A social network approach to trust management in VANETs
In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VA...
Saved in:
Published in | Peer-to-peer networking and applications Vol. 7; no. 3; pp. 229 - 242 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Boston
Springer US
01.09.2014
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting. |
---|---|
AbstractList | Issue Title: The Green, Reliability and Security of Machine-to-Machine Communications In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting.[PUBLICATION ABSTRACT] In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting. |
Author | Cavenaghi, Marcos A. Stojmenovic, Milos Huang, Zhen Ruj, Sushmita Nayak, Amiya |
Author_xml | – sequence: 1 givenname: Zhen surname: Huang fullname: Huang, Zhen email: robertzhen1988@hotmail.com organization: SEECS, University of Ottawa – sequence: 2 givenname: Sushmita surname: Ruj fullname: Ruj, Sushmita organization: SEECS, University of Ottawa – sequence: 3 givenname: Marcos A. surname: Cavenaghi fullname: Cavenaghi, Marcos A. organization: Unesp, Sao Paulo State University, DCo – sequence: 4 givenname: Milos surname: Stojmenovic fullname: Stojmenovic, Milos organization: Singidunum University – sequence: 5 givenname: Amiya surname: Nayak fullname: Nayak, Amiya organization: SEECS, University of Ottawa |
BookMark | eNp1kE9LAzEQxYNUsK1-AG8Bz6szyW52cyyl_oGil-I1ZNNsbW2TmmQRv70pK-LFwzDv8N6b4TchI-edJeQa4RYB6ruIDBpeALI8XBTNGRmjzEKUFYx-dckuyCTGHYBAXrExqWc0erPVe-ps-vThnerjMXht3mjyNIU-JnrQTm_swbpEt46-zp4Xq3hJzju9j_bqZ0_J6n6xmj8Wy5eHp_lsWRiOIhWikkbWYBBbLkuNglkA1q55yTsLddtIYxrNUaK0vFqX2LaVFdjxDkCWjE_JzVCbf_robUxq5_vg8kWFFTSScZmrpgQHlwk-xmA7dQzbgw5fCkGd8KgBj8p41AmPanKGDZmYvW5jw5_mf0PfJrFnAQ |
CitedBy_id | crossref_primary_10_1109_ACCESS_2018_2864189 crossref_primary_10_1016_j_comnet_2021_108558 crossref_primary_10_1016_j_seta_2023_103496 crossref_primary_10_1002_dac_3795 crossref_primary_10_1016_j_adhoc_2016_10_011 crossref_primary_10_1109_JIOT_2018_2880839 crossref_primary_10_1007_s13177_017_0136_4 crossref_primary_10_1109_ACCESS_2018_2872686 crossref_primary_10_3390_electronics10060654 crossref_primary_10_1007_s12083_015_0376_5 crossref_primary_10_1109_ACCESS_2018_2875678 crossref_primary_10_1109_TITS_2018_2818888 crossref_primary_10_2139_ssrn_3125919 crossref_primary_10_1016_j_iot_2019_100071 crossref_primary_10_1016_j_tranpol_2022_04_011 crossref_primary_10_1109_JIOT_2019_2957520 crossref_primary_10_1109_TITS_2020_3004041 crossref_primary_10_4018_IJSVST_2020010101 crossref_primary_10_3390_electronics10243105 crossref_primary_10_1016_j_rser_2023_113401 crossref_primary_10_1109_JIOT_2017_2720635 crossref_primary_10_1177_1550147720939372 crossref_primary_10_1016_j_vehcom_2018_04_006 crossref_primary_10_1155_2020_5129620 crossref_primary_10_1007_s12083_016_0445_4 crossref_primary_10_1080_1206212X_2020_1814557 crossref_primary_10_1002_dac_3111 crossref_primary_10_1109_TITS_2018_2889746 crossref_primary_10_1002_ett_3973 crossref_primary_10_3390_sym14061123 crossref_primary_10_1016_j_ijtst_2018_08_002 crossref_primary_10_1155_2021_9967829 crossref_primary_10_1007_s11276_023_03336_2 crossref_primary_10_1109_TVT_2023_3238507 crossref_primary_10_1109_TITS_2020_3038755 crossref_primary_10_1155_2016_7628231 crossref_primary_10_1109_TITS_2022_3191634 crossref_primary_10_1007_s13369_022_06753_1 crossref_primary_10_1155_2016_5185170 crossref_primary_10_1109_JSAC_2023_3310070 crossref_primary_10_1088_1757_899X_688_4_044051 crossref_primary_10_1109_JIOT_2024_3363755 crossref_primary_10_1007_s11277_018_6106_6 crossref_primary_10_1155_2021_7611619 crossref_primary_10_1007_s10462_017_9583_1 crossref_primary_10_1093_comjnl_bxw082 crossref_primary_10_1109_TCE_2024_3365616 crossref_primary_10_1007_s12083_023_01515_8 crossref_primary_10_1007_s11227_021_04227_z crossref_primary_10_1109_COMST_2015_2453481 crossref_primary_10_1186_s13638_015_0353_y crossref_primary_10_3390_s23125766 crossref_primary_10_1007_s41650_017_0025_7 crossref_primary_10_24017_science_2017_3_42 crossref_primary_10_1109_ACCESS_2021_3107467 crossref_primary_10_1145_3364181 crossref_primary_10_1186_s13673_020_00243_9 crossref_primary_10_1007_s00521_019_04246_1 crossref_primary_10_1007_s11277_020_07797_y crossref_primary_10_1007_s10668_021_01632_5 crossref_primary_10_1109_TVT_2020_2981127 |
Cites_doi | 10.1109/JSAC.2005.861389 10.1109/WI-IAT.2010.66 10.1016/S0278-0984(02)11030-3 10.1145/1287748.1287752 10.1109/ICPADS.2004.1316153 10.1109/INFCOM.2010.5461975 10.1109/ITST.2007.4295890 10.1109/ICC.2008.278 10.1145/345910.345955 10.1007/978-0-387-35612-9_9 10.1145/1151454.1151495 10.1109/GLOCOM.2010.5683313 10.1109/ISADS.2007.76 10.1109/MCOM.2008.4689252 10.1109/VETECF.2011.6093096 10.1017/CBO9780511761942 10.1007/978-3-540-73275-4_10 10.1109/INFCOM.2010.5462161 10.1109/AINA.2011.86 10.1109/GLOCOM.2009.5425220 10.1109/WOWMOM.2005.109 10.1109/INFCOM.2011.5935026 10.1145/1741866.1741879 |
ContentType | Journal Article |
Copyright | Springer Science + Business Media, LLC 2012 Springer Science+Business Media New York 2014 |
Copyright_xml | – notice: Springer Science + Business Media, LLC 2012 – notice: Springer Science+Business Media New York 2014 |
DBID | AAYXX CITATION 3V. 7SC 7XB 88I 8AL 8AO 8FD 8FE 8FG 8FK 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ GUQSH HCIFZ JQ2 K7- L7M L~C L~D M0N M2O M2P MBDVC P5Z P62 PQEST PQQKQ PQUKI PRINS Q9U |
DOI | 10.1007/s12083-012-0136-8 |
DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts ProQuest Central (purchase pre-March 2016) Science Database (Alumni Edition) Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Research Library (Alumni Edition) ProQuest Central (Alumni) ProQuest Central Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional Computing Database Research Library Science Database Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
DatabaseTitle | CrossRef Research Library Prep Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Pharma Collection ProQuest Central China ProQuest Central ProQuest Central Korea ProQuest Research Library Advanced Technologies Database with Aerospace Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Science Journals (Alumni Edition) ProQuest Central Basic ProQuest Science Journals ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest Central (Alumni) |
DatabaseTitleList | Research Library Prep |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1936-6450 |
EndPage | 242 |
ExternalDocumentID | 3251981261 10_1007_s12083_012_0136_8 |
Genre | Feature |
GroupedDBID | -5B -5G -BR -EM -Y2 -~C .4S .86 .DC 06D 0R~ 0VY 123 1N0 203 29O 29~ 2JN 2JY 2KG 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 5VS 67Z 6NX 875 88I 8AO 8FE 8FG 8G5 8TC 96X AAAVM AABHQ AAFGU AAHNG AAIAL AAJKR AANZL AAPBV AARHV AARTL AATNV AATVU AAUYE AAWCG AAYFA AAYIU AAYQN AAYTO ABBXA ABDZT ABECU ABFGW ABFTD ABFTV ABHQN ABJNI ABJOX ABKAS ABKCH ABMNI ABMQK ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACBMV ACBRV ACBXY ACBYP ACGFS ACGOD ACHSB ACIGE ACIPQ ACKNC ACMDZ ACMLO ACOKC ACOMO ACTTH ACVWB ACWMK ADHHG ADHIR ADINQ ADKNI ADKPE ADMDM ADOXG ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFTE AEGAL AEGNC AEJHL AEJRE AENEX AEOHA AEPYU AESKC AESTI AETLH AEVLU AEVTX AEXYK AFGCZ AFKRA AFLOW AFNRJ AFQWF AFWTZ AFZKB AGAYW AGDGC AGGBP AGJBK AGMZJ AGQMX AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIIXL AILAN AIMYW AITGF AJBLW AJDOV AJRNO AJZVZ AKQUC ALFXC ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR ANMIH AOCGG ARAPS ARCSS AUKKA AXYYD AYJHY AZQEC B-. BA0 BDATZ BENPR BGLVJ BGNMA BPHCQ CAG CCPQU COF CS3 CSCUP DDRTE DNIVK DPUIP DWQXO EBLON EBS EIOEI EJD ESBYG FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GUQSH GXS HCIFZ HF~ HG5 HG6 HLICF HMJXF HQYDN HRMNR HZ~ I0C IJ- IKXTQ IWAJR IXC IXD IZIGR IZQ I~X J-C J0Z JBSCW JCJTX JZLTJ K6V K7- KOV LLZTM M0N M2O M2P M4Y MA- NPVJJ NQJWS NU0 O9- O93 O9J OAM P62 P9P PQQKQ PROAC PT4 Q2X QOS R89 RIG RLLFE RNS ROL RPX RSV S16 S1Z S27 S3B SAP SDH SEG SHX SISQX SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE T13 TH9 TSG TSK TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W48 WK8 YLTOR Z45 Z7R Z7X Z7Z Z83 Z88 ZMTXR ~A9 AACDK AAJBT AASML AAYXX ABAKF ACAOD ACDTI ACZOJ AEFQL AEMSY AFBBN AGQEE AGRTI AIGIU CITATION H13 SJYHP 7SC 7XB 8AL 8FD 8FK JQ2 L7M L~C L~D MBDVC PQEST PQUKI PRINS Q9U |
ID | FETCH-LOGICAL-c316t-659c970c11b394a162e002bd343fe07b89cc8a31919e35d41bb5e61f3f009423 |
IEDL.DBID | AGYKE |
ISSN | 1936-6442 |
IngestDate | Thu Oct 10 17:42:34 EDT 2024 Thu Sep 12 19:39:00 EDT 2024 Sat Dec 16 12:11:13 EST 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Keywords | Vehicular networks Information oversampling Security Information cascading P2P networks Reputation system |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-659c970c11b394a162e002bd343fe07b89cc8a31919e35d41bb5e61f3f009423 |
PQID | 1508923934 |
PQPubID | 54523 |
PageCount | 14 |
ParticipantIDs | proquest_journals_1508923934 crossref_primary_10_1007_s12083_012_0136_8 springer_journals_10_1007_s12083_012_0136_8 |
PublicationCentury | 2000 |
PublicationDate | 2014-09-01 |
PublicationDateYYYYMMDD | 2014-09-01 |
PublicationDate_xml | – month: 09 year: 2014 text: 2014-09-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | Boston |
PublicationPlace_xml | – name: Boston – name: Norwell |
PublicationTitle | Peer-to-peer networking and applications |
PublicationTitleAbbrev | Peer-to-Peer Netw. Appl |
PublicationYear | 2014 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Lu R, Lin X, Liang X, Shen X (2010) Sacrificing the plum tree for the peach tree: a socialspot tactic for protecting receiver-location privacy in VANET. In: Proc. IEEE Globecom’10, Miami, Florida, USA, 6–10 Dec 2010 Papadimitratos P, Buttyan L, Hubaux J-P, Kargl F, Kung A, Raya M (2007) Architecture for secure and private vehicular communications. In: IEEE ITST, pp 1–6 ZhangJChenCCohenRA scalable and effective trust-based framework for vehicular ad-hoc networksJoWUA201014315 Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: Proc. IEEE INFOCOM’10, San Diego, California, USA, 14–19 March 2010 Minhas U, Zhang J, Tran T, Cohen R (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty, pp 243–247 Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In: Proceedings of the security protocols workshop, pp 47–66 Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Mobile ad hoc networks. communication and multimedia security Li X, Li Z, Stojmenovic M, Narasimhan V, Nayak A (2012) Autoregressive trust management in wireless Ad Hoc networks. In: Ad Hoc sensor wireless networks, (to appear) Adams WJ, Davis NJ (2005) Toward a decentralized trust-based access control system for dynamic collaboration. In: IEEE workshop on information assurance, pp 317–324 Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. In: Baye MR (ed) The economics of the internet and E-commerce. Advances in applied microeconomics. Elsevier Science, pp 127–157 Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A (2007) Efficient and robust pseudonymous authentication in vanet. In: Holfelder W, Santi P, Hu Y-C, Hubaux J-P (eds) Vehicular ad hoc networks, pp 19–28 MinhasUFZhangJTranTCohenRTowards expanded trust management for agents in vehicular ad-hoc networksIJCITP201051315 Acemoglu D, Dahleh MA, Lobel I, Ozdaglar A (2010) Bayesian learning in social networks. Available at http://web.mit.edu/newsoffice/2010/crowd-wisdom-1115.html Zhang J (2011) A survey on trust management for vanets. In: 25th IEEE international conference on advanced information networking and applications, pp 105–112 Raya M (2009) Data-centric trust in ephemeral networks. PhD thesis. EPFL, Lausanne Fahnrich S, Obreiter P (2004) The buddy system—a distributed reputation system based on social structure. Technical report, Universitat Karlsruhe, Faculty of Informatics Zhang J, Cohen R (2006) Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings. In: 8th international conference on electronic commerce: the new e-commerce—innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, pp 225–234 Zhu H, Lin X, Lu R, Ho P-H, Shen X (2008) Aema: an aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In: IEEE ICC, pp 1436–1440 Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: IEEE international conference on parallel and distributed systems, pp 665–672 Ruj S, Cavenaghi MA, Huang Z, Nayak A, Stojmenovic I (2011) On data centric misbehavior detection in VANETs. In: IEEE 74th Vehicular Technology Conference, VTC-Fall, San Francisco, USA Schmidt RK, Leinmuller T, Schoch E, Held A, Schafer G (2008) Vehicle behavior analysis to enhance security in vanets. In: Workshop on vehicle to vehicle communications Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. IEEE INFOCOM’11, Shanghai, China, 10–15 April 2011 Easley D, Kleinberg J (2010). Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press Gerlach M (2007) Trust for vehicular applications. In: International symposium on autonomous decentralized systems, pp 295–304 LuRLiXLiangXLinXShenXGRS: The green, reliability, and security of emergingmachine to machine communicationsIEEE Commun Mag (Feature topic on recent progress in machine to machine communications)20114942835 Wasef A, Shen X (2009) Maac: message authentication acceleration protocol for vehicular ad hoc networks. In: IEEE GLOBECOM, pp 1–6 Huang Z, Ruj S, Cavenaghi MA, Nayak A (2011) Limitations of trust management schemes in VANET and countermeasures. In: IEEE PIMRC Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology, pp 243–247 Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: MOBICOM, pp 255–265 PapadimitratosPButtyanLHolczerTSchochEFreudigerJRayaMMaZKarglFKungAHubauxJPSecure vehicular communication systems: design and architectureIEEE Wirel Commun Mag2008461110010910.1109/MCOM.2008.4689252 Freudiger J, Manshaei MH, Le Boudec J-Y, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. In: IEEE INFOCOM, pp 1577–1585 LoN-WTsaiH-CA reputation system for traffic safety event on vehicular ad hoc networksEURASIP - Journal on Wireless Communications and Networking2009 SunYLHanZRay LiuKJInformation theoretic framework of trust modeling and evaluation for ad hoc networksIEEE J Sel Areas Commun200624230531710.1109/JSAC.2005.8613891100.65096 Buttyán L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: ESAS. Lecture notes in computer science, vol 4572, pp 129–141 Raya M, Shokri R, Hubaux J-P (2010) On the tradeoff between trust and privacy in wireless ad hoc networks. In: ACM WISEC, pp 75–80 Dotzer F, Fischer L, Magiera P (2005) Vars: a vehicle ad-hoc network reputation system. In: IEEE international symposium on a world of wireless mobile and multimedia networks, pp 454–456 136_CR7 136_CR6 136_CR9 R Lu (136_CR28) 2011; 49 J Zhang (136_CR24) 2010; 1 136_CR3 136_CR2 136_CR5 136_CR4 136_CR26 136_CR1 136_CR25 136_CR23 136_CR22 136_CR21 136_CR18 YL Sun (136_CR27) 2006; 24 136_CR17 P Papadimitratos (136_CR8) 2008; 46 136_CR30 136_CR16 136_CR15 136_CR14 136_CR36 136_CR13 136_CR35 136_CR12 N-W Lo (136_CR19) 2009 136_CR34 136_CR11 136_CR33 136_CR10 136_CR32 136_CR31 136_CR29 UF Minhas (136_CR20) 2010; 5 |
References_xml | – volume: 24 start-page: 305 issue: 2 year: 2006 ident: 136_CR27 publication-title: IEEE J Sel Areas Commun doi: 10.1109/JSAC.2005.861389 contributor: fullname: YL Sun – volume: 49 start-page: 28 issue: 4 year: 2011 ident: 136_CR28 publication-title: IEEE Commun Mag (Feature topic on recent progress in machine to machine communications) contributor: fullname: R Lu – ident: 136_CR36 doi: 10.1109/WI-IAT.2010.66 – ident: 136_CR17 doi: 10.1016/S0278-0984(02)11030-3 – ident: 136_CR12 doi: 10.1145/1287748.1287752 – ident: 136_CR16 – ident: 136_CR33 doi: 10.1109/ICPADS.2004.1316153 – ident: 136_CR11 doi: 10.1109/INFCOM.2010.5461975 – ident: 136_CR9 doi: 10.1109/ITST.2007.4295890 – year: 2009 ident: 136_CR19 publication-title: EURASIP - Journal on Wireless Communications and Networking contributor: fullname: N-W Lo – ident: 136_CR3 doi: 10.1109/ICC.2008.278 – ident: 136_CR30 doi: 10.1145/345910.345955 – ident: 136_CR21 doi: 10.1109/WI-IAT.2010.66 – ident: 136_CR31 doi: 10.1007/978-0-387-35612-9_9 – ident: 136_CR26 – ident: 136_CR34 doi: 10.1145/1151454.1151495 – ident: 136_CR6 doi: 10.1109/GLOCOM.2010.5683313 – ident: 136_CR35 doi: 10.1109/ISADS.2007.76 – volume: 1 start-page: 3 issue: 4 year: 2010 ident: 136_CR24 publication-title: JoWUA contributor: fullname: J Zhang – volume: 46 start-page: 100 issue: 11 year: 2008 ident: 136_CR8 publication-title: IEEE Wirel Commun Mag doi: 10.1109/MCOM.2008.4689252 contributor: fullname: P Papadimitratos – ident: 136_CR7 doi: 10.1109/VETECF.2011.6093096 – ident: 136_CR15 – ident: 136_CR14 doi: 10.1017/CBO9780511761942 – ident: 136_CR10 doi: 10.1007/978-3-540-73275-4_10 – ident: 136_CR4 doi: 10.1109/INFCOM.2010.5462161 – ident: 136_CR25 – ident: 136_CR1 – ident: 136_CR23 – ident: 136_CR13 doi: 10.1109/AINA.2011.86 – ident: 136_CR2 doi: 10.1109/GLOCOM.2009.5425220 – volume: 5 start-page: 3 issue: 1 year: 2010 ident: 136_CR20 publication-title: IJCITP contributor: fullname: UF Minhas – ident: 136_CR18 doi: 10.1109/WOWMOM.2005.109 – ident: 136_CR32 – ident: 136_CR5 doi: 10.1109/INFCOM.2011.5935026 – ident: 136_CR22 doi: 10.1145/1741866.1741879 – ident: 136_CR29 |
SSID | ssj0061352 |
Score | 2.3442292 |
Snippet | In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct... Issue Title: The Green, Reliability and Security of Machine-to-Machine Communications In the past few years, vehicular ad hoc networks(VANETs) was studied... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Publisher |
StartPage | 229 |
SubjectTerms | Communications Engineering Communications networks Computer Communication Networks Engineering Information Systems and Communication Service Networks Peer to peer computing Signal,Image and Speech Processing Social networks Vehicles |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1LSwMxEB60vehBfGK1Sg6elOBmk81uTlKlpQgWkSq9LZsXeHBbaf8_TvZhq6DnQA7fkJlvJjPfAFx5bRRGVR7GPhKKEcpTbRNLszBFKYpI-SzMOz9N5PhVPM6SWVNwWzZtla1PrBy1nZtQI78NuuUq6HWJu8UnDVujwu9qs0JjG7oxZgpRB7r3w8nzS-uLMVZVO3eQpUiKkT9u_zWr4bkY6Qem0qE1Iajy_oxMa7r564e0CjyjfdhrGCMZ1CY-gC1XHsLuho7gEaQDUte-SVl3dZNWKpys5qQaqyAf330u5L0kb4PJcLo8huloOH0Y02YjAjWcyRWViTIqjQxjmitRMBk79GjacsG9i1KdKWOyAl8VU44nVjCtEyeZ5z50EMb8BDrlvHSnQHiaFt57zB6tE77QWqrMeOlEIZm1UdSD6xaMfFHrXuRrheOAXI7I5QG5POtBv4Urb57AMl8brAc3LYQbx39ddvb_Zeewg5xF1G1efegghu4CecFKXzbG_wI37LI7 priority: 102 providerName: ProQuest |
Title | A social network approach to trust management in VANETs |
URI | https://link.springer.com/article/10.1007/s12083-012-0136-8 https://www.proquest.com/docview/1508923934 |
Volume | 7 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NS8MwGH6Z20UPfovTOXLwpHS0TZo2xyrdhuIQ2WSeSpMmIMNOWL346036sc2vw06FtgT6NMn7JO_7PAG4VFwwHVWxkX14lo5QyuKpl1qBUVGSxGYqMHrnhxEdTsjd1Js2wF1uXWSzXp2RLCbqldbN1WxBr3xNJYEx0d2CVqU7bYWDl_uonn91fCrO2dHMhFo62rt1LvOvRr5HoxXF_JEVLYJNf68UAC4Kj0JTYzLrfeS8Jz5_Ozhu8B37sFtxTxSWneUAGjI7hJ01R8Ij8ENU7qKjrKwPR7XpOMrnqBBooLdlxQx6zdBzOIrGi2MY96Px7dCqzlawBHZoblGPCebbwnE4ZiRxqCv13MhTTLCSts8DJkSQ6PHpMIm9lDice5I6CitTi-jiE2hm80yeAsK-nyil9Do0lUQlnFMWCEUlSaiTprbdhqsa4vi9dNCIV17JBoxYgxEbMOKgDZ36J8TVYFrExrKeGas20obrGtS1x_81drbR2-ewrckQKevHOtDUkMoLTThy3oWtoD_oVv1MX2-i0eOTvjtxwy_5xMyM |
link.rule.ids | 315,783,787,12777,21400,27936,27937,33385,33756,41093,41535,42162,42604,43612,43817,52123,52246,74363,74630 |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV09T8MwED1BGYAB8SkKBTwwgSzi2HHiCVWopUDbqaBuVvwlMZAWtf9f2PmgBQnmSB6e43vP57t3ANdOaeFZlYa2jwR7hnJYmcTgLHRRsjwSLgv9zqMxH7yy52kyrRNui7qssomJZaA2Mx1y5HfBt1wEvy52P__EYWpUeF2tR2hswhajnqtDp3j_sYnEnqnKiTteo3DseT9uXjXL1rnYiw9_kQ6FCcGT9ycvrcTmr_fRknb6-7BX60XUrTb4ADZscQi7ay6CR5B2UZX5RkVV040ao3C0nKGyqQJ9fFe5oPcCvXXHvcniGCb93uRhgOt5CFhTwpeYJ0KLNNKEKCpYTnhsfTxThjLqbJSqTGid5f5MEWFpYhhRKrGcOOpC_WBMT6BVzAp7Coimae6c83dHY5nLleIi045blnNiTBS14aYBQ84r1wu58jcOyEmPnAzIyawNnQYuWR-AhVxtVxtuGwjXPv-12Nn_i13B9mAyGsrh0_jlHHa8emFVwVcHWh5Pe-EVwlJdlr_BF6Ogs8Y |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3LSgMxFL1oC6IL8YnVqlm4UkJnJpnMZCVVW-qrFKnSXZi8wIXTSvv_mMzDVkHXgSxOkntPknPPBbiwUnGXVYkv-4ixy1AWSx1rnPoqSpoF3Ka-3vl5yAav9GESTyr907ySVdYxsQjUeqr8G3nH-5Zz79dFO7aSRYzu-tezT-w7SPmf1qqdxjo0E8pI0IDmTW84eqnjsstbRf8dx1gYdiwgqv84i0K6yFERd632MgXv0PszSy2p56_f0iIJ9Xdgu2KPqFsu9y6smXwPtlY8Bfch6aLyHRzlpcIb1bbhaDFFRYkF-vjWvKD3HL11h73x_ADG_d74doCr7ghYkZAtMIu54kmgwlASTrOQRcZFN6kJJdYEiUy5UmnmTljIDYk1DaWMDQstsV5NGJFDaOTT3BwBIkmSWWvdTVIbajMpGU-VZYZmLNQ6CFpwWYMhZqUHhli6HXvkhENOeORE2oJ2DZeojsNcLBevBVc1hCvDf012_P9k57Dh9oB4uh8-nsCmozK0VH-1oeHgNKeOLizkWbUPvgBWSblj |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+social+network+approach+to+trust+management+in+VANETs&rft.jtitle=Peer-to-peer+networking+and+applications&rft.au=Huang%2C+Zhen&rft.au=Ruj%2C+Sushmita&rft.au=Cavenaghi%2C+Marcos+A.&rft.au=Stojmenovic%2C+Milos&rft.date=2014-09-01&rft.pub=Springer+US&rft.issn=1936-6442&rft.eissn=1936-6450&rft.volume=7&rft.issue=3&rft.spage=229&rft.epage=242&rft_id=info:doi/10.1007%2Fs12083-012-0136-8&rft.externalDocID=10_1007_s12083_012_0136_8 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1936-6442&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1936-6442&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1936-6442&client=summon |