{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T22:06:35Z","timestamp":1720649195325},"reference-count":40,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Pervasive and Mobile Computing"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1016\/j.pmcj.2021.101481","type":"journal-article","created":{"date-parts":[[2021,10,19]],"date-time":"2021-10-19T05:28:27Z","timestamp":1634621307000},"page":"101481","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":6,"special_numbering":"C","title":["Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching"],"prefix":"10.1016","volume":"77","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-1952-5328","authenticated-orcid":false,"given":"Acquila Santos","family":"Rocha","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-2317-6258","authenticated-orcid":false,"given":"Billy Anderson","family":"Pinheiro","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0513-0958","authenticated-orcid":false,"given":"Vinicius C.M.","family":"Borges","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.pmcj.2021.101481_b1","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1186\/s13638-015-0380-8","article-title":"Aspirations, challenges, and open issues for software-based 5G networks in extremely dense and heterogeneous scenarios","volume":"2015","author":"Borges","year":"2015","journal-title":"EURASIP J. Wireless Commun. Networking"},{"key":"10.1016\/j.pmcj.2021.101481_b2","series-title":"Cisco Annual Internet Report (2018\u20132023)","author":"Cisco","year":"2019"},{"issue":"2","key":"10.1016\/j.pmcj.2021.101481_b3","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1016\/j.icte.2017.06.001","article-title":"Control and data plane separation architecture for supporting multicast listeners over distributed mobility management","volume":"3","author":"Do","year":"2017","journal-title":"ICT Express"},{"issue":"3","key":"10.1016\/j.pmcj.2021.101481_b4","doi-asserted-by":"crossref","first-page":"2525","DOI":"10.1109\/COMST.2019.2908280","article-title":"On mobile edge caching","volume":"21","author":"Yao","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"10.1016\/j.pmcj.2021.101481_b5","doi-asserted-by":"crossref","first-page":"163953","DOI":"10.1109\/ACCESS.2020.3021462","article-title":"Collaborative cache allocation and transmission scheduling for multi-user in edge computing","volume":"8","author":"Yu","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.pmcj.2021.101481_b6","series-title":"2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","first-page":"206","article-title":"Architecture for public safety network using D2D communication","author":"Ali","year":"2016"},{"issue":"12","key":"10.1016\/j.pmcj.2021.101481_b7","doi-asserted-by":"crossref","first-page":"7004","DOI":"10.1109\/TWC.2015.2463281","article-title":"Social data offloading in D2D-enhanced cellular networks by network formation games","volume":"14","author":"Wang","year":"2015","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"2","key":"10.1016\/j.pmcj.2021.101481_b8","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/s11036-016-0741-5","article-title":"A survey on security in D2D communications","volume":"22","author":"Wang","year":"2017","journal-title":"Mob. Netw. Appl."},{"issue":"9","key":"10.1016\/j.pmcj.2021.101481_b9","doi-asserted-by":"crossref","first-page":"4647","DOI":"10.1109\/TVT.2014.2313865","article-title":"Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning","volume":"63","author":"Wei","year":"2014","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"7","key":"10.1016\/j.pmcj.2021.101481_b10","doi-asserted-by":"crossref","first-page":"1669","DOI":"10.1007\/s11276-014-0701-6","article-title":"A trust enhanced secure clustering framework for wireless ad hoc networks","volume":"20","author":"Chatterjee","year":"2014","journal-title":"Wirel. Netw."},{"issue":"3","key":"10.1016\/j.pmcj.2021.101481_b11","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1109\/MWC.2018.1700274","article-title":"Secure social networks in 5G systems with mobile edge computing, caching, and device-to-device communications","volume":"25","author":"He","year":"2018","journal-title":"IEEE Wirel. Commun."},{"issue":"6","key":"10.1016\/j.pmcj.2021.101481_b12","doi-asserted-by":"crossref","DOI":"10.3390\/s19061467","article-title":"A trust-based predictive model for mobile ad hoc network in internet of things","volume":"19","author":"Alnumay","year":"2019","journal-title":"Sensors"},{"key":"10.1016\/j.pmcj.2021.101481_b13","doi-asserted-by":"crossref","first-page":"40","DOI":"10.3991\/ijim.v13i09.9329","article-title":"Security improvisation through node trust prediction approach in mobile ad hoc networks","volume":"13","author":"Raju","year":"2019","journal-title":"Int. J. Interact. Mob. Technol. (IJIM)"},{"issue":"10","key":"10.1016\/j.pmcj.2021.101481_b14","article-title":"T-D2D: A trust model for service offloading in device-to-device communication","volume":"30","author":"Movahedi","year":"2019","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"10.1016\/j.pmcj.2021.101481_b15","doi-asserted-by":"crossref","DOI":"10.1016\/j.pmcj.2021.101330","article-title":"A blockchain-based trust management method for internet of things","volume":"72","author":"Wu","year":"2021","journal-title":"Pervasive Mob. Comput."},{"issue":"4","key":"10.1016\/j.pmcj.2021.101481_b16","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","article-title":"A survey on trust management for mobile ad hoc networks","volume":"13","author":"Cho","year":"2011","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"2","key":"10.1016\/j.pmcj.2021.101481_b17","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","article-title":"Information theoretic framework of trust modeling and evaluation for ad hoc networks","volume":"24","author":"Sun","year":"2006","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.pmcj.2021.101481_b18","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.comcom.2019.10.034","article-title":"Trust management in social internet of things: A taxonomy, open issues, and challenges","volume":"150","author":"Chahal","year":"2020","journal-title":"Comput. Commun."},{"key":"10.1016\/j.pmcj.2021.101481_b19","series-title":"2017 IEEE Symposium on Computers and Communications (ISCC)","first-page":"1043","article-title":"Improving video content access with proactive D2D caching and online social networking","author":"d.\u00a0S.\u00a0Moraes","year":"2017"},{"issue":"5","key":"10.1016\/j.pmcj.2021.101481_b20","doi-asserted-by":"crossref","first-page":"4993","DOI":"10.1109\/TVT.2021.3073503","article-title":"Joint content sharing and incentive mechanism for cache-enabled device-to-device networks","volume":"70","author":"Kumar","year":"2021","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"11","key":"10.1016\/j.pmcj.2021.101481_b21","doi-asserted-by":"crossref","first-page":"7500","DOI":"10.1109\/TWC.2018.2867596","article-title":"Caching policy and cooperation distance design for base station-assisted wireless D2D caching networks: Throughput and energy efficiency optimization and tradeoff","volume":"17","author":"Lee","year":"2018","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"5","key":"10.1016\/j.pmcj.2021.101481_b22","doi-asserted-by":"crossref","first-page":"2418","DOI":"10.1109\/TVT.2010.2044904","article-title":"Detecting and localizing identity-based attacks in wireless and sensor networks","volume":"59","author":"Chen","year":"2010","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"10.1016\/j.pmcj.2021.101481_b23","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1109\/TEM.1967.6446985","article-title":"Pert and the beta distribution","volume":"EM-14","author":"Mcbride","year":"1967","journal-title":"IEEE Trans. Eng. Manage."},{"key":"10.1016\/j.pmcj.2021.101481_b24","series-title":"Combination of Evidence in Dempster-Shafer Theory, Vol. 4015","author":"Sentz","year":"2002"},{"key":"10.1016\/j.pmcj.2021.101481_b25","first-page":"201","article-title":"Blockchain e a revolu\u00e7\u00e3o do consenso sob demanda","author":"Greve","year":"2018","journal-title":"SRBC"},{"key":"10.1016\/j.pmcj.2021.101481_b26","series-title":"2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS)","first-page":"253","article-title":"Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric)","author":"Sukhwani","year":"2017"},{"key":"10.1016\/j.pmcj.2021.101481_b27","series-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2009"},{"issue":"4","key":"10.1016\/j.pmcj.2021.101481_b28","doi-asserted-by":"crossref","first-page":"150","DOI":"10.1109\/MNET.001.1900215","article-title":"Blockchain-incentivized D2D and mobile edge caching: A deep reinforcement learning approach","volume":"34","author":"Zhang","year":"2020","journal-title":"IEEE Netw."},{"key":"10.1016\/j.pmcj.2021.101481_b29","series-title":"2020 12th International Conference on Communication Software and Networks (ICCSN)","first-page":"202","article-title":"Research on security of D2D resource sharing based on blockchain in mobile edge network","author":"Li","year":"2020"},{"key":"10.1016\/j.pmcj.2021.101481_b30","series-title":"Hacking Web Intelligence","first-page":"133","article-title":"Chapter 7 - metadata","author":"Chauhan","year":"2015"},{"key":"10.1016\/j.pmcj.2021.101481_b31","doi-asserted-by":"crossref","DOI":"10.1016\/j.pmcj.2020.101291","article-title":"Poewal: A lightweight consensus mechanism for blockchain in IoT","volume":"69","author":"Raghav","year":"2020","journal-title":"Pervasive Mob. Comput."},{"key":"10.1016\/j.pmcj.2021.101481_b32","unstructured":"IBM, Hyperledger \u2013 Open Source Blockchain Technologies, URL: https:\/\/www.hyperledger.org\/, 0000."},{"key":"10.1016\/j.pmcj.2021.101481_b33","series-title":"Proceedings of the Third Symposium on Operating Systems Design and Implementation","first-page":"173","article-title":"Practical Byzantine fault tolerance","author":"Castro","year":"1999"},{"key":"10.1016\/j.pmcj.2021.101481_b34","series-title":"Modeling and Tools for Network Simulation","first-page":"15","article-title":"The ns-3 network simulator","author":"Riley","year":"2010"},{"key":"10.1016\/j.pmcj.2021.101481_b35","series-title":"Proceedings of the 14th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","first-page":"293","article-title":"An open source product-oriented LTE network simulator based on ns-3","author":"Baldo","year":"2011"},{"key":"10.1016\/j.pmcj.2021.101481_b36","series-title":"2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333)","first-page":"1017","article-title":"Group mobility and partition prediction in wireless ad-hoc networks","volume":"2","author":"Wang","year":"2002"},{"issue":"1","key":"10.1016\/j.pmcj.2021.101481_b37","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The elliptic curve digital signature algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"Int. J. Inf. Secur."},{"issue":"5","key":"10.1016\/j.pmcj.2021.101481_b38","doi-asserted-by":"crossref","first-page":"4218","DOI":"10.1109\/JIOT.2020.2966870","article-title":"Edge-computing-based trustworthy data collection model in the internet of things","volume":"7","author":"Wang","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"1","key":"10.1016\/j.pmcj.2021.101481_b39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s13638-019-1524-z","article-title":"Trust evaluation model with entropy-based weight assignment for malicious node\u2019s detection in wireless sensor networks","volume":"2019","author":"Yin","year":"2019","journal-title":"EURASIP J. Wireless Commun. Networking"},{"issue":"9","key":"10.1016\/j.pmcj.2021.101481_b40","doi-asserted-by":"crossref","DOI":"10.3390\/app9091788","article-title":"Assessing blockchain consensus and security mechanisms against the 51% attack","volume":"9","author":"Sayeed","year":"2019","journal-title":"Appl. Sci."}],"container-title":["Pervasive and Mobile Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119221001115?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1574119221001115?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,15]],"date-time":"2023-04-15T13:32:13Z","timestamp":1681565533000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1574119221001115"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":40,"alternative-id":["S1574119221001115"],"URL":"https:\/\/doi.org\/10.1016\/j.pmcj.2021.101481","relation":{},"ISSN":["1574-1192"],"issn-type":[{"value":"1574-1192","type":"print"}],"subject":[],"published":{"date-parts":[[2021,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Secure D2D caching framework inspired on trust management and blockchain for Mobile Edge Caching","name":"articletitle","label":"Article Title"},{"value":"Pervasive and Mobile Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.pmcj.2021.101481","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"101481"}}