{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:33:14Z","timestamp":1771698794075,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030180744","type":"print"},{"value":"9783030180751","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-18075-1_10","type":"book-chapter","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T06:02:34Z","timestamp":1559196154000},"page":"203-226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Trust Management for Software-Defined Heterogeneous Vehicular Ad Hoc Networks"],"prefix":"10.1007","author":[{"given":"Adnan","family":"Mahmood","sequence":"first","affiliation":[]},{"given":"Wei Emma","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Quan Z.","family":"Sheng","sequence":"additional","affiliation":[]},{"given":"Sarah Ali","family":"Siddiqui","sequence":"additional","affiliation":[]},{"given":"Abdulwahab","family":"Aljubairy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,31]]},"reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/MWC.2016.7498068","volume":"23","author":"SH Sun","year":"2016","unstructured":"Sun SH, Hu JL, Peng Y, Pan XM, Zhao L, Fang JY (2016) Support for vehicle-to-everything services based on LTE. IEEE Wirel Commun 23(3):4\u20138","journal-title":"IEEE Wirel Commun"},{"issue":"6","key":"10_CR2","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MCOM.2016.7497762","volume":"54","author":"H Seo","year":"2016","unstructured":"Seo H, Lee KD, Yasukawa S, Peng Y, Sartori P (2016) LTE evolution for vehicle-to-everything services. IEEE Commun Mag 54(6):22\u201328","journal-title":"IEEE Commun Mag"},{"issue":"12","key":"10_CR3","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1109\/MCOM.2016.1600071CM","volume":"54","author":"J Choi","year":"2016","unstructured":"Choi J, Prelcic NG, Daniels R, Bhat CR, Heath RW (2016) Millimeter wave vehicular communication to support massive automotive sensing. IEEE Commun Mag 54(12):160\u2013167","journal-title":"IEEE Commun Mag"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2017.09.002","volume":"98","author":"Pengfei Hu","year":"2017","unstructured":"Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98(September):27\u201342","journal-title":"Journal of Network and Computer Applications"},{"issue":"8","key":"10_CR5","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MCOM.2017.1601165","volume":"55","author":"DJ Deng","year":"2017","unstructured":"Deng DJ, Lien SY, Lin CC, Hung SC, Chen WB (2017) Latency control in software-defined mobile-edge vehicular networking. IEEE Commun Mag 55(8):87\u201393","journal-title":"IEEE Commun Mag"},{"issue":"1","key":"10_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1300000054","volume":"10","author":"V Va","year":"2016","unstructured":"Va V, Shimizu T, Bansal G, Health RW (2016) Millimeter wave vehicular communications: a survey. Found Trends Netw 10(1):1\u2013113","journal-title":"Found Trends Netw"},{"key":"10_CR7","first-page":"1","volume":"5","author":"A Mabrouk","year":"2016","unstructured":"Mabrouk A, Kobbane A, Sabir E, Ben-Othman J, Koutbi ME (2016) Meeting always-best-connected paradigm in heterogeneous vehicular network: a graph theory and a signaling game analysis. Veh Commun 5:1\u20138","journal-title":"Veh Commun"},{"issue":"20","key":"10_CR8","doi-asserted-by":"publisher","first-page":"7342","DOI":"10.1109\/JSEN.2016.2562699","volume":"16","author":"Z He","year":"2016","unstructured":"He Z, Zhang D, Liang J (2016) Cost-efficient sensory data transmission in heterogeneous software-defined vehicular networks. IEEE Sens J 16(20):7342\u20137354","journal-title":"IEEE Sens J"},{"issue":"3","key":"10_CR9","doi-asserted-by":"publisher","first-page":"28643","DOI":"10.1109\/ACCESS.2018.2837887","volume":"6","author":"F Ahmad","year":"2018","unstructured":"Ahmad F, Franqueira VNL, Adnane A (2018) TEAM: a trust evaluation and management framework in context-enabled vehicular ad-hoc networks. IEEE Access 6(3):28643\u201328660","journal-title":"IEEE Access"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-319-60033-8_31","volume-title":"Wireless Algorithms, Systems, and Applications","author":"Fangyu Gai","year":"2017","unstructured":"Gai F, Zhang J, Zhu P, Jiang X (2017) Ratee-based trust management system for internet of vehicles. In: Wireless algorithms, systems, and applications. Lecture notes in computer science, vol 10251, pp 344\u2013355"},{"key":"10_CR11","first-page":"128","volume":"13","author":"S Oubabas","year":"2018","unstructured":"Oubabas S, Aoudjit R, Rodrigues JJPC, Talbi S (2018) Secure and stable vehicular ad hoc network clustering algorithm based on hybrid mobility similarities and trust management scheme. Veh Commun 13:128\u2013138","journal-title":"Veh Commun"},{"key":"10_CR12","first-page":"74","volume":"10","author":"H Sedjelmaci","year":"2017","unstructured":"Sedjelmaci H, Senouci SM, Bouali T (2017) Predict and prevent from misbehaving intruders in heterogeneous vehicular networks. Veh Commun 10:74\u201383","journal-title":"Veh Commun"},{"key":"10_CR13","unstructured":"Contreras J, Zeadally S, Guerrero-Ibanez JA (2017) Internet of vehicles: architecture, protocols, and security. IEEE Internet Things J 99:1\u20139"},{"issue":"4","key":"10_CR14","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/JIOT.2014.2327587","volume":"1","author":"N Lu","year":"2014","unstructured":"Lu N, Cheng N, Zhang N, Shen X, Mark JW (2014) Connected vehicles: solutions and challenges. IEEE Internet Things J 1(4):289\u2013299","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"10_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/JAS.2017.7510736","volume":"5","author":"W Xu","year":"2018","unstructured":"Xu W et al (2018) Internet of vehicles in big data era. IEEE\/CAA J Autom Sin 5(1):19\u201335","journal-title":"IEEE\/CAA J Autom Sin"},{"issue":"7","key":"10_CR16","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2017.1601158","volume":"55","author":"A Akhunzada","year":"2017","unstructured":"Akhunzada A, Khan MK (2017) Toward secure software defined vehicular networks: taxonomy, requirements, and open issues. IEEE Commun Mag 55(7):110\u2013118","journal-title":"IEEE Commun Mag"},{"issue":"12","key":"10_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/s16122077","volume":"16","author":"A Di Maio","year":"2016","unstructured":"Maio A Di et al (2016) Enabling SDN in VANETs: what is impact on security? Sensors (Switzerland) 16(12):1\u201324","journal-title":"Sensors (Switzerland)"},{"issue":"1","key":"10_CR18","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MNET.2016.7389832","volume":"30","author":"L Cui","year":"2016","unstructured":"Cui L, Yu FR, Yan Q (2016) When big data meets software-defined networking: SDN for big data and big data for SDN. IEEE Netw 30(1):58\u201365","journal-title":"IEEE Netw"},{"key":"10_CR19","first-page":"7","volume":"7","author":"H Hasrouny","year":"2017","unstructured":"Hasrouny H, Samhat AE, Bassil C, Laouiti A (2017) VANet security challenges and solutions: a survey. Veh Commun 7:7\u201320","journal-title":"Veh Commun"},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/JIOT.2015.2460333","volume":"3","author":"J Singh","year":"2016","unstructured":"Singh J, Pasquier T, Bacon J, Ko H, Eyers D (2016) Twenty security considerations for cloud-supported internet of things. IEEE Internet Things J 3(3):269\u2013284","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"10_CR21","doi-asserted-by":"publisher","first-page":"668","DOI":"10.3390\/s17040668","volume":"17","author":"Lingling Wang","year":"2017","unstructured":"Wang L, Liu G, Sun L (2017) A secure and privacy-preserving navigation scheme using spatial crowdsourcing in fog-based VANETs. Sensors (Switzerland) 17(4)","journal-title":"Sensors"},{"issue":"11","key":"10_CR22","first-page":"1","volume":"13","author":"AG Mosqueda","year":"2017","unstructured":"Mosqueda AG, Morales-Sandoval M, Villarreal-Reyes S, Galeana-Zapi\u00e9n H, Rodr\u00edguez RR, Alonso-Ar\u00e9valo M\u00c1 (2017) Multi-hop broadcast message dissemination in vehicular ad hoc networks: a security perspective review. Int J Distrib Sens Netw 13(11):1\u201321","journal-title":"Int J Distrib Sens Netw"},{"issue":"2","key":"10_CR23","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s12083-016-0431-x","volume":"10","author":"X Feng","year":"2017","unstructured":"Feng X, Li C-Y, Chen DX, Tang J (2017) A method for defensing against multi-source Sybil attacks in VANET. Peer-to-Peer Netw Appl 10(2):305\u2013314","journal-title":"Peer-to-Peer Netw Appl"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Boeira F, Barcellos MP, Freitas EPD, Vinel A, Asplund M (2017) On the impact of Sybil attacks in cooperative driving scenarios. In: 2017 IFIP networking conference (IFIP networking) and workshops, pp 1\u20132","DOI":"10.23919\/IFIPNetworking.2017.8264890"},{"key":"10_CR25","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","volume":"61","author":"F Sakiz","year":"2017","unstructured":"Sakiz F, Sen S (2017) A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV. Ad Hoc Netw 61:33\u201350","journal-title":"Ad Hoc Netw"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"1683","DOI":"10.1002\/dac.3106","volume":"29","author":"T Bouali","year":"2016","unstructured":"Bouali T, Senouci S-M, Sedjelmaci H (2016) A distributed detection and prevention scheme from malicious nodes in vehicular networks. Int J Commun Syst 29:1683\u20131704","journal-title":"Int J Commun Syst"},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Gai F, Zhang J, Zhu P, Jiang X (2017) Trust on the ratee: a trust management system for social internet of vehicles. Wirel Commun Mob Comput 2017","DOI":"10.1155\/2017\/7089259"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Raya M, Papadimitratos P, Gligor V, Hubaux J-P (2008) On data-centric trust establishment in ephemeral ad hoc networks. In: Procecedings of 27th IEEE conference on computer communications - INFOCOM, pp 1912\u20131920","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Gurung S, Lin D, Squicciarini A, Bertino E (2013) Information-oriented trustworthiness evaluation in vehicular ad-hoc networks. Lecture notes in computer science, LNCS, vol 7873, pp 94\u2013108","DOI":"10.1007\/978-3-642-38631-2_8"},{"key":"10_CR30","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1016\/j.adhoc.2014.08.018","volume":"24","author":"Auxeeliya Jesudoss","year":"2015","unstructured":"Jesudoss A, Raja SVK, Sulaiman A (2015) Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme. Ad Hoc Netw 24(A):250\u2013253","journal-title":"Ad Hoc Networks"},{"key":"10_CR31","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1016\/j.procs.2015.01.006","volume":"46","author":"U Khan","year":"2015","unstructured":"Khan U, Agrawal S, Silakari S (2015) Detection of malicious nodes (DMN) in vehicular ad-hoc networks. Procedia - Procedia Comput Sci 46:965\u2013972","journal-title":"Procedia - Procedia Comput Sci"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Haddadou N, Rachedi A, Ghamri-Doudane Y (2013) Trust and exclusion in vehicular ad hoc networks: an economic incentive model based approach. In: Proceedings of computing, communications and IT applications conference (ComComAp 2013), pp 13\u201318","DOI":"10.1109\/ComComAp.2013.6533601"},{"issue":"8","key":"10_CR33","doi-asserted-by":"publisher","first-page":"3657","DOI":"10.1109\/TVT.2014.2360883","volume":"64","author":"N Haddadou","year":"2015","unstructured":"Haddadou N, Rachedi A, Doudane YG (2015) A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Trans Veh Technol 64(8):3657\u20133674","journal-title":"IEEE Trans Veh Technol"},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.adhoc.2016.10.011","volume":"55","author":"X Yao","year":"2017","unstructured":"Yao X, Zhang X, Ning H, Li P (2017) Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Netw 55:107\u2013118","journal-title":"Ad Hoc Netw"},{"key":"10_CR35","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-319-42345-6_19","volume-title":"Computational Social Networks","author":"Rasheed Hussain","year":"2016","unstructured":"Hussain R, Nawaz W, Lee J, Son J, Seo JT (2016) A hybrid trust management framework for vehicular social networks. In: CSoNet 2016. LNCS, vol 9795, pp 214\u2013225"},{"key":"10_CR36","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.compeleceng.2015.02.018","volume":"43","author":"H Sedjelmaci","year":"2015","unstructured":"Sedjelmaci H, Senouci SM (2015) An accurate and efficient collaborative intrusion detection framework to secure vehicular networks. Comput Electr Eng 43:33\u201347","journal-title":"Comput Electr Eng"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Dhurandher SK, Obaidat MS, Jaiswal A, Tiwari A, Tyagi A (2010) Securing vehicular networks: a reputation and plausibility checks-based approach. In: 2010 IEEE Globecom work. GC\u201910, pp 1550\u20131554","DOI":"10.1109\/GLOCOMW.2010.5700199"},{"key":"10_CR38","first-page":"1","volume":"146","author":"SA Soleymani","year":"2015","unstructured":"Soleymani SA et al (2015) Trust management in vehicular ad hoc network: a systematic review. Eurasip J Wirel Commun Netw 146:1\u201322","journal-title":"Eurasip J Wirel Commun Netw"},{"key":"10_CR39","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-319-27293-1_19","volume-title":"Internet of Vehicles - Safe and Intelligent Mobility","author":"Shu Yang","year":"2015","unstructured":"Yang S, Li J, Liu Z, Wang S (2015) Managing trust for intelligence vehicles: a cluster consensus approach. In: IOV 2015. LNCS, vol 9502, pp 210\u2013220"},{"issue":"4","key":"10_CR40","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","volume":"17","author":"W Li","year":"2016","unstructured":"Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17(4):960\u2013969","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10_CR41","doi-asserted-by":"publisher","first-page":"25408","DOI":"10.1109\/ACCESS.2017.2769878","volume":"5","author":"X Huang","year":"2017","unstructured":"Huang X, Yu R, Kang J, Zhang Y (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5:25408\u201325420","journal-title":"IEEE Access"},{"issue":"2","key":"10_CR42","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","volume":"6","author":"Zhe Yang","year":"2019","unstructured":"Yang Z, Yang K, Lei L, Zheng K, Leung VCM (2018) Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J, 1\u201310. https:\/\/doi.org\/10.1109\/jiot.2018.2836144","journal-title":"IEEE Internet of Things Journal"},{"issue":"1","key":"10_CR43","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/s12008-017-0391-2","volume":"12","author":"F Camacho","year":"2017","unstructured":"Camacho F, C\u00e1rdenas C, Mu\u00f1oz D (2017) Emerging technologies and research challenges for intelligent transportation systems: 5G, HetNets, and SDN. Int J Interact Des Manuf 12(1):327\u2013335","journal-title":"Int J Interact Des Manuf"},{"issue":"4","key":"10_CR44","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MNET.2016.7513858","volume":"30","author":"Z He","year":"2016","unstructured":"He Z, Cao J, Liu X (2016) SDVN: enabling rapid network innovation for heterogeneous vehicular communication. IEEE Netw 30(4):10\u201315","journal-title":"IEEE Netw"},{"key":"10_CR45","doi-asserted-by":"publisher","first-page":"3069","DOI":"10.1109\/ACCESS.2017.2671030","volume":"5","author":"RDR Fontes","year":"2017","unstructured":"Fontes RDR, Campolo C, Rothenberg CE, Molinaro A (2017) From theory to experimental evaluation: resource management in software-defined vehicular networks. IEEE Access 5:3069\u20133076","journal-title":"IEEE Access"},{"issue":"7","key":"10_CR46","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MCOM.2017.1601105","volume":"55","author":"S Correia","year":"2017","unstructured":"Correia S, Boukerche A, Meneguette RI (2017) An architecture for hierarchical software-defined vehicular networks. IEEE Commun Mag 55(7):80\u201386","journal-title":"IEEE Commun Mag"},{"issue":"8","key":"10_CR47","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MCOM.2017.1601161","volume":"55","author":"M Azizian","year":"2017","unstructured":"Azizian M, Cherkaoui S, Hafid AS (2017) Vehicle software updates distribution with SDN and cloud computing. IEEE Commun Mag 55(8):74\u201379","journal-title":"IEEE Commun Mag"},{"issue":"5","key":"10_CR48","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MNET.2018.1700364","volume":"32","author":"K Wang","year":"2018","unstructured":"Wang K, Yin H, Quan W, Min G (2018) Enabling collaborative edge computing for software defined vehicular networks. IEEE Netw 32(5):112\u2013117","journal-title":"IEEE Netw"},{"key":"10_CR49","first-page":"1","volume-title":"Encyclopedia of computer graphics and games","author":"A Mahmood","year":"2018","unstructured":"Mahmood A, Butler B, Jennings B (2018) Potential of augmented reality for intelligent transportation systems. In: Lee N (ed) Encyclopedia of computer graphics and games. Springer, Cham, pp 1\u20137"}],"container-title":["Security, Privacy and Trust in the IoT Environment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-18075-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,3]],"date-time":"2022-09-03T12:36:03Z","timestamp":1662208563000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-18075-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030180744","9783030180751"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-18075-1_10","relation":{},"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"31 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}