{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:11:33Z","timestamp":1764785493887,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031757631"},{"type":"electronic","value":"9783031757648"}],"license":[{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,17]],"date-time":"2024-10-17T00:00:00Z","timestamp":1729123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75764-8_16","type":"book-chapter","created":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:03:12Z","timestamp":1729594992000},"page":"307-322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["MVDetector: Malicious Vehicles Detection Under Sybil Attacks in\u00a0VANETs"],"prefix":"10.1007","author":[{"given":"Yiming","family":"Wei","sequence":"first","affiliation":[]},{"given":"Weiye","family":"Qi","sequence":"additional","affiliation":[]},{"given":"Zechuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yufan","family":"Han","sequence":"additional","affiliation":[]},{"given":"Yingxu","family":"Lai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,17]]},"reference":[{"issue":"5","key":"16_CR1","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1016\/j.dcan.2022.06.018","volume":"9","author":"T Alladi","year":"2023","unstructured":"Alladi, T., Kohli, V., Chamola, V., Yu, F.R.: A deep learning based misbehavior classification scheme for intrusion detection in cooperative intelligent transportation systems. Digit. Communi. Netw. 9(5), 1113\u20131122 (2023)","journal-title":"Digit. Communi. Netw."},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Awais, S.M., et al.: PUF-based privacy-preserving simultaneous authentication among multiple vehicles in vanet. IEEE Trans. Veh. Technol. (2023)","DOI":"10.1109\/TVT.2023.3341693"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TDSC.2020.2993769","volume":"19","author":"M Baza","year":"2020","unstructured":"Baza, M., et al.: Detecting sybil attacks using proofs of work and location in VANETs. IEEE Trans. Dependable Secure Comput. 19(1), 39\u201353 (2020)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"16_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45, 5\u201332 (2001)","journal-title":"Mach. Learn."},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"key":"16_CR6","doi-asserted-by":"publisher","unstructured":"Gaurav, A., Psannis, K., Perakovic, D.: Security of cloud-based medical internet of things (MIoTs): a survey. Int. J. Softw. Sci. Comput. Intell. 14, 1\u201316 (2022). https:\/\/doi.org\/10.4018\/IJSSCI.285593","DOI":"10.4018\/IJSSCI.285593"},{"issue":"6","key":"16_CR7","doi-asserted-by":"publisher","first-page":"6631","DOI":"10.1109\/TVT.2020.2984878","volume":"69","author":"J Kamel","year":"2020","unstructured":"Kamel, J., Ansari, M.R., Petit, J., Kaiser, A., Jemaa, I.B., Urien, P.: Simulation framework for misbehavior detection in vehicular networks. IEEE Trans. Veh. Technol. 69(6), 6631\u20136643 (2020)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Kamel, J., Jemaa, I.B., Kaiser, A., Cantat, L., Urien, P.: Misbehavior detection in C-ITS: a comparative approach of local detection mechanisms. In: 2019 IEEE Vehicular Networking Conference (VNC), pp.\u00a01\u20138. IEEE (2019)","DOI":"10.1109\/WCNC.2019.8885740"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Kamel, J., Jemaa, I.B., Kaiser, A., Urien, P.: Misbehavior reporting protocol for C-ITS. In: 2018 IEEE Vehicular Networking Conference (VNC), pp. 1\u20134 (2018). https:\/\/api.semanticscholar.org\/CorpusID:59553848","DOI":"10.1109\/VNC.2018.8628407"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Kamel, J., Wolf, M., Van Der\u00a0Hei, R.W., Kaiser, A., Urien, P., Kargl, F.: Veremi extension: a dataset for comparable evaluation of misbehavior detection in VANETs. In: ICC 2020-2020 IEEE International Conference on Communications (ICC), pp.\u00a01\u20136. IEEE (2020)","DOI":"10.1109\/ICC40277.2020.9149132"},{"issue":"1","key":"16_CR11","doi-asserted-by":"publisher","first-page":"38","DOI":"10.4018\/IJSSCI.2021010103","volume":"13","author":"R Kumar","year":"2024","unstructured":"Kumar, R., Singh, A.: A two-phase load balancing algorithm for cloud environment. Int. J. Softw. Sci. Comput. Intell. 13(1), 38\u201355 (2024). https:\/\/doi.org\/10.4018\/IJSSCI.2021010103","journal-title":"Int. J. Softw. Sci. Comput. Intell."},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"Liu, X., Amour, B.S., Jaekel, A.: A Q-learning based adaptive congestion control for V2V communication in VANET. In: 2022 International Wireless Communications and Mobile Computing (IWCMC), pp. 847\u2013852 (2022). https:\/\/doi.org\/10.1109\/IWCMC55113.2022.9824995","DOI":"10.1109\/IWCMC55113.2022.9824995"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Sunil Kumar, V., Ramesh Babu, D.R.: Sybil attack detection in vehicular ad-hoc networks using direct trust calculation. Int. J. Innov. Technol. Explor. Eng. 9(10), 67\u201373 (2020)","DOI":"10.35940\/ijitee.J7392.0891020"},{"key":"16_CR14","doi-asserted-by":"publisher","unstructured":"Xia, Z., Wu, J., Wu, L., Chen, Y., Yang, J., Yu, P.S.: A comprehensive survey of the key technologies and challenges surrounding vehicular ad hoc networks. ACM Trans. Intell. Syst. Technol. 12(4) (2021). https:\/\/doi.org\/10.1145\/3451984","DOI":"10.1145\/3451984"},{"issue":"6","key":"16_CR15","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1016\/j.jpdc.2013.02.001","volume":"73","author":"B Yu","year":"2013","unstructured":"Yu, B., Xu, C.Z., Xiao, B.: Detecting sybil attacks in VANETs. J. Parallel Distrib. Comput. 73(6), 746\u2013756 (2013)","journal-title":"J. Parallel Distrib. Comput."},{"issue":"9","key":"16_CR16","doi-asserted-by":"publisher","first-page":"6496","DOI":"10.1109\/JIOT.2021.3111048","volume":"9","author":"H Yu","year":"2022","unstructured":"Yu, H., Liu, R., Li, Z., Ren, Y., Jiang, H.: An RSU deployment strategy based on traffic demand in vehicular ad hoc networks (VANETs). IEEE Internet Things J. 9(9), 6496\u20136505 (2022). https:\/\/doi.org\/10.1109\/JIOT.2021.3111048","journal-title":"IEEE Internet Things J."},{"key":"16_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2023.103092","volume":"141","author":"Z Zhang","year":"2023","unstructured":"Zhang, Z., Lai, Y., Chen, Y., Wei, J., Wang, Y.: Detection method to eliminate sybil attacks in vehicular ad-hoc networks. Ad Hoc Netw. 141, 103092 (2023)","journal-title":"Ad Hoc Netw."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Zoccoli, G.G., Stabili, D., Marchetti, M.: Are VANETs pseudonyms effective? An experimental evaluation of pseudonym tracking in adversarial scenario. In: 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), pp.\u00a01\u20136. IEEE (2023)","DOI":"10.1109\/VTC2023-Fall60731.2023.10333561"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75764-8_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T11:08:29Z","timestamp":1729595309000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75764-8_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,17]]},"ISBN":["9783031757631","9783031757648"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75764-8_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,10,17]]},"assertion":[{"value":"17 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors declare that there are no competing interests relevant to this study.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isc24.cs.gmu.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}