{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T10:25:28Z","timestamp":1771064728109,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Singapore","isbn-type":[{"value":"9789811604218","type":"print"},{"value":"9789811604225","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-16-0422-5_10","type":"book-chapter","created":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T04:28:11Z","timestamp":1612931291000},"page":"139-151","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning"],"prefix":"10.1007","author":[{"given":"Felix O.","family":"Olowononi","sequence":"first","affiliation":[]},{"given":"Danda B.","family":"Rawat","sequence":"additional","affiliation":[]},{"given":"Chunmei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,10]]},"reference":[{"issue":"3","key":"10_CR1","doi-asserted-by":"publisher","first-page":"5432","DOI":"10.1109\/JIOT.2019.2902022","volume":"6","author":"AA Adewuyi","year":"2019","unstructured":"Adewuyi, A.A., Cheng, H., Shi, Q., Cao, J., MacDermott, \u00c1., Wang, X.: Ctrust: a dynamic trust model for collaborative applications in the internet of things. IEEE Internet Things J. 6(3), 5432\u20135445 (2019)","journal-title":"IEEE Internet Things J."},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Ahmad, F., Adnane, A., Kurugollu, F., Hussain, R.: A comparative analysis of trust models for safety applications in IoT-enabled vehicular networks. In: 2019 Wireless Days (WD), pp. 1\u20138. IEEE (2019)","DOI":"10.1109\/WD.2019.8734204"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Eziama, E., Tepe, K., Balador, A., Nwizege, K.S., Jaimes, L.M.S.: Malicious node detection in vehicular ad-hoc network using machine learning and deep learning. In: 2018 IEEE Globecom Workshops (GC Wkshps), pp. 1\u20136 (2018)","DOI":"10.1109\/GLOCOMW.2018.8644127"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Ferdowsi, A., Challita, U., Saad, W., Mandayam, N.B.: Robust deep reinforcement learning for security and safety in autonomous vehicle systems. In: 2018 21st International Conference on Intelligent Transportation Systems (ITSC), pp. 307\u2013312. IEEE (2018)","DOI":"10.1109\/ITSC.2018.8569635"},{"key":"10_CR5","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1109\/ACCESS.2017.2765303","volume":"6","author":"T Gazdar","year":"2017","unstructured":"Gazdar, T., Belghith, A., Abutair, H.: An enhanced distributed trust computing protocol for vanets. IEEE Access 6, 380\u2013392 (2017)","journal-title":"IEEE Access"},{"issue":"7","key":"10_CR6","doi-asserted-by":"publisher","first-page":"6647","DOI":"10.1109\/JIOT.2020.2975084","volume":"7","author":"J Guo","year":"2020","unstructured":"Guo, J., et al.: Trove: a context awareness trust model for vanets using reinforcement learning. IEEE Internet Things J. 7(7), 6647\u20136662 (2020)","journal-title":"IEEE Internet Things J."},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Hussain, R., Lee, J., Zeadally, S.: Trust in vanet: a survey of current solutions and future research opportunities. IEEE Trans. Intell. Transp. Syst. 1\u201319 (2020)","DOI":"10.1109\/TITS.2020.2973715"},{"key":"10_CR8","doi-asserted-by":"publisher","first-page":"9293","DOI":"10.1109\/ACCESS.2016.2645452","volume":"4","author":"CA Kerrache","year":"2016","unstructured":"Kerrache, C.A., Calafate, C.T., Cano, J., Lagraa, N., Manzoni, P.: Trust management for vehicular networks: an adversary-oriented overview. IEEE Access 4, 9293\u20139307 (2016)","journal-title":"IEEE Access"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Kerrache, C.A., Calafate, C.T., Lagraa, N., Cano, J.C., Manzoni, P.: Trust-aware opportunistic dissemination scheme for vanet safety applications. In: 2016 International IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld), pp. 153\u2013160. IEEE (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0044"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1016\/j.future.2018.09.002","volume":"92","author":"W Liang","year":"2019","unstructured":"Liang, W., Long, J., Weng, T.H., Chen, X., Li, K.C., Zomaya, A.Y.: TBRS: a trust based recommendation scheme for vehicular cps network. Future Generation Comput. Syst. 92, 383\u2013398 (2019)","journal-title":"Future Generation Comput. Syst."},{"key":"10_CR11","doi-asserted-by":"publisher","unstructured":"Olowononi, F.O., Rawat, D.B., Garuba, M., Kamhoua, C.: Security engineering with machine learning for adversarial resiliency in cyber physical systems. In: Pham, T. (ed.) Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications, vol. 11006, pp. 605\u2013611. International Society for Optics and Photonics, SPIE (2019). https:\/\/doi.org\/10.1117\/12.2519372","DOI":"10.1117\/12.2519372"},{"key":"10_CR12","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.comnet.2018.03.015","volume":"137","author":"DB Rawat","year":"2018","unstructured":"Rawat, D.B., Alsabet, R., Bajracharya, C., Song, M.: On the performance of cognitive internet of vehicles with unlicensed user-mobility and licensed user-activity. Comput. Netw. 137, 98\u2013106 (2018)","journal-title":"Comput. Netw."},{"key":"10_CR13","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-44494-9_2","volume-title":"Vehicular Cyber Physical Systems","author":"DB Rawat","year":"2017","unstructured":"Rawat, D.B., Bajracharya, C.: Adaptive connectivity for vehicular cyber-physical systems. Vehicular Cyber Physical Systems, pp. 15\u201324. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-44494-9_2"},{"issue":"3\u20134","key":"10_CR14","first-page":"283","volume":"24","author":"DB Rawat","year":"2015","unstructured":"Rawat, D.B., Yan, G., Bista, B.B., Weigle, M.C.: Trust on the security of wireless vehicular ad-hoc networking. Ad Hoc Sensor Wireless Netw. 24(3\u20134), 283\u2013305 (2015)","journal-title":"Ad Hoc Sensor Wireless Netw."},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.P.: On data-centric trust establishment in ephemeral ad hoc networks. In: IEEE INFOCOM 2008-The 27th Conference on Computer Communications, pp. 1238\u20131246. IEEE (2008)","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"10_CR16","doi-asserted-by":"publisher","unstructured":"Safavat, S., Rawat, D.B.: On the elliptic curve cryptography for privacy-aware secure ACO-AODV routing in intent-based internet of vehicles for smart cities. IEEE Trans. Intell. Transp. Syst. (2020). https:\/\/doi.org\/10.1109\/TITS.2020.3008361","DOI":"10.1109\/TITS.2020.3008361"},{"issue":"5","key":"10_CR17","doi-asserted-by":"publisher","first-page":"2015","DOI":"10.1109\/TVT.2014.2334655","volume":"64","author":"S Shivshankar","year":"2014","unstructured":"Shivshankar, S., Jamalipour, A.: An evolutionary game theory-based approach to cooperation in vanets under different network conditions. IEEE Trans. Veh. Technol. 64(5), 2015\u20132022 (2014)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"10_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/9050787","volume":"2017","author":"R Shrestha","year":"2017","unstructured":"Shrestha, R., Nam, S.Y.: Trustworthy event-information dissemination in vehicular ad hoc networks. Mobile Inf. Syst. 2017, 1\u201316 (2017)","journal-title":"Mobile Inf. Syst."},{"issue":"2","key":"10_CR19","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"YL Sun","year":"2006","unstructured":"Sun, Y.L., Yu, W., Han, Z., Liu, K.R.: Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24(2), 305\u2013317 (2006)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"5","key":"10_CR20","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MNET.001.1800535","volume":"33","author":"R Xing","year":"2019","unstructured":"Xing, R., Su, Z., Zhang, N., Peng, Y., Pu, H., Luo, J.: Trust-evaluation-based intrusion detection and reinforcement learning in autonomous driving. IEEE Network 33(5), 54\u201360 (2019)","journal-title":"IEEE Network"},{"issue":"1","key":"10_CR21","first-page":"157","volume":"20","author":"H Zhao","year":"2018","unstructured":"Zhao, H., Sun, D., Yue, H., Zhao, M., Cheng, S.: Dynamic trust model for vehicular cyber-physical systems. J. Network Secur. 20(1), 157\u2013167 (2018)","journal-title":"J. Network Secur."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-0422-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:16:32Z","timestamp":1619316992000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-0422-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9789811604218","9789811604225"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-0422-5_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"10 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/2020\/sscc2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EDAS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.7","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}