{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T10:00:02Z","timestamp":1726135202603},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030861292"},{"type":"electronic","value":"9783030861308"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-86130-8_39","type":"book-chapter","created":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T08:12:16Z","timestamp":1631088736000},"page":"494-509","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["ORMD: Online Learning Real-Time Malicious Node Detection for the IoT Network"],"prefix":"10.1007","author":[{"given":"Jingxiu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Lu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zuchao","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,9]]},"reference":[{"issue":"7","key":"39_CR1","doi-asserted-by":"publisher","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of things (IoT): a vision, architectural elements, and future directions. Futur. Gener. Comput. Syst. 29(7), 1645\u20131660 (2013)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"39_CR2","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1109\/MWC.2014.6882303","volume":"21","author":"R Fantacci","year":"2014","unstructured":"Fantacci, R., Pecorella, T., Viti, R., Carlini, C.: A network architecture solution for efficient IoT WSN backhauling: challenges and opportunities. IEEE Wirel. Commun. 21(4), 113\u2013119 (2014)","journal-title":"IEEE Wirel. Commun."},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Meddeb, R., Triki, B., Jemili, F., Korbaa, O.: A survey of attacks in mobile ad hoc networks. In: 2017 International Conference on Engineering & MIS (ICEMIS), pp. 1\u20137. IEEE (2017)","DOI":"10.1109\/ICEMIS.2017.8273007"},{"issue":"5","key":"39_CR4","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1109\/TMC.2007.70753","volume":"7","author":"K Ren","year":"2008","unstructured":"Ren, K., Lou, W., Zhang, Y.: LEDS: providing location-aware end-to-end data security in wireless sensor networks. IEEE Trans. Mob. Comput. 7(5), 585\u2013598 (2008)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","volume":"82","author":"MA Khan","year":"2018","unstructured":"Khan, M.A., Salah, K.: IoT security: review, blockchain solutions, and open challenges. Futur. Gener. Comput. Syst. 82, 395\u2013411 (2018)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"39_CR6","doi-asserted-by":"publisher","first-page":"865","DOI":"10.1016\/j.future.2019.07.021","volume":"101","author":"L Liu","year":"2019","unstructured":"Liu, L., Ma, Z., Meng, W.: Detection of multiple-mix-attack malicious nodes using perceptron-based trust in IoT networks. Futur. Gener. Comput. Syst. 101, 865\u2013879 (2019)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"39_CR7","doi-asserted-by":"crossref","unstructured":"Liu, X., Abdelhakim, M., Krishnamurthy, P., Tipper, D.: Identifying malicious nodes in multihop IoT networks using diversity and unsupervised learning. In: 2018 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422484"},{"issue":"2","key":"39_CR8","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"YL Sun","year":"2006","unstructured":"Sun, Y.L., Yu, W., Han, Z., Liu, K.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 305\u2013317 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Sen, J., Chowdhury, P.R., Sengupta, I.: A distributed trust establishment scheme for mobile ad hoc networks. In: 2007 International Conference on Computing: Theory and Applications (ICCTA 2007), pp. 51\u201358. IEEE (2007)","DOI":"10.1109\/ICCTA.2007.3"},{"key":"39_CR10","unstructured":"Liqin, T., et al.: Computation and analysis of node intending trust in WSNs. In: 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, pp. 496\u2013499. IEEE (2010)"},{"issue":"7","key":"39_CR11","doi-asserted-by":"publisher","first-page":"155014771665724","DOI":"10.1177\/1550147716657246","volume":"12","author":"N-E Rikli","year":"2016","unstructured":"Rikli, N.-E., Alnasser, A.: Lightweight trust model for the detection of concealed malicious nodes in sparse wireless ad hoc networks. Int. J. Distrib. Sens. Netw. 12(7), 1550147716657246 (2016)","journal-title":"Int. J. Distrib. Sens. Netw."},{"issue":"4","key":"39_CR12","doi-asserted-by":"publisher","first-page":"1779","DOI":"10.1007\/s11227-017-2150-3","volume":"74","author":"W Zhang","year":"2018","unstructured":"Zhang, W., Zhu, S., Tang, J., Xiong, N.: A novel trust management scheme based on dempster-shafer evidence theory for malicious nodes detection in wireless sensor networks. J. Supercomput. 74(4), 1779\u20131801 (2018)","journal-title":"J. Supercomput."},{"issue":"7","key":"39_CR13","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1007\/s00607-018-0685-7","volume":"101","author":"MD Alshehri","year":"2019","unstructured":"Alshehri, M.D., Hussain, F.K.: A fuzzy security protocol for trust management in the internet of things (fuzzy-IoT). Computing 101(7), 791\u2013818 (2019)","journal-title":"Computing"},{"issue":"3","key":"39_CR14","doi-asserted-by":"publisher","first-page":"698","DOI":"10.3390\/s20030698","volume":"20","author":"MT Lwin","year":"2020","unstructured":"Lwin, M.T., Yim, J., Ko, Y.-B.: Blockchain-based lightweight trust management in mobile ad-hoc networks. Sensors 20(3), 698 (2020)","journal-title":"Sensors"},{"issue":"2","key":"39_CR15","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","volume":"9","author":"F Bao","year":"2012","unstructured":"Bao, F., Chen, R., Chang, M.J., Cho, J.-H.: Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manag. 9(2), 169\u2013183 (2012)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"39_CR16","doi-asserted-by":"crossref","unstructured":"Renubala, S., Dhanalakshmi, K.S.: Trust based secure routing protocol using fuzzy logic in wireless sensor networks. In: 2014 IEEE International Conference on Computational Intelligence and Computing Research, pp. 1\u20135. IEEE (2014)","DOI":"10.1109\/ICCIC.2014.7238435"},{"key":"39_CR17","doi-asserted-by":"crossref","unstructured":"Das, S., Das, A.: An algorithm to detect malicious nodes in wireless sensor network using enhanced leach protocol. In: 2015 International Conference on Advances in Computer Engineering and Applications, pp. 875\u2013881. IEEE (2015)","DOI":"10.1109\/ICACEA.2015.7164828"},{"issue":"1","key":"39_CR18","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/computers9010004","volume":"9","author":"A Al Hayajneh","year":"2020","unstructured":"Al Hayajneh, A., Bhuiyan, M.Z.A., McAndrew, I.: A novel security protocol for wireless sensor networks with cooperative communication. Computers 9(1), 4 (2020)","journal-title":"Computers"},{"issue":"12","key":"39_CR19","doi-asserted-by":"publisher","first-page":"2910","DOI":"10.1002\/cpe.3338","volume":"27","author":"H Dai","year":"2015","unstructured":"Dai, H., Liu, H., Jia, Z.: Dynamic malicious node detection with semi-supervised multivariate classification in cognitive wireless sensor networks. Concurr. Comput. Pract. Exp. 27(12), 2910\u20132923 (2015)","journal-title":"Concurr. Comput. Pract. Exp."},{"key":"39_CR20","doi-asserted-by":"crossref","unstructured":"Gao, B., Maekawa, T., Amagata, D., Hara, T.: Environment-adaptive malicious node detection in manets with ensemble learning. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 556\u2013566. IEEE (2018)","DOI":"10.1109\/ICDCS.2018.00061"},{"key":"39_CR21","doi-asserted-by":"crossref","unstructured":"Eziama, E., Tepe, K., Balador, A., Nwizege, K.S., Jaimes, L.M.S.: Malicious node detection in vehicular ad-hoc network using machine learning and deep learning. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/GLOCOMW.2018.8644127"},{"issue":"4","key":"39_CR22","doi-asserted-by":"publisher","first-page":"3559","DOI":"10.1109\/JIOT.2020.2973176","volume":"7","author":"N Ravi","year":"2020","unstructured":"Ravi, N., Shalinie, S.M.: Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J. 7(4), 3559\u20133570 (2020)","journal-title":"IEEE Internet Things J."},{"key":"39_CR23","doi-asserted-by":"crossref","unstructured":"Kharrufa, H., Al-Kashoash, H., Al-Nidawi, Y., Mosquera, M.Q., Kemp, A.H.: Dynamic RPL for multi-hop routing in IoT applications. In: 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), pp. 100\u2013103. IEEE (2017)","DOI":"10.1109\/WONS.2017.7888753"},{"issue":"7","key":"39_CR24","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1002\/wcm.432","volume":"6","author":"MK Marina","year":"2006","unstructured":"Marina, M.K., Das, S.R.: Ad hoc on-demand multipath distance vector routing. Wirel. Commun. Mob. Comput. 6(7), 969\u2013988 (2006)","journal-title":"Wirel. Commun. Mob. Comput."},{"issue":"2","key":"39_CR25","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1109\/TPDS.2015.2402156","volume":"27","author":"C Wang","year":"2015","unstructured":"Wang, C., Hussain, S.R., Bertino, E.: Dictionary based secure provenance compression for wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 27(2), 405\u2013418 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"39_CR26","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/s10208-006-0237-y","volume":"8","author":"Y Ying","year":"2008","unstructured":"Ying, Y., Pontil, M.: Online gradient descent learning algorithms. Found. Comput. Math. 8(5), 561\u2013596 (2008)","journal-title":"Found. Comput. Math."},{"issue":"2","key":"39_CR27","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10994-016-5555-y","volume":"103","author":"J Lu","year":"2016","unstructured":"Lu, J., Zhao, P., Hoi, S.C.: Online passive-aggressive active learning. Mach. Learn. 103(2), 141\u2013183 (2016)","journal-title":"Mach. Learn."}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-86130-8_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,8]],"date-time":"2021-09-08T08:40:04Z","timestamp":1631090404000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-86130-8_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030861292","9783030861308"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-86130-8_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WASA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Wireless Algorithms, Systems, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wasa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wasa-conference.org\/WASA2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"315","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"103","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"57","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}