{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T15:41:57Z","timestamp":1764603717199,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T00:00:00Z","timestamp":1609891200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Science Foundation of Nantong of Jiangsu Grants","award":["JC2018131"],"award-info":[{"award-number":["JC2018131"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11277-020-08027-1","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T12:03:35Z","timestamp":1609934615000},"page":"489-503","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Kind of Event Trust Model for VANET Based on Statistical Method"],"prefix":"10.1007","volume":"118","author":[{"given":"Xuemei","family":"Yan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2594-4118","authenticated-orcid":false,"given":"Xiang","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"key":"8027_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/CC.2014.6969789","volume":"10","author":"YANG Fangchun","year":"2014","unstructured":"Fangchun, Y. A. N. G., Shangguang, W. A. N. G., et al. (2014). An overview of internet of vehicles. China Communications, 10, 1\u201315.","journal-title":"China Communications"},{"issue":"1","key":"8027_CR2","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s11277-019-06548-y","volume":"109","author":"A Thakur","year":"2019","unstructured":"Thakur, A., & Malekian, R. (2019). Internet of vehicles communication technologies for traffic management and road safety applications. Wireless Personal Communications, 109(1), 31\u201349.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"8027_CR3","first-page":"128","volume":"37","author":"Ma Bing","year":"2010","unstructured":"Bing, Ma., & Xianzhong, X. (2010). Cloud trust model for wireless sensor network. Computer Science, 37(3), 128\u2013132.","journal-title":"Computer Science"},{"key":"8027_CR4","doi-asserted-by":"crossref","unstructured":"Gerlach M. (2007). Trust for vehicular applications. Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems, ISADS 2007.IEEE. pp 295\u2013302.","DOI":"10.1109\/ISADS.2007.76"},{"key":"8027_CR5","doi-asserted-by":"crossref","unstructured":"Minhas U F, Zhang J, Tran T, et al. (2010). Intelligent agents in mobile vehicular ad-hoc networks: Leveraging trust modeling based on direct experience with incentives for honesty. Proceedings of the 2010 IEEE\/WIC\/ACM international conference on intelligent agent technology. IEEE. pp 243\u2013247.","DOI":"10.1109\/WI-IAT.2010.66"},{"key":"8027_CR6","doi-asserted-by":"crossref","unstructured":"Raya M, Papadimitratos P, Gligor V D, et al. (2008). On data-centric trust establishment in ephemeral ad hoc networks. INFOCOM. Proceedings of the 27th IEEE communication society conference on computer communications. IEEE. pp 1238\u20131246.","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"8027_CR7","doi-asserted-by":"crossref","unstructured":"Golle P, Greene D, Staddon J. (2004). Detecting and correcting malicious data in VANETs. VANET - Proceedings of the first ACM international workshop on vehicular ad hoc networks. ACM. pp 29\u201337.","DOI":"10.1145\/1023875.1023881"},{"key":"8027_CR8","doi-asserted-by":"crossref","unstructured":"Dotzer F, Fischer L, Magiera P. (2005). VARS: A vehicle ad-hoc network reputation system. Proceedings of the 6th IEEE international symposium on a world of wireless mobile and multimedia networks. IEEE. pp 454\u2013456.","DOI":"10.1109\/WOWMOM.2005.109"},{"key":"8027_CR9","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1186\/s13638-015-0353-y","volume":"1","author":"SA Soleymani","year":"2015","unstructured":"Soleymani, S. A., Abdullah, A. H., Wan, H. H., et al. (2015). Trust management in vehicular ad hoc network: A systematic review. EURASIP Journal on Wireless Communications and Networking, 1, 146.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"8027_CR10","doi-asserted-by":"crossref","unstructured":"Li X, Liu J, Li X, et al. (2013). RGTE: A reputation-based global trust establishment in VANETs. Proceedings of the 5th IEEE international conference on intelligent networking and collaborative systems, INCoS. IEEE. pp 210\u2013214.","DOI":"10.1109\/INCoS.2013.91"},{"key":"8027_CR11","doi-asserted-by":"crossref","unstructured":"Li Z, Shen H. (2011). A hierarchical account-aided Reputation Management system for large-scale MANETs[C]. Proceedings IEEE INFOCOM. IEEE.","DOI":"10.1109\/INFCOM.2011.5935316"},{"issue":"14","key":"8027_CR12","first-page":"2396","volume":"53","author":"J Luo","year":"2009","unstructured":"Luo, J., Liu, X., & Fan, M. (2009). A trust model based on fuzzy recommendation for mobile ad-hoc networks. Computer Networks the International Journal of Computer & Telecommunications Networking, 53(14), 2396\u20132407.","journal-title":"Computer Networks the International Journal of Computer & Telecommunications Networking"},{"key":"8027_CR13","doi-asserted-by":"crossref","unstructured":"Chen C, Zhang J, Cohen R, et al. (2010). A trust modeling framework for message propagation and evaluation in VANETs. Proceedings of the 2nd international conference on information technology convergence and services, ITCS 2010. IEEE. pp 1\u20138.","DOI":"10.1109\/ITCS.2010.5581298"},{"key":"8027_CR14","doi-asserted-by":"crossref","unstructured":"Ding Q, Li X, Jiang M, et al. (2010). Reputation management in vehicular ad hoc networks. Proceedings of the international conference on multimedia technology, ICMT 2010. IEEE.","DOI":"10.1109\/ICMULT.2010.5632149"},{"issue":"4","key":"8027_CR15","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1007\/s11277-018-5965-1","volume":"103","author":"S Baskar","year":"2018","unstructured":"Baskar, S., & Dhulipala, V. R. S. (2018). Collaboration of trusted node and QoS based energy multi path routing protocol for vehicular ad hoc networks. Wireless Personal Communications, 103(4), 2833\u20132842.","journal-title":"Wireless Personal Communications"},{"key":"8027_CR16","volume-title":"Research on vehicle ad hoc network MAC mechanism for traffic safety messages","author":"Li Shuai","year":"2012","unstructured":"Shuai, Li. (2012). Research on vehicle ad hoc network MAC mechanism for traffic safety messages. Chongqing: Chongjing Jiaotong University."},{"issue":"1","key":"8027_CR17","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s11277-018-6106-6","volume":"105","author":"J Wang","year":"2019","unstructured":"Wang, J., Xiang, Gu., & JinWang, L. C. (2019). A trust scheme based on vehicles reports of events in VANETs. Wireless Personal Communications, 105(1), 121\u2013143.","journal-title":"Wireless Personal Communications"},{"issue":"3","key":"8027_CR18","doi-asserted-by":"publisher","first-page":"3705","DOI":"10.1007\/s11277-017-4694-1","volume":"97","author":"Gu Xiang","year":"2017","unstructured":"Xiang, Gu., Wang, J., Qiu, J., & Jiang, Z. (2017). Self-recommendation mechanism in trust calculation among nodes in WSN. Wireless Personal Communications, 97(3), 3705\u20133723.","journal-title":"Wireless Personal Communications"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-08027-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-020-08027-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-020-08027-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T16:23:04Z","timestamp":1618849384000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-020-08027-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,6]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["8027"],"URL":"https:\/\/doi.org\/10.1007\/s11277-020-08027-1","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2021,1,6]]},"assertion":[{"value":"29 October 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}