. Ltd.","name":"copyright","label":"Copyright"}]}}