A social network approach to trust management in VANETs

In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VA...

Full description

Saved in:
Bibliographic Details
Published inPeer-to-peer networking and applications Vol. 7; no. 3; pp. 229 - 242
Main Authors Huang, Zhen, Ruj, Sushmita, Cavenaghi, Marcos A., Stojmenovic, Milos, Nayak, Amiya
Format Journal Article
LanguageEnglish
Published Boston Springer US 01.09.2014
Springer Nature B.V
Subjects
Online AccessGet full text

Cover

Loading…
Abstract In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting.
AbstractList Issue Title: The Green, Reliability and Security of Machine-to-Machine Communications In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting.[PUBLICATION ABSTRACT]
In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting.
Author Cavenaghi, Marcos A.
Stojmenovic, Milos
Huang, Zhen
Ruj, Sushmita
Nayak, Amiya
Author_xml – sequence: 1
  givenname: Zhen
  surname: Huang
  fullname: Huang, Zhen
  email: robertzhen1988@hotmail.com
  organization: SEECS, University of Ottawa
– sequence: 2
  givenname: Sushmita
  surname: Ruj
  fullname: Ruj, Sushmita
  organization: SEECS, University of Ottawa
– sequence: 3
  givenname: Marcos A.
  surname: Cavenaghi
  fullname: Cavenaghi, Marcos A.
  organization: Unesp, Sao Paulo State University, DCo
– sequence: 4
  givenname: Milos
  surname: Stojmenovic
  fullname: Stojmenovic, Milos
  organization: Singidunum University
– sequence: 5
  givenname: Amiya
  surname: Nayak
  fullname: Nayak, Amiya
  organization: SEECS, University of Ottawa
BookMark eNp1kE9LAzEQxYNUsK1-AG8Bz6szyW52cyyl_oGil-I1ZNNsbW2TmmQRv70pK-LFwzDv8N6b4TchI-edJeQa4RYB6ruIDBpeALI8XBTNGRmjzEKUFYx-dckuyCTGHYBAXrExqWc0erPVe-ps-vThnerjMXht3mjyNIU-JnrQTm_swbpEt46-zp4Xq3hJzju9j_bqZ0_J6n6xmj8Wy5eHp_lsWRiOIhWikkbWYBBbLkuNglkA1q55yTsLddtIYxrNUaK0vFqX2LaVFdjxDkCWjE_JzVCbf_robUxq5_vg8kWFFTSScZmrpgQHlwk-xmA7dQzbgw5fCkGd8KgBj8p41AmPanKGDZmYvW5jw5_mf0PfJrFnAQ
CitedBy_id crossref_primary_10_1109_ACCESS_2018_2864189
crossref_primary_10_1016_j_comnet_2021_108558
crossref_primary_10_1016_j_seta_2023_103496
crossref_primary_10_1002_dac_3795
crossref_primary_10_1016_j_adhoc_2016_10_011
crossref_primary_10_1109_JIOT_2018_2880839
crossref_primary_10_1007_s13177_017_0136_4
crossref_primary_10_1109_ACCESS_2018_2872686
crossref_primary_10_3390_electronics10060654
crossref_primary_10_1007_s12083_015_0376_5
crossref_primary_10_1109_ACCESS_2018_2875678
crossref_primary_10_1109_TITS_2018_2818888
crossref_primary_10_2139_ssrn_3125919
crossref_primary_10_1016_j_iot_2019_100071
crossref_primary_10_1016_j_tranpol_2022_04_011
crossref_primary_10_1109_JIOT_2019_2957520
crossref_primary_10_1109_TITS_2020_3004041
crossref_primary_10_4018_IJSVST_2020010101
crossref_primary_10_3390_electronics10243105
crossref_primary_10_1016_j_rser_2023_113401
crossref_primary_10_1109_JIOT_2017_2720635
crossref_primary_10_1177_1550147720939372
crossref_primary_10_1016_j_vehcom_2018_04_006
crossref_primary_10_1155_2020_5129620
crossref_primary_10_1007_s12083_016_0445_4
crossref_primary_10_1080_1206212X_2020_1814557
crossref_primary_10_1002_dac_3111
crossref_primary_10_1109_TITS_2018_2889746
crossref_primary_10_1002_ett_3973
crossref_primary_10_3390_sym14061123
crossref_primary_10_1016_j_ijtst_2018_08_002
crossref_primary_10_1155_2021_9967829
crossref_primary_10_1007_s11276_023_03336_2
crossref_primary_10_1109_TVT_2023_3238507
crossref_primary_10_1109_TITS_2020_3038755
crossref_primary_10_1155_2016_7628231
crossref_primary_10_1109_TITS_2022_3191634
crossref_primary_10_1007_s13369_022_06753_1
crossref_primary_10_1155_2016_5185170
crossref_primary_10_1109_JSAC_2023_3310070
crossref_primary_10_1088_1757_899X_688_4_044051
crossref_primary_10_1109_JIOT_2024_3363755
crossref_primary_10_1007_s11277_018_6106_6
crossref_primary_10_1155_2021_7611619
crossref_primary_10_1007_s10462_017_9583_1
crossref_primary_10_1093_comjnl_bxw082
crossref_primary_10_1109_TCE_2024_3365616
crossref_primary_10_1007_s12083_023_01515_8
crossref_primary_10_1007_s11227_021_04227_z
crossref_primary_10_1109_COMST_2015_2453481
crossref_primary_10_1186_s13638_015_0353_y
crossref_primary_10_3390_s23125766
crossref_primary_10_1007_s41650_017_0025_7
crossref_primary_10_24017_science_2017_3_42
crossref_primary_10_1109_ACCESS_2021_3107467
crossref_primary_10_1145_3364181
crossref_primary_10_1186_s13673_020_00243_9
crossref_primary_10_1007_s00521_019_04246_1
crossref_primary_10_1007_s11277_020_07797_y
crossref_primary_10_1007_s10668_021_01632_5
crossref_primary_10_1109_TVT_2020_2981127
Cites_doi 10.1109/JSAC.2005.861389
10.1109/WI-IAT.2010.66
10.1016/S0278-0984(02)11030-3
10.1145/1287748.1287752
10.1109/ICPADS.2004.1316153
10.1109/INFCOM.2010.5461975
10.1109/ITST.2007.4295890
10.1109/ICC.2008.278
10.1145/345910.345955
10.1007/978-0-387-35612-9_9
10.1145/1151454.1151495
10.1109/GLOCOM.2010.5683313
10.1109/ISADS.2007.76
10.1109/MCOM.2008.4689252
10.1109/VETECF.2011.6093096
10.1017/CBO9780511761942
10.1007/978-3-540-73275-4_10
10.1109/INFCOM.2010.5462161
10.1109/AINA.2011.86
10.1109/GLOCOM.2009.5425220
10.1109/WOWMOM.2005.109
10.1109/INFCOM.2011.5935026
10.1145/1741866.1741879
ContentType Journal Article
Copyright Springer Science + Business Media, LLC 2012
Springer Science+Business Media New York 2014
Copyright_xml – notice: Springer Science + Business Media, LLC 2012
– notice: Springer Science+Business Media New York 2014
DBID AAYXX
CITATION
3V.
7SC
7XB
88I
8AL
8AO
8FD
8FE
8FG
8FK
8G5
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
GUQSH
HCIFZ
JQ2
K7-
L7M
L~C
L~D
M0N
M2O
M2P
MBDVC
P5Z
P62
PQEST
PQQKQ
PQUKI
PRINS
Q9U
DOI 10.1007/s12083-012-0136-8
DatabaseName CrossRef
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ProQuest Central (purchase pre-March 2016)
Science Database (Alumni Edition)
Computing Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
Research Library (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
Research Library Prep
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
Computing Database
Research Library
Science Database
Research Library (Corporate)
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Academic
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest Central Basic
DatabaseTitle CrossRef
Research Library Prep
Computer Science Database
ProQuest Central Student
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
Research Library (Alumni Edition)
ProQuest Pharma Collection
ProQuest Central China
ProQuest Central
ProQuest Central Korea
ProQuest Research Library
Advanced Technologies Database with Aerospace
Advanced Technologies & Aerospace Collection
ProQuest Computing
ProQuest Science Journals (Alumni Edition)
ProQuest Central Basic
ProQuest Science Journals
ProQuest Computing (Alumni Edition)
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest Central (Alumni)
DatabaseTitleList Research Library Prep

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1936-6450
EndPage 242
ExternalDocumentID 3251981261
10_1007_s12083_012_0136_8
Genre Feature
GroupedDBID -5B
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
06D
0R~
0VY
123
1N0
203
29O
29~
2JN
2JY
2KG
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
5VS
67Z
6NX
875
88I
8AO
8FE
8FG
8G5
8TC
96X
AAAVM
AABHQ
AAFGU
AAHNG
AAIAL
AAJKR
AANZL
AAPBV
AARHV
AARTL
AATNV
AATVU
AAUYE
AAWCG
AAYFA
AAYIU
AAYQN
AAYTO
ABBXA
ABDZT
ABECU
ABFGW
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKAS
ABKCH
ABMNI
ABMQK
ABQBU
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACBMV
ACBRV
ACBXY
ACBYP
ACGFS
ACGOD
ACHSB
ACIGE
ACIPQ
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACTTH
ACVWB
ACWMK
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMDM
ADOXG
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFTE
AEGAL
AEGNC
AEJHL
AEJRE
AENEX
AEOHA
AEPYU
AESKC
AESTI
AETLH
AEVLU
AEVTX
AEXYK
AFGCZ
AFKRA
AFLOW
AFNRJ
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGBP
AGJBK
AGMZJ
AGQMX
AGWZB
AGYKE
AHAVH
AHBYD
AHSBF
AHYZX
AIAKS
AIIXL
AILAN
AIMYW
AITGF
AJBLW
AJDOV
AJRNO
AJZVZ
AKQUC
ALFXC
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
ANMIH
AOCGG
ARAPS
ARCSS
AUKKA
AXYYD
AYJHY
AZQEC
B-.
BA0
BDATZ
BENPR
BGLVJ
BGNMA
BPHCQ
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DNIVK
DPUIP
DWQXO
EBLON
EBS
EIOEI
EJD
ESBYG
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GUQSH
GXS
HCIFZ
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
HZ~
I0C
IJ-
IKXTQ
IWAJR
IXC
IXD
IZIGR
IZQ
I~X
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K6V
K7-
KOV
LLZTM
M0N
M2O
M2P
M4Y
MA-
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
P62
P9P
PQQKQ
PROAC
PT4
Q2X
QOS
R89
RIG
RLLFE
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SDH
SEG
SHX
SISQX
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
T13
TH9
TSG
TSK
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W48
WK8
YLTOR
Z45
Z7R
Z7X
Z7Z
Z83
Z88
ZMTXR
~A9
AACDK
AAJBT
AASML
AAYXX
ABAKF
ACAOD
ACDTI
ACZOJ
AEFQL
AEMSY
AFBBN
AGQEE
AGRTI
AIGIU
CITATION
H13
SJYHP
7SC
7XB
8AL
8FD
8FK
JQ2
L7M
L~C
L~D
MBDVC
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c316t-659c970c11b394a162e002bd343fe07b89cc8a31919e35d41bb5e61f3f009423
IEDL.DBID AGYKE
ISSN 1936-6442
IngestDate Thu Oct 10 17:42:34 EDT 2024
Thu Sep 12 19:39:00 EDT 2024
Sat Dec 16 12:11:13 EST 2023
IsPeerReviewed true
IsScholarly true
Issue 3
Keywords Vehicular networks
Information oversampling
Security
Information cascading
P2P networks
Reputation system
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-659c970c11b394a162e002bd343fe07b89cc8a31919e35d41bb5e61f3f009423
PQID 1508923934
PQPubID 54523
PageCount 14
ParticipantIDs proquest_journals_1508923934
crossref_primary_10_1007_s12083_012_0136_8
springer_journals_10_1007_s12083_012_0136_8
PublicationCentury 2000
PublicationDate 2014-09-01
PublicationDateYYYYMMDD 2014-09-01
PublicationDate_xml – month: 09
  year: 2014
  text: 2014-09-01
  day: 01
PublicationDecade 2010
PublicationPlace Boston
PublicationPlace_xml – name: Boston
– name: Norwell
PublicationTitle Peer-to-peer networking and applications
PublicationTitleAbbrev Peer-to-Peer Netw. Appl
PublicationYear 2014
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Lu R, Lin X, Liang X, Shen X (2010) Sacrificing the plum tree for the peach tree: a socialspot tactic for protecting receiver-location privacy in VANET. In: Proc. IEEE Globecom’10, Miami, Florida, USA, 6–10 Dec 2010
Papadimitratos P, Buttyan L, Hubaux J-P, Kargl F, Kung A, Raya M (2007) Architecture for secure and private vehicular communications. In: IEEE ITST, pp 1–6
ZhangJChenCCohenRA scalable and effective trust-based framework for vehicular ad-hoc networksJoWUA201014315
Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: Proc. IEEE INFOCOM’10, San Diego, California, USA, 14–19 March 2010
Minhas U, Zhang J, Tran T, Cohen R (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty, pp 243–247
Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In: Proceedings of the security protocols workshop, pp 47–66
Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Mobile ad hoc networks. communication and multimedia security
Li X, Li Z, Stojmenovic M, Narasimhan V, Nayak A (2012) Autoregressive trust management in wireless Ad Hoc networks. In: Ad Hoc sensor wireless networks, (to appear)
Adams WJ, Davis NJ (2005) Toward a decentralized trust-based access control system for dynamic collaboration. In: IEEE workshop on information assurance, pp 317–324
Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. In: Baye MR (ed) The economics of the internet and E-commerce. Advances in applied microeconomics. Elsevier Science, pp 127–157
Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A (2007) Efficient and robust pseudonymous authentication in vanet. In: Holfelder W, Santi P, Hu Y-C, Hubaux J-P (eds) Vehicular ad hoc networks, pp 19–28
MinhasUFZhangJTranTCohenRTowards expanded trust management for agents in vehicular ad-hoc networksIJCITP201051315
Acemoglu D, Dahleh MA, Lobel I, Ozdaglar A (2010) Bayesian learning in social networks. Available at http://web.mit.edu/newsoffice/2010/crowd-wisdom-1115.html
Zhang J (2011) A survey on trust management for vanets. In: 25th IEEE international conference on advanced information networking and applications, pp 105–112
Raya M (2009) Data-centric trust in ephemeral networks. PhD thesis. EPFL, Lausanne
Fahnrich S, Obreiter P (2004) The buddy system—a distributed reputation system based on social structure. Technical report, Universitat Karlsruhe, Faculty of Informatics
Zhang J, Cohen R (2006) Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings. In: 8th international conference on electronic commerce: the new e-commerce—innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, pp 225–234
Zhu H, Lin X, Lu R, Ho P-H, Shen X (2008) Aema: an aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In: IEEE ICC, pp 1436–1440
Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: IEEE international conference on parallel and distributed systems, pp 665–672
Ruj S, Cavenaghi MA, Huang Z, Nayak A, Stojmenovic I (2011) On data centric misbehavior detection in VANETs. In: IEEE 74th Vehicular Technology Conference, VTC-Fall, San Francisco, USA
Schmidt RK, Leinmuller T, Schoch E, Held A, Schafer G (2008) Vehicle behavior analysis to enhance security in vanets. In: Workshop on vehicle to vehicle communications
Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. IEEE INFOCOM’11, Shanghai, China, 10–15 April 2011
Easley D, Kleinberg J (2010). Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press
Gerlach M (2007) Trust for vehicular applications. In: International symposium on autonomous decentralized systems, pp 295–304
LuRLiXLiangXLinXShenXGRS: The green, reliability, and security of emergingmachine to machine communicationsIEEE Commun Mag (Feature topic on recent progress in machine to machine communications)20114942835
Wasef A, Shen X (2009) Maac: message authentication acceleration protocol for vehicular ad hoc networks. In: IEEE GLOBECOM, pp 1–6
Huang Z, Ruj S, Cavenaghi MA, Nayak A (2011) Limitations of trust management schemes in VANET and countermeasures. In: IEEE PIMRC
Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology, pp 243–247
Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: MOBICOM, pp 255–265
PapadimitratosPButtyanLHolczerTSchochEFreudigerJRayaMMaZKarglFKungAHubauxJPSecure vehicular communication systems: design and architectureIEEE Wirel Commun Mag2008461110010910.1109/MCOM.2008.4689252
Freudiger J, Manshaei MH, Le Boudec J-Y, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. In: IEEE INFOCOM, pp 1577–1585
LoN-WTsaiH-CA reputation system for traffic safety event on vehicular ad hoc networksEURASIP - Journal on Wireless Communications and Networking2009
SunYLHanZRay LiuKJInformation theoretic framework of trust modeling and evaluation for ad hoc networksIEEE J Sel Areas Commun200624230531710.1109/JSAC.2005.8613891100.65096
Buttyán L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: ESAS. Lecture notes in computer science, vol 4572, pp 129–141
Raya M, Shokri R, Hubaux J-P (2010) On the tradeoff between trust and privacy in wireless ad hoc networks. In: ACM WISEC, pp 75–80
Dotzer F, Fischer L, Magiera P (2005) Vars: a vehicle ad-hoc network reputation system. In: IEEE international symposium on a world of wireless mobile and multimedia networks, pp 454–456
136_CR7
136_CR6
136_CR9
R Lu (136_CR28) 2011; 49
J Zhang (136_CR24) 2010; 1
136_CR3
136_CR2
136_CR5
136_CR4
136_CR26
136_CR1
136_CR25
136_CR23
136_CR22
136_CR21
136_CR18
YL Sun (136_CR27) 2006; 24
136_CR17
P Papadimitratos (136_CR8) 2008; 46
136_CR30
136_CR16
136_CR15
136_CR14
136_CR36
136_CR13
136_CR35
136_CR12
N-W Lo (136_CR19) 2009
136_CR34
136_CR11
136_CR33
136_CR10
136_CR32
136_CR31
136_CR29
UF Minhas (136_CR20) 2010; 5
References_xml – volume: 24
  start-page: 305
  issue: 2
  year: 2006
  ident: 136_CR27
  publication-title: IEEE J Sel Areas Commun
  doi: 10.1109/JSAC.2005.861389
  contributor:
    fullname: YL Sun
– volume: 49
  start-page: 28
  issue: 4
  year: 2011
  ident: 136_CR28
  publication-title: IEEE Commun Mag (Feature topic on recent progress in machine to machine communications)
  contributor:
    fullname: R Lu
– ident: 136_CR36
  doi: 10.1109/WI-IAT.2010.66
– ident: 136_CR17
  doi: 10.1016/S0278-0984(02)11030-3
– ident: 136_CR12
  doi: 10.1145/1287748.1287752
– ident: 136_CR16
– ident: 136_CR33
  doi: 10.1109/ICPADS.2004.1316153
– ident: 136_CR11
  doi: 10.1109/INFCOM.2010.5461975
– ident: 136_CR9
  doi: 10.1109/ITST.2007.4295890
– year: 2009
  ident: 136_CR19
  publication-title: EURASIP - Journal on Wireless Communications and Networking
  contributor:
    fullname: N-W Lo
– ident: 136_CR3
  doi: 10.1109/ICC.2008.278
– ident: 136_CR30
  doi: 10.1145/345910.345955
– ident: 136_CR21
  doi: 10.1109/WI-IAT.2010.66
– ident: 136_CR31
  doi: 10.1007/978-0-387-35612-9_9
– ident: 136_CR26
– ident: 136_CR34
  doi: 10.1145/1151454.1151495
– ident: 136_CR6
  doi: 10.1109/GLOCOM.2010.5683313
– ident: 136_CR35
  doi: 10.1109/ISADS.2007.76
– volume: 1
  start-page: 3
  issue: 4
  year: 2010
  ident: 136_CR24
  publication-title: JoWUA
  contributor:
    fullname: J Zhang
– volume: 46
  start-page: 100
  issue: 11
  year: 2008
  ident: 136_CR8
  publication-title: IEEE Wirel Commun Mag
  doi: 10.1109/MCOM.2008.4689252
  contributor:
    fullname: P Papadimitratos
– ident: 136_CR7
  doi: 10.1109/VETECF.2011.6093096
– ident: 136_CR15
– ident: 136_CR14
  doi: 10.1017/CBO9780511761942
– ident: 136_CR10
  doi: 10.1007/978-3-540-73275-4_10
– ident: 136_CR4
  doi: 10.1109/INFCOM.2010.5462161
– ident: 136_CR25
– ident: 136_CR1
– ident: 136_CR23
– ident: 136_CR13
  doi: 10.1109/AINA.2011.86
– ident: 136_CR2
  doi: 10.1109/GLOCOM.2009.5425220
– volume: 5
  start-page: 3
  issue: 1
  year: 2010
  ident: 136_CR20
  publication-title: IJCITP
  contributor:
    fullname: UF Minhas
– ident: 136_CR18
  doi: 10.1109/WOWMOM.2005.109
– ident: 136_CR32
– ident: 136_CR5
  doi: 10.1109/INFCOM.2011.5935026
– ident: 136_CR22
  doi: 10.1145/1741866.1741879
– ident: 136_CR29
SSID ssj0061352
Score 2.3442292
Snippet In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct...
Issue Title: The Green, Reliability and Security of Machine-to-Machine Communications In the past few years, vehicular ad hoc networks(VANETs) was studied...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Publisher
StartPage 229
SubjectTerms Communications Engineering
Communications networks
Computer Communication Networks
Engineering
Information Systems and Communication Service
Networks
Peer to peer computing
Signal,Image and Speech Processing
Social networks
Vehicles
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LSwMxEB60vehBfGK1Sg6elOBmk81uTlKlpQgWkSq9LZsXeHBbaf8_TvZhq6DnQA7fkJlvJjPfAFx5bRRGVR7GPhKKEcpTbRNLszBFKYpI-SzMOz9N5PhVPM6SWVNwWzZtla1PrBy1nZtQI78NuuUq6HWJu8UnDVujwu9qs0JjG7oxZgpRB7r3w8nzS-uLMVZVO3eQpUiKkT9u_zWr4bkY6Qem0qE1Iajy_oxMa7r564e0CjyjfdhrGCMZ1CY-gC1XHsLuho7gEaQDUte-SVl3dZNWKpys5qQaqyAf330u5L0kb4PJcLo8huloOH0Y02YjAjWcyRWViTIqjQxjmitRMBk79GjacsG9i1KdKWOyAl8VU44nVjCtEyeZ5z50EMb8BDrlvHSnQHiaFt57zB6tE77QWqrMeOlEIZm1UdSD6xaMfFHrXuRrheOAXI7I5QG5POtBv4Urb57AMl8brAc3LYQbx39ddvb_Zeewg5xF1G1efegghu4CecFKXzbG_wI37LI7
  priority: 102
  providerName: ProQuest
Title A social network approach to trust management in VANETs
URI https://link.springer.com/article/10.1007/s12083-012-0136-8
https://www.proquest.com/docview/1508923934
Volume 7
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8MwGH6Z20UPfovTOXLwpHS0TZo2xyrdhuIQ2WSeSpMmIMNOWL346036sc2vw06FtgT6NMn7JO_7PAG4VFwwHVWxkX14lo5QyuKpl1qBUVGSxGYqMHrnhxEdTsjd1Js2wF1uXWSzXp2RLCbqldbN1WxBr3xNJYEx0d2CVqU7bYWDl_uonn91fCrO2dHMhFo62rt1LvOvRr5HoxXF_JEVLYJNf68UAC4Kj0JTYzLrfeS8Jz5_Ozhu8B37sFtxTxSWneUAGjI7hJ01R8Ij8ENU7qKjrKwPR7XpOMrnqBBooLdlxQx6zdBzOIrGi2MY96Px7dCqzlawBHZoblGPCebbwnE4ZiRxqCv13MhTTLCSts8DJkSQ6PHpMIm9lDice5I6CitTi-jiE2hm80yeAsK-nyil9Do0lUQlnFMWCEUlSaiTprbdhqsa4vi9dNCIV17JBoxYgxEbMOKgDZ36J8TVYFrExrKeGas20obrGtS1x_81drbR2-ewrckQKevHOtDUkMoLTThy3oWtoD_oVv1MX2-i0eOTvjtxwy_5xMyM
link.rule.ids 315,783,787,12777,21400,27936,27937,33385,33756,41093,41535,42162,42604,43612,43817,52123,52246,74363,74630
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV09T8MwED1BGYAB8SkKBTwwgSzi2HHiCVWopUDbqaBuVvwlMZAWtf9f2PmgBQnmSB6e43vP57t3ANdOaeFZlYa2jwR7hnJYmcTgLHRRsjwSLgv9zqMxH7yy52kyrRNui7qssomJZaA2Mx1y5HfBt1wEvy52P__EYWpUeF2tR2hswhajnqtDp3j_sYnEnqnKiTteo3DseT9uXjXL1rnYiw9_kQ6FCcGT9ycvrcTmr_fRknb6-7BX60XUrTb4ADZscQi7ay6CR5B2UZX5RkVV040ao3C0nKGyqQJ9fFe5oPcCvXXHvcniGCb93uRhgOt5CFhTwpeYJ0KLNNKEKCpYTnhsfTxThjLqbJSqTGid5f5MEWFpYhhRKrGcOOpC_WBMT6BVzAp7Coimae6c83dHY5nLleIi045blnNiTBS14aYBQ84r1wu58jcOyEmPnAzIyawNnQYuWR-AhVxtVxtuGwjXPv-12Nn_i13B9mAyGsrh0_jlHHa8emFVwVcHWh5Pe-EVwlJdlr_BF6Ogs8Y
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3LSgMxFL1oC6IL8YnVqlm4UkJnJpnMZCVVW-qrFKnSXZi8wIXTSvv_mMzDVkHXgSxOkntPknPPBbiwUnGXVYkv-4ixy1AWSx1rnPoqSpoF3Ka-3vl5yAav9GESTyr907ySVdYxsQjUeqr8G3nH-5Zz79dFO7aSRYzu-tezT-w7SPmf1qqdxjo0E8pI0IDmTW84eqnjsstbRf8dx1gYdiwgqv84i0K6yFERd632MgXv0PszSy2p56_f0iIJ9Xdgu2KPqFsu9y6smXwPtlY8Bfch6aLyHRzlpcIb1bbhaDFFRYkF-vjWvKD3HL11h73x_ADG_d74doCr7ghYkZAtMIu54kmgwlASTrOQRcZFN6kJJdYEiUy5UmnmTljIDYk1DaWMDQstsV5NGJFDaOTT3BwBIkmSWWvdTVIbajMpGU-VZYZmLNQ6CFpwWYMhZqUHhli6HXvkhENOeORE2oJ2DZeojsNcLBevBVc1hCvDf012_P9k57Dh9oB4uh8-nsCmozK0VH-1oeHgNKeOLizkWbUPvgBWSblj
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+social+network+approach+to+trust+management+in+VANETs&rft.jtitle=Peer-to-peer+networking+and+applications&rft.au=Huang%2C+Zhen&rft.au=Ruj%2C+Sushmita&rft.au=Cavenaghi%2C+Marcos+A.&rft.au=Stojmenovic%2C+Milos&rft.date=2014-09-01&rft.pub=Springer+US&rft.issn=1936-6442&rft.eissn=1936-6450&rft.volume=7&rft.issue=3&rft.spage=229&rft.epage=242&rft_id=info:doi/10.1007%2Fs12083-012-0136-8&rft.externalDocID=10_1007_s12083_012_0136_8
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1936-6442&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1936-6442&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1936-6442&client=summon