{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:32:23Z","timestamp":1761611543374,"version":"3.37.3"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100006144","name":"Kerala State Council for Science, Technology and Environment","doi-asserted-by":"publisher","award":["1281\/2016\/KSCSTE"],"award-info":[{"award-number":["1281\/2016\/KSCSTE"]}],"id":[{"id":"10.13039\/501100006144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s12083-021-01249-5","type":"journal-article","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T10:04:55Z","timestamp":1635847495000},"page":"901-920","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Reputation management in vehicular network using blockchain"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5250-3510","authenticated-orcid":false,"given":"Jennath","family":"H.S","sequence":"first","affiliation":[]},{"given":"Asharaf","family":"S","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"1249_CR1","doi-asserted-by":"crossref","unstructured":"Yang Q et al (2017) A rough set approach for determining weights of decision makers in group decision making. PloS One 12.2:e0172679","DOI":"10.1371\/journal.pone.0172679"},{"issue":"5","key":"1249_CR2","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","volume":"26","author":"M Nitti","year":"2013","unstructured":"Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26(5):1253\u20131266","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1249_CR3","doi-asserted-by":"crossref","unstructured":"Cunha F et al (2016) Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Netw 44:90\u2013103","DOI":"10.1016\/j.adhoc.2016.02.017"},{"key":"1249_CR4","unstructured":"Herrtwich RG (2005) Communicating vehicles\u2013communicating roadways: New approaches to driver information and road safety. In Proc 11th Annu ACM Int Conf Mobile Comput Netw\u2013Invited Talk"},{"key":"1249_CR5","unstructured":"Data World. City of Bloomington, IN, Traffic Data. Data set accessed 2021-10-10 at https:\/\/data.bloomington.in.gov\/dataset\/traffic-data. Last updated 2021-01-07\u00a0"},{"key":"1249_CR6","unstructured":"Resendes R (2008) The new grand challenge\u2013Deploying vehicle communications. In Proc ACM Int Workshop Veh Inter-Netw\u2013Keynote Address"},{"key":"1249_CR7","unstructured":"Nima A et al (2021) Decentralized ID and Access Management (DIAM) for IoT Networks, The Hyperledger Telecom Special Interest Group.\u00a0https:\/\/www.hyperledger.org\/wp-content\/uploads\/2021\/02\/HL_LFEdge_WhitePaper_021121_3.pdf"},{"issue":"6","key":"1249_CR8","doi-asserted-by":"publisher","first-page":"102308","DOI":"10.1016\/j.ipm.2020.102308","volume":"57","author":"C Esposito","year":"2020","unstructured":"Esposito C et al (2020) Robust decentralised trust management for the internet of things by using game theory. Inf Process Manag 57(6):102308","journal-title":"Inf Process Manag"},{"issue":"1","key":"1249_CR9","doi-asserted-by":"publisher","first-page":"55","DOI":"10.4018\/IJCAC.2018010103","volume":"8","author":"A Ouaguid","year":"2018","unstructured":"Ouaguid A, Abghour N, Ouzzif M (2018) A novel security framework for managing android permissions using blockchain technology. International Journal of Cloud Applications and Computing (IJCAC) 8(1):55\u201379","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"issue":"2","key":"1249_CR10","doi-asserted-by":"publisher","first-page":"102468","DOI":"10.1016\/j.ipm.2020.102468","volume":"58","author":"C Esposito","year":"2021","unstructured":"Esposito C, Massimo F, Gupta BB (2021) Blockchain-based authentication and authorization for smart city applications. Inf Process Manag 58(2):102468","journal-title":"Inf Process Manag"},{"issue":"3","key":"1249_CR11","doi-asserted-by":"publisher","first-page":"54","DOI":"10.4018\/IJCAC.2020070103","volume":"10","author":"AP Mohan","year":"2020","unstructured":"Mohan AP, Gladston A (2020) Merkle tree and blockchain-based cloud data auditing. International Journal of Cloud Applications and Computing (IJCAC) 10(3):54\u201366","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"key":"1249_CR12","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1016\/j.ins.2018.02.060","volume":"479","author":"D Li","year":"2019","unstructured":"Li D et al (2019) A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf Sci 479:432\u2013447","journal-title":"Inf Sci"},{"issue":"8","key":"1249_CR13","doi-asserted-by":"publisher","first-page":"5695","DOI":"10.1007\/s00500-019-04220-y","volume":"24","author":"A Al-Qerem","year":"2020","unstructured":"Al-Qerem A et al (2020) IoT transaction processing through cooperative concurrency control on fog\u2013cloud computing environment. Soft Comput 24(8):5695\u20135711","journal-title":"Soft Comput"},{"issue":"3","key":"1249_CR14","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1007\/s11227-016-1849-x","volume":"73","author":"A Tewari","year":"2017","unstructured":"Tewari A, Gupta BB (2017) Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags. J Supercomput 73(3):1085\u20131102","journal-title":"J Supercomput"},{"key":"1249_CR15","doi-asserted-by":"crossref","unstructured":"Yang Y, Bagrodia R (2009) Evaluation of VANET-based advanced intelligent transportation systems. In Proc 6th ACM Int Workshop Veh Inter-Netw\u00a0pp. 3\u201312","DOI":"10.1145\/1614269.1614273"},{"issue":"3","key":"1249_CR16","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1016\/j.jnca.2011.03.028","volume":"35","author":"FG Marmol","year":"2012","unstructured":"Marmol FG, P\u00e9rez GM (2012) TRIP, a trust and reputation infrastructurebased proposal for vehicular ad hoc networks. J Netw Comput Appl 35(3):934\u2013941","journal-title":"J Netw Comput Appl"},{"key":"1249_CR17","doi-asserted-by":"crossref","unstructured":"Shi N et al (2020) A blockchain-empowered AAA scheme in the large-scale HetNet. Digit Commun Netw","DOI":"10.1016\/j.dcan.2020.10.002"},{"key":"1249_CR18","doi-asserted-by":"crossref","unstructured":"Tan L et al (2021) A blockchain-empowered crowdsourcing system for 5G-enabled smart cities. Comput Stand Interfaces 76:103517","DOI":"10.1016\/j.csi.2021.103517"},{"issue":"1","key":"1249_CR19","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/MNET.011.2000223","volume":"35","author":"C Feng","year":"2021","unstructured":"Feng C et al (2021) Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach. IEEE Netw 35(1):130\u2013137","journal-title":"IEEE Netw"},{"key":"1249_CR20","doi-asserted-by":"crossref","unstructured":"Yu K-P et al (2021) Blockchain-enhanced data sharing with traceable and direct revocation in IIoT. IEEE Trans Ind Inf","DOI":"10.1109\/TII.2021.3049141"},{"issue":"8","key":"1249_CR21","doi-asserted-by":"publisher","first-page":"3947","DOI":"10.1109\/TVT.2011.2162972","volume":"60","author":"M Mahmoud","year":"2011","unstructured":"Mahmoud M, Shen X (2011) An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks. IEEE Trans Veh Technol 60(8):3947\u20133962","journal-title":"IEEE Trans Veh Technol"},{"issue":"9","key":"1249_CR22","doi-asserted-by":"publisher","first-page":"4095","DOI":"10.1109\/TVT.2012.2209903","volume":"61","author":"Q Li","year":"2012","unstructured":"Li Q, Malip A, Martin KM, Ng S, Zhang J (2012) A reputation-based announcement scheme for VANETs. IEEE Trans Veh Technol 61(9):4095\u20134108","journal-title":"IEEE Trans Veh Technol"},{"issue":"6","key":"1249_CR23","first-page":"1559","volume":"18","author":"C Lai","year":"2017","unstructured":"Lai C, Zhang K, Cheng N, Li H, Shen X (2017) SIRC: A secure incentive scheme for reliable cooperative downloading in highway VANETs. IEEE Trans Intell Transp Syst 18(6):1559\u20131574","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1249_CR24","first-page":"1238","volume-title":"On datacentric trust establishment in ephemeral ad hoc networks, in Proc","author":"M Raya","year":"2008","unstructured":"Raya M, Papadimitratos P, Gligor VD, Hubaux JP (2008) On datacentric trust establishment in ephemeral ad hoc networks, in Proc. Phoenix, USA, Apr, IEEE INFOCOM, pp 1238\u20131246"},{"key":"1249_CR25","doi-asserted-by":"crossref","unstructured":"Li W, Song H (2013) Information-oriented trustworthiness evaluation in vehicular ad-hoc networks. In Proc International Conference on Network and System Security, Madrid pp. 94-108","DOI":"10.1007\/978-3-642-38631-2_8"},{"issue":"10","key":"1249_CR26","first-page":"268","volume":"13","author":"Z Li","year":"2014","unstructured":"Li Z, Chigan CT (2014) On joint privacy and reputation assurance for vehicular ad hoc networks. IEEE Trans Mob Comput 13(10):268\u2013273","journal-title":"IEEE Trans Mob Comput"},{"key":"1249_CR27","doi-asserted-by":"publisher","first-page":"25408","DOI":"10.1109\/ACCESS.2017.2769878","volume":"5","author":"X Huang","year":"2017","unstructured":"Huang X, Yu R, Kang J, Zhang Y (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5:25408\u201325420","journal-title":"IEEE Access"},{"key":"1249_CR28","first-page":"63","volume-title":"A distributed reputation scheme for situation awareness in vehicular ad hoc networks (VANETs), in Proc","author":"X Huang","year":"2016","unstructured":"Huang X, Yu R, Kang J, Zhang Y (2016) A distributed reputation scheme for situation awareness in vehicular ad hoc networks (VANETs), in Proc. San Diego, Mar, IEEE CogSIMA, pp 63\u201367"},{"key":"1249_CR29","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis K, Devetsikiotis M (2016) Blockchains and smart contracts for the Internet of Things. IEEE Access 4:2292\u20132303","journal-title":"IEEE Access"},{"issue":"6","key":"1249_CR30","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.1109\/JIOT.2017.2740569","volume":"4","author":"A Lei","year":"2017","unstructured":"Lei A, Cruickshank H, Cao Y, Asuquo P, Ogah CPA, Sun Z (2017) Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J 4(6):1832\u20131843","journal-title":"IEEE Internet Things J"},{"key":"1249_CR31","doi-asserted-by":"crossref","unstructured":"Cai C, Yuan X, Wang C (2017) Towards trustworthy and private keyword search in encrypted decentralized storage. In Proc IEEE 2017 International Conference on Communications (ICC), Paris\u00a0pp. 1-7","DOI":"10.1109\/ICC.2017.7996810"},{"key":"1249_CR32","doi-asserted-by":"crossref","unstructured":"Yang Z, Yang K, Lei L, Zheng K, Leung VC (2018) Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J","DOI":"10.1109\/JIOT.2018.2836144"},{"key":"1249_CR33","doi-asserted-by":"publisher","first-page":"45655","DOI":"10.1109\/ACCESS.2018.2864189","volume":"6","author":"Z Lu","year":"2018","unstructured":"Lu Z, Liu W, Wang Q, Qu G, Liu Z (2018) A privacy-preserving trust model based on blockchain for vanets. IEEE Access 6:45655\u201345664","journal-title":"IEEE Access"},{"key":"1249_CR34","doi-asserted-by":"crossref","unstructured":"Zheng Z et al (2017) An overview of blockchain technology: Architecture, consensus, and future trends. 2017 IEEE international congress on big data (BigData congress). IEEE","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"1249_CR35","doi-asserted-by":"crossref","unstructured":"Kang J et al (2018) Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things J 6(3):4660\u20134670","DOI":"10.1109\/JIOT.2018.2875542"},{"key":"1249_CR36","doi-asserted-by":"crossref","unstructured":"Kchaou A, Abassi R, Guemara S (2018) Toward a distributed trust management scheme for vanet. In Proc 13th Int Conf Availability Rel Secur\u00a0pp. 53:1\u201353:6","DOI":"10.1145\/3230833.3232824"},{"key":"1249_CR37","doi-asserted-by":"publisher","first-page":"45655","DOI":"10.1109\/ACCESS.2018.2864189","volume":"6","author":"Z Lu","year":"2018","unstructured":"Lu Z, Liu W, Wang Q, Qu G, Liu Z (2018) A privacy-preserving trust model based on blockchain for vanets. IEEE Access 6:45655\u201345664","journal-title":"IEEE Access"},{"key":"1249_CR38","doi-asserted-by":"crossref","unstructured":"Kang J et al (2019) Towards Secure Blockchain-enabled Internet of Vehicles: Optimizing Consensus Management Using Reputation and Contract Theory. IEEE Trans Veh Technol","DOI":"10.1109\/TVT.2019.2894944"},{"key":"1249_CR39","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system"},{"key":"1249_CR40","unstructured":"Swan M (2015) Blockchain: Blueprint for a new economy. O\u2019Reilly Media, Inc."},{"key":"1249_CR41","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C, Christidis K, De Caro A, Enyeart D et al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference, p. 30. ACM","DOI":"10.1145\/3190508.3190538"},{"key":"1249_CR42","doi-asserted-by":"crossref","unstructured":"Kenney JB (2011) Dedicated short-range communications (DSRC) standards in the United States. Proceedings of the IEEE 99(7):1162\u20131182","DOI":"10.1109\/JPROC.2011.2132790"},{"key":"1249_CR43","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G (2014) Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151:1\u201332","journal-title":"Ethereum project yellow paper"},{"key":"1249_CR44","first-page":"139","volume-title":"The hyperledger project","author":"V Dhillon","year":"2017","unstructured":"Dhillon V, Metcalf D, Hooper M (2017) The hyperledger project. Blockchain enabled applications. Apress, Berkeley, CA, pp 139\u2013149"},{"key":"1249_CR45","unstructured":"Olson K, Bowman M, Mitchell J, Amundson S, Middleton D, Montgomery C (2018) Sawtooth: An Introduction. The Linux Foundation, Jan"},{"key":"1249_CR46","doi-asserted-by":"crossref","unstructured":"Sivia D, Skilling J (2006) Data Analysis: A Bayesian Tutorial. Oxford University Press, 2nd edition","DOI":"10.1093\/oso\/9780198568315.001.0001"},{"key":"1249_CR47","doi-asserted-by":"crossref","unstructured":"Bouzid Z, Potop-Butucaru MG, Tixeuil S (2009) Optimal Byzantine resilient convergence in asynchronous robots networks. Symposium on Self-Stabilizing Systems. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-05118-0_12"},{"issue":"11","key":"1249_CR48","doi-asserted-by":"publisher","first-page":"678926","DOI":"10.1155\/2015\/678926","volume":"11","author":"R Feng","year":"2015","unstructured":"Feng R et al (2015) A credible Bayesian-based trust management scheme for wireless sensor networks. Int J Distrib Sens Netw 11(11):678926","journal-title":"Int J Distrib Sens Netw"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01249-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01249-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01249-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,12]],"date-time":"2023-11-12T04:06:57Z","timestamp":1699762017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01249-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["1249"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01249-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"22 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}