{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:27Z","timestamp":1767340227197,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031639883"},{"type":"electronic","value":"9783031639890"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-63989-0_23","type":"book-chapter","created":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T21:01:50Z","timestamp":1721336510000},"page":"445-463","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Reputation-Based Dissemination of\u00a0Trustworthy Information in\u00a0VANETs"],"prefix":"10.1007","author":[{"given":"Vincenzo","family":"Agate","sequence":"first","affiliation":[]},{"given":"Alessandra","family":"De Paola","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Lo Re","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Virga","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,19]]},"reference":[{"issue":"9","key":"23_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3558052","volume":"55","author":"T Yoshizawa","year":"2023","unstructured":"Yoshizawa, T., et al.: A survey of security and privacy issues in v2x communication systems. ACM Comput. Surv. 55(9), 1\u201336 (2023). https:\/\/doi.org\/10.1145\/3558052","journal-title":"ACM Comput. Surv."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Singh, S., Agrawal, S.: VANET routing protocols: issues and challenges. In: 2014 Recent Advances in Engineering and Computational Sciences (RAECS), pp. 1\u20135 (2014)","DOI":"10.1109\/RAECS.2014.6799625"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Agate, V., De\u00a0Paola, A., Lo\u00a0Re, G., Morana, M.: A platform for the evaluation of distributed reputation algorithms. In: 2018 IEEE\/ACM 22nd International Symposium on Distributed Simulation and Real Time Applications (DS-RT), pp. 1\u20138. IEEE (2018)","DOI":"10.1109\/DISTRA.2018.8601020"},{"key":"23_CR4","doi-asserted-by":"publisher","first-page":"25408","DOI":"10.1109\/ACCESS.2017.2769878","volume":"5","author":"X Huang","year":"2017","unstructured":"Huang, X., Yu, R., Kang, J., Zhang, Y.: Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5, 25408\u201325420 (2017)","journal-title":"IEEE Access"},{"key":"23_CR5","doi-asserted-by":"publisher","unstructured":"Aspnes, J., Ruppert, E.: An introduction to population protocols. In: Garbinato, B., Miranda, H., Rodrigues, L. (eds.) Middleware for Network Eccentric and Mobile Applications, pp. 97\u2013120. Springer, Berlin, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-540-89707-1_5","DOI":"10.1007\/978-3-540-89707-1_5"},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Agate, V., De\u00a0Paola, A., Lo\u00a0Re, G., Morana, M.: Vulnerability evaluation of distributed reputation management systems. In: Proceedings of the 10th EAI International Conference on Performance Evaluation Methodologies and Tools, ValueTools 2016, Taormina, Italy, pp. 235\u2013242 (2017). https:\/\/doi.org\/10.4108\/eai.25-10-2016.2266868. ISBN 9781631901416","DOI":"10.4108\/eai.25-10-2016.2266868"},{"issue":"3","key":"23_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJIIT.2020070101","volume":"16","author":"V Agate","year":"2020","unstructured":"Agate, V., De Paola, A., Lo Re, G., Morana, M.: DRESS: a distributed RMS evaluation simulation software. Int. J. Intell. Inf. Technol. (IJIIT) 16(3), 1\u201318 (2020)","journal-title":"Int. J. Intell. Inf. Technol. (IJIIT)"},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.1109\/TGCN.2021.3077854","volume":"5","author":"A Timilsina","year":"2021","unstructured":"Timilsina, A., Khamesi, A.R., Agate, V., Silvestri, S.: A reinforcement learning approach for user preference-aware energy sharing systems. IEEE Trans. Green Commun. Networking 5, 1138\u20131153 (2021)","journal-title":"IEEE Trans. Green Commun. Networking"},{"issue":"1","key":"23_CR9","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1109\/JIOT.2019.2950083","volume":"7","author":"A Alnasser","year":"2019","unstructured":"Alnasser, A., Sun, H., Jiang, J.: Recommendation-based trust model for vehicle-to-everything (v2x). IEEE Internet Things J. 7(1), 440\u2013450 (2019)","journal-title":"IEEE Internet Things J."},{"issue":"9","key":"23_CR10","doi-asserted-by":"publisher","first-page":"7579","DOI":"10.1109\/TVT.2015.2495325","volume":"65","author":"S Tan","year":"2015","unstructured":"Tan, S., Li, X., Dong, Q.: A trust management system for securing data plane of ad-hoc networks. IEEE Trans. Veh. Technol. 65(9), 7579\u20137592 (2015)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"4","key":"23_CR11","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","volume":"17","author":"W Li","year":"2015","unstructured":"Li, W., Song, H.: Art: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans. Intell. Transp. Syst. 17(4), 960\u2013969 (2015)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"23_CR12","doi-asserted-by":"publisher","first-page":"1786","DOI":"10.1109\/TVT.2016.2565001","volume":"66","author":"H Hu","year":"2016","unstructured":"Hu, H., Lu, R., Zhang, Z., Shao, J.: Replace: a reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans. Veh. Technol. 66(2), 1786\u20131797 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Mahmood, A., Butler, B., Zhang, W.E., Sheng, Q.Z., Siddiqui, S.A.: A hybrid trust management heuristic for VANETs. In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), pp. 748\u2013752 (2019)","DOI":"10.1109\/PERCOMW.2019.8730675"},{"issue":"9","key":"23_CR14","doi-asserted-by":"publisher","first-page":"9244","DOI":"10.1109\/TVT.2021.3049189","volume":"70","author":"F Ahmad","year":"2021","unstructured":"Ahmad, F., Kurugollu, F., Kerrache, C.A., Sezer, S., Liu, L.: NOTRINO: a novel hybrid trust management scheme for internet-of-vehicles. IEEE Trans. Veh. Technol. 70(9), 9244\u20139257 (2021)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.comcom.2016.05.013","volume":"93","author":"CA Kerrache","year":"2016","unstructured":"Kerrache, C.A., Lagraa, N., Calafate, C.T., Cano, J.C., Manzoni, P.: T-VNets: a novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS. Comput. Commun. 93, 68\u201383 (2016)","journal-title":"Comput. Commun."},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Agate, V., De\u00a0Paola, A., Gaglio, S., Lo\u00a0Re, G., Morana, M.: A framework for parallel assessment of reputation management systems. In: Proceedings of the 17th International Conference on Computer Systems and Technologies 2016, pp. 121\u2013128 (2016)","DOI":"10.1145\/2983468.2983474"},{"issue":"4","key":"23_CR17","doi-asserted-by":"publisher","first-page":"3310","DOI":"10.1109\/JIOT.2020.2967568","volume":"7","author":"F Ahmad","year":"2020","unstructured":"Ahmad, F., Kurugollu, F., Adnane, A., Hussain, R., Hussain, F.: Marine: man-in-the-middle attack resistant trust model in connected vehicles. IEEE Internet Things J. 7(4), 3310\u20133322 (2020)","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"23_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3594637","volume":"7","author":"A Mahmood","year":"2023","unstructured":"Mahmood, A., Sheng, Q.Z., Zhang, W.E., Wang, Y., Sagar, S.: Toward a distributed trust management system for misbehavior detection in the internet of vehicles. ACM Trans. Cyber-Phys. Syst. 7(3), 1\u201325 (2023). https:\/\/doi.org\/10.1145\/3594637","journal-title":"ACM Trans. Cyber-Phys. Syst."},{"issue":"5","key":"23_CR19","doi-asserted-by":"publisher","first-page":"2553","DOI":"10.1109\/TITS.2020.2973715","volume":"22","author":"R Hussain","year":"2020","unstructured":"Hussain, R., Lee, J., Zeadally, S.: Trust in VANET: a survey of current solutions and future research opportunities. IEEE Trans. Intell. Transp. Syst. 22(5), 2553\u20132571 (2020)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"23_CR20","unstructured":"Agate, V., Ferraro, P., Gaglio, S.: A cognitive architecture for ambient intelligence systems. In: 6th International Workshop on Artificial Intelligence and Cognition, AIC 2018. CEUR Workshop Proceedings, vol. 2418, pp. 52\u201358 (2019)"},{"key":"23_CR21","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-030-94191-8_16","volume-title":"Innovations in Smart Cities Applications Volume 5","author":"V Agate","year":"2022","unstructured":"Agate, V., Concone, F., Ferraro, P.: A resilient smart architecture for\u00a0road surface condition monitoring. In: Ben Ahmed, M., Boudhir, A.A., Kara\u015f, \u0130R., Jain, V., Mellouli, S. (eds.) SCA 2021. LNNS, vol. 393, pp. 199\u2013209. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-94191-8_16"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Mistareehi, H.: Message dissemination scheme for rural areas using VANET (hardware implementation). In: 2021 Twelfth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 120\u2013125 (2021)","DOI":"10.1109\/ICUFN49451.2021.9528820"},{"key":"23_CR23","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X., Sagar, S.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: kdd, vol.\u00a096, pp. 226\u2013231 (1996)"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Bordonaro, A., Concone, F., De\u00a0Paola, A., Lo\u00a0Re, G., Das, S.K.: Modeling efficient and effective communications in VANET through population protocols. In: 2021 IEEE International Conference on Smart Computing (SMARTCOMP), pp. 305\u2013310 (2021)","DOI":"10.1109\/SMARTCOMP52413.2021.00064"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Bordonaro, A., De\u00a0Paola, A., Lo\u00a0Re, G.: VPP: a communication schema for population protocols in VANET. In: 2021 20th International Conference on Ubiquitous Computing and Communications (IUCC\/CIT\/DSCI\/SmartCNS), pp. 11\u201318 (2021)","DOI":"10.1109\/IUCC-CIT-DSCI-SmartCNS55181.2021.00017"},{"issue":"1","key":"23_CR26","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TMC.2010.133","volume":"10","author":"C Sommer","year":"2011","unstructured":"Sommer, C., German, R., Dressler, F.: Bidirectionally coupled network and road traffic simulation for improved IVC analysis. IEEE Trans. Mobile Comput. (TMC) 10(1), 3\u201315 (2011)","journal-title":"IEEE Trans. Mobile Comput. (TMC)"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Lopez, P.A., et al.: Microscopic traffic simulation using sumo. In: 2018 21st International Conference on Intelligent Transportation Systems (ITSC), pp. 2575\u20132582. IEEE (2018)","DOI":"10.1109\/ITSC.2018.8569938"},{"key":"23_CR28","unstructured":"Varga, A., Hornig, R.: An overview of the OMNeT++ simulation environment. In: 1st International ICST Conference on Simulation Tools and Techniques for Communications, Networks and Systems (2010)"},{"issue":"1\u20134","key":"23_CR29","first-page":"1","volume":"37","author":"V Agate","year":"2021","unstructured":"Agate, V., De Paola, A., Lo Re, G., Morana, M.: A simulation software for the evaluation of vulnerabilities in reputation management systems. ACM Trans. Comput. Syst. (TOCS) 37(1\u20134), 1\u201330 (2021)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Crapanzano, C., Milazzo, F., De\u00a0Paola, A., Lo\u00a0Re, G.: Reputation management for distributed service-oriented architectures. In: 2010 Fourth IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshop, pp. 160\u2013165. IEEE (2010)","DOI":"10.1109\/SASOW.2010.34"},{"key":"23_CR31","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-319-40162-1_27","volume-title":"Distributed Computing and Artificial Intelligence, 13th International Conference","author":"V Agate","year":"2016","unstructured":"Agate, V., De Paola, A., Lo Re, G., Morana, M.: A simulation framework for evaluating distributed reputation management systems. In: Distributed Computing and Artificial Intelligence, 13th International Conference. AISC, vol. 474, pp. 247\u2013254. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40162-1_27"},{"key":"23_CR32","doi-asserted-by":"publisher","first-page":"14621","DOI":"10.1109\/ACCESS.2023.3244327","volume":"11","author":"N Khatri","year":"2023","unstructured":"Khatri, N., Lee, S., Mateen, A., Nam, S.Y.: Event message clustering algorithm for selection of majority message in VANETs. IEEE Access 11, 14621\u201314635 (2023)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-63989-0_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,18]],"date-time":"2024-07-18T21:10:36Z","timestamp":1721337036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-63989-0_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031639883","9783031639890"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-63989-0_23","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"19 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiQuitous","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiquitous2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/mobiquitous.eai-conferences.org\/2023\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}