{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T06:51:25Z","timestamp":1774767085992,"version":"3.50.1"},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:00:00Z","timestamp":1735862400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T00:00:00Z","timestamp":1735862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,3]]},"DOI":"10.1007\/s12083-024-01835-3","type":"journal-article","created":{"date-parts":[[2025,1,3]],"date-time":"2025-01-03T12:54:04Z","timestamp":1735908844000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Trust-based secure federated learning framework to mitigate internal attacks for intelligent vehicular networks"],"prefix":"10.1007","volume":"18","author":[{"given":"D. S. Bhupal","family":"Naik","sequence":"first","affiliation":[]},{"given":"Venkatesulu","family":"Dondeti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,3]]},"reference":[{"key":"1835_CR1","doi-asserted-by":"publisher","unstructured":"Tajeddine A, Kayssi A, Chehab A (2010) A privacy-preserving trust model for VANETs. In: 10th IEEE International Conference on Computer and Information Technology, Bradford, UK, pp 832\u2013837.\u00a0https:\/\/doi.org\/10.1109\/CIT.2010.157","DOI":"10.1109\/CIT.2010.157"},{"key":"1835_CR2","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/2656346.2656353","volume-title":"Proc. of the 4th ACM international symposium on development and analysis of intelligent vehicular networks and applications","author":"Z Wei","year":"2014","unstructured":"Wei Z, Yu FR, Boukerche A (2014) Trust based security enhancements for vehicular ad\u2013hoc networks. In: Proc. of the 4th ACM international symposium on development and analysis of intelligent vehicular networks and applications, pp 103\u2013109.\u00a0https:\/\/doi.org\/10.1145\/2656346.2656353"},{"key":"1835_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-9139-3","volume-title":"Privacy-preserving aggregation in federated learning: a survey","author":"Z Liu","year":"2022","unstructured":"Liu Z, Guo J, Yang W, Fan J, Lam KY, Zhao J (2022) Privacy-preserving aggregation in federated learning: a survey. IEEE Trans Big Data.\u00a0https:\/\/doi.org\/10.1109\/TBDATA.2022.3190835"},{"key":"1835_CR4","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comnet.2018.12.018","volume":"151","author":"A Alnasser","year":"2019","unstructured":"Alnasser A, Sun H, Jiang J (2019) Cyber security challenges and solutions for V2X communications: A survey. Computer Networks 151:52\u201367","journal-title":"Computer Networks"},{"key":"1835_CR5","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1109\/AINA.2011.86","volume-title":"IEEE conference on Advanced information networking and applications (AINA)","author":"J Zhang","year":"2011","unstructured":"Zhang J (2011) A survey on trust management for VANETs. In: IEEE conference on Advanced information networking and applications (AINA), pp 105\u2013112.\u00a0https:\/\/doi.org\/10.1109\/AINA.2011.86"},{"key":"1835_CR6","doi-asserted-by":"publisher","unstructured":"Zhang J (2011) A survey on trust management for VANETs. In: 2011 IEEE international conference on advanced information networking and applications, Biopolis, pp 105\u2013112. https:\/\/doi.org\/10.1109\/AINA.2011.86","DOI":"10.1109\/AINA.2011.86"},{"key":"1835_CR7","volume-title":"Proceedings of VANET","author":"P Golle","year":"2004","unstructured":"Golle P, Greene D, Staddon J (2004) Detecting and correcting malicious data in vanets. In: Proceedings of VANET"},{"key":"1835_CR8","volume-title":"Proceedings of the Int. Conf. on information technology convergence and services","author":"C Chen","year":"2010","unstructured":"Chen C, Zhang J, Cohen R, Ho P-H (2010) A trust-based message propagation and evaluation framework in Vanets. In: Proceedings of the Int. Conf. on information technology convergence and services"},{"issue":"9","key":"1835_CR9","doi-asserted-by":"publisher","first-page":"4423","DOI":"10.1007\/s00500-021-06496-5","volume":"26","author":"D Li","year":"2022","unstructured":"Li D, Han D, Weng TH, Zheng Z, Li H, Liu H, Castiglione A, Li KC (2022) Blockchain for federated learning toward secure distributed machine learning systems: a systemic survey. Soft Comput 26(9):4423\u20134440","journal-title":"Soft Comput"},{"key":"1835_CR10","doi-asserted-by":"publisher","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","volume":"17","author":"W Li","year":"2016","unstructured":"Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Intell Transp Syst 17:960\u2013969","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1835_CR11","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/ComComAp.2013.6533601","volume-title":"Proc. of computing, communications and IT applications conference (ComComAp)","author":"N Haddadou","year":"2013","unstructured":"Haddadou N, Rachedi A, Ghamri-Doudane Y (2013) Trust and exclusion in vehicular ad hoc networks: an economic incentive model based approach. In: Proc. of computing, communications and IT applications conference (ComComAp), pp 13\u201318.\u00a0https:\/\/doi.org\/10.1109\/ComComAp.2013.6533601"},{"key":"1835_CR12","doi-asserted-by":"publisher","unstructured":"Li X, Liu J, Li X, Sun W (2013) RGTE: a reputation-based global trust establishment in VANETs. In: Proc. of the 5th international conference on intelligent networking and collaborative systems (INCoS), pp 210\u2013214.\u00a0https:\/\/doi.org\/10.1109\/INCoS.2013.91","DOI":"10.1109\/INCoS.2013.91"},{"key":"1835_CR13","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1145\/3351095.3372834","volume-title":"Proceedings of the 2020 conference on fairness, accountability, and transparency","author":"E Toreini","year":"2020","unstructured":"Toreini E, Aitken M, Coopamootoo K, Elliott K, Zelaya CG, Van Moorsel A (2020) The relationship between trust in AI and trustworthy machine learning technologies. In: Proceedings of the 2020 conference on fairness, accountability, and transparency, pp 272\u2013283.\u00a0https:\/\/doi.org\/10.1145\/3351095.3372834"},{"key":"1835_CR14","doi-asserted-by":"publisher","first-page":"20","DOI":"10.48550\/arXiv.2011.06830","volume-title":"2020 second IEEE international conference on trust, privacy and security in intelligent systems and applications (TPS ISA)","author":"J Huang","year":"2020","unstructured":"Huang J, Talbi R, Zhao Z, Boucchenak S, Chen LY, Roos S (2020) An exploratory analysis on users\u2019 contributions in federated learning. 2020 second IEEE international conference on trust, privacy and security in intelligent systems and applications (TPS ISA). IEEE, pp 20\u201329.\u00a0https:\/\/doi.org\/10.48550\/arXiv.2011.06830"},{"key":"1835_CR15","doi-asserted-by":"crossref","unstructured":"Rasheed K, Qayyum A, Ghaly M, Al-Fuqaha A, Razi A, Qadir J (2022) Explainable, trustworthy, and ethical machine learning for healthcare: a survey. Comput Biol Med:106043","DOI":"10.1016\/j.compbiomed.2022.106043"},{"issue":"9","key":"1835_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3555803","volume":"55","author":"B Li","year":"2023","unstructured":"Li B, Qi P, Liu B, Di S, Liu J, Pei J, Yi J, Zhou B (2023) Trustworthy AI: from principles to practices. ACM Comput Surv 55(9):1\u201346","journal-title":"ACM Comput Surv"},{"key":"1835_CR17","unstructured":"Li A, Liu R, Hu M, Tuan LA, Yu H (2023) Towards interpretable federated learning. arXiv preprint arXiv:2302.13473"},{"key":"1835_CR18","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.comcom.2016.05.013","volume":"93","author":"CA Kerrache","year":"2016","unstructured":"Kerrache CA, Lagraa N, Calafate CT, Cano J-C, Manzoni P (2016) T-VNets: a novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS. Comput Commun 93:68\u201383","journal-title":"Comput Commun"},{"key":"1835_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1403007.1403015","volume-title":"Proc. of the 3rd international workshop on mobility in the evolving internet architecture","author":"X Hong","year":"2008","unstructured":"Hong X, Huang D, Gerla M, Cao Z (2008) SAT: situation-aware trust architecture for vehicular networks. In: Proc. of the 3rd international workshop on mobility in the evolving internet architecture, pp 31\u201336.\u00a0https:\/\/doi.org\/10.1145\/1403007.1403015"},{"issue":"4","key":"1835_CR20","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1111\/1467-8640.00202","volume":"18","author":"B Yu","year":"2002","unstructured":"Yu B, Singh M (2002) Distributed reputation management for electronic commerce. Comput Intell 18(4):535\u2013549","journal-title":"Comput Intell"},{"key":"1835_CR21","doi-asserted-by":"publisher","first-page":"9293","DOI":"10.1109\/ACCESS.2016.2645452","volume":"4","author":"CA Kerrache","year":"2016","unstructured":"Kerrache CA, Calafate CT, Cano J-C, Lagraa N, Manzoni P (2016) Trust management for vehicular networks: an adversary-oriented overview. IEEE Access 4:9293\u20139307","journal-title":"IEEE Access"},{"issue":"9","key":"1835_CR22","doi-asserted-by":"publisher","first-page":"14439","DOI":"10.1109\/TITS.2021.3129484","volume":"23","author":"H Mun","year":"2022","unstructured":"Mun H, Seo M, Lee DH (2022) Secure privacy-preserving V2V communications in 5G-V2X supporting network slicing. IEEE Trans Intell Transp Syst 23(9):14439\u201314455","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1835_CR23","doi-asserted-by":"publisher","unstructured":"Chen C, Zhang J, Cohen R, Ho P-H (2010) A trust modeling framework for message propagation and evaluation in VANETs. In:\u00a02nd International Conference on Information Technology Convergence and Services, Cebu, Philippines, pp 1\u20138.\u00a0https:\/\/doi.org\/10.1109\/ITCS.2010.5581298","DOI":"10.1109\/ITCS.2010.5581298"},{"key":"1835_CR24","doi-asserted-by":"publisher","unstructured":"Wex P, Breuer J, Held A, Leinmuller T, Delgrossi L (2008) Trust issues for vehicular ad hoc networks. In: VTC spring 2008 - IEEE vehicular technology conference, Marina Bay, pp 2800\u20132804. https:\/\/doi.org\/10.1109\/VETECS.2008.611","DOI":"10.1109\/VETECS.2008.611"},{"key":"1835_CR25","first-page":"1","volume-title":"VANET in symposium on colossal data analysis and networking (CDAN)","author":"K Dixit","year":"2016","unstructured":"Dixit K, Pathak P, Gupta S (2016) A new technique for trust computation and routing. In: VANET in symposium on colossal data analysis and networking (CDAN), pp 1\u20136"},{"key":"1835_CR26","unstructured":"Minhas UF, Zhang J, Tran T, Cohen R (2010) Towards expanded trust management for agents in vehicular ad-hoc networks. International Journal of Computational Intelligence Theory and Practice (IJCITP) 5(1)"},{"key":"1835_CR27","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.180","volume-title":"Technical report, LCA-REPORT-2007-003","author":"M Raya","year":"2007","unstructured":"Raya M, Papadimitratos P, Gligor V, Hubaux J (2007) On data-centric trust establishment in ephemeral ad hoc networks. In: Technical report, LCA-REPORT-2007-003.\u00a0https:\/\/doi.org\/10.1109\/INFOCOM.2008.180"},{"key":"1835_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.66","volume-title":"Proceedings of the IEEE\/WIC\/ACM international conference on intelligent agent technology (IAT)","author":"UF Minhas","year":"2010","unstructured":"Minhas UF, Zhang J, Tran T, Cohen R (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: Proceedings of the IEEE\/WIC\/ACM international conference on intelligent agent technology (IAT).\u00a0https:\/\/doi.org\/10.1109\/WI-IAT.2010.66"},{"key":"1835_CR29","volume-title":"Proceedings of the international symposium on autonomous decentralized systems","author":"M Gerlach","year":"2007","unstructured":"Gerlach M (2007) Trust for vehicular applications. In: Proceedings of the international symposium on autonomous decentralized systems"},{"key":"1835_CR30","doi-asserted-by":"publisher","first-page":"1786","DOI":"10.1109\/TVT.2016.2565001","volume":"66","author":"H Hu","year":"2017","unstructured":"Hu H, Lu R, Zhang Z, Shao J (2017) REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans Veh Technol 66:1786\u20131797","journal-title":"IEEE Trans Veh Technol"},{"key":"1835_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/WCSP.2010.5633513","volume-title":"International conference on wireless communications and signal processing (WCSP)","author":"Q Ding","year":"2010","unstructured":"Ding Q, Li X, Jiang M, Zhou X (2010) Reputation-based trust model in vehicular ad hoc networks. In: International conference on wireless communications and signal processing (WCSP), pp 1\u20136.\u00a0https:\/\/doi.org\/10.1109\/WCSP.2010.5633513"},{"key":"1835_CR32","first-page":"1","volume-title":"Beacon-based trust management for location privacy enhancement VANETs in network operations and management symposium (APNOMS)","author":"Y-C Wei","year":"2011","unstructured":"Wei Y-C, Chen Y-M, Shan H-L (2011) Beacon-based trust management for location privacy enhancement VANETs in network operations and management symposium (APNOMS), pp 1\u20138"},{"key":"1835_CR33","doi-asserted-by":"publisher","unstructured":"Yu B, Singh MP (2002) An evidential model of distributed reputation management. In: Proceedings of international autonomous agents and multi agent systems (AAMAS), Bologna.\u00a0https:\/\/doi.org\/10.1145\/544741.544809","DOI":"10.1145\/544741.544809"},{"key":"1835_CR34","unstructured":"Ismail R, J\u00f8sang A (2002) The beta reputation system. In:\u00a0BLED 2002 Proceedings, 41.\u00a0https:\/\/aisel.aisnet.org\/bled2002\/41"},{"key":"1835_CR35","unstructured":"https:\/\/arxiv.org\/abs\/2305.11537v1"},{"key":"1835_CR36","doi-asserted-by":"crossref","unstructured":"Alnasser A, Sun H (2017) A fuzzy logic trust model for secure routing in smart grid networks. IEEE Access 5:17896\u201317903","DOI":"10.1109\/ACCESS.2017.2740219"},{"issue":"6","key":"1835_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3460427","volume":"54","author":"X Yin","year":"2021","unstructured":"Yin X, Zhu Y, Hu J (2021) A comprehensive survey of privacy preserving federated learning: a taxonomy, review, and future directions. ACM Comput Surv (CSUR) 54(6):1\u201336","journal-title":"ACM Comput Surv (CSUR)"},{"key":"1835_CR38","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2021.104468","volume":"106","author":"A Blanco-Justicia","year":"2021","unstructured":"Blanco-Justicia A, Domingo-Ferrer J, Mart\u00ednez S, Sanchez D, Flanagan A, Tan KE (2021) Achieving security and privacy in federated learning systems: survey, research challenges and future directions. Eng Appl Artif Intell 106:104468","journal-title":"Eng Appl Artif Intell"},{"key":"1835_CR39","doi-asserted-by":"publisher","unstructured":"Qammar A, Karim A, Ning H, Ding J (2022) Securing federated learning with blockchain: a systematic literature review. Artif Intell Rev:1\u201335.\u00a0https:\/\/doi.org\/10.1007\/s10462-022-10271-9","DOI":"10.1007\/s10462-022-10271-9"},{"key":"1835_CR40","doi-asserted-by":"publisher","first-page":"736","DOI":"10.1109\/INFCOMW.2018.8406818","volume-title":"Proc. of IEEE conference on computer communications workshops (INFOCOM)","author":"A Alnasser","year":"2018","unstructured":"Alnasser A, Sun H (2018) Performance analysis of behavior-based solutions in vehicular networks. In: Proc. of IEEE conference on computer communications workshops (INFOCOM), pp 736\u2013741.\u00a0https:\/\/doi.org\/10.1109\/INFCOMW.2018.8406818"},{"key":"1835_CR41","doi-asserted-by":"publisher","unstructured":"Uprety A, Rawat DB, Li J (2021) Privacy preserving misbehavior detection in IoV using federated machine learning. In: 2021 IEEE 18th annual consumer communications & networking conference (CCNC), Las Vegas, NV, pp 1\u20136. https:\/\/doi.org\/10.1109\/CCNC49032.2021.9369513","DOI":"10.1109\/CCNC49032.2021.9369513"},{"key":"1835_CR42","doi-asserted-by":"publisher","unstructured":"Tham K, Yang L, Khanna A, Gera B (2023) Federated learning for anomaly detection in vehicular networks. In: 2023 IEEE 97th vehicular technology conference (VTC2023-spring), Florence, pp 1\u20136. https:\/\/doi.org\/10.1109\/VTC2023-Spring57618.2023.10199870","DOI":"10.1109\/VTC2023-Spring57618.2023.10199870"},{"key":"1835_CR43","doi-asserted-by":"publisher","unstructured":"Naik DB, Dondeti V (2023) Secure federated learning-based privacy preserving in V2V communications. In: 2023 IEEE 15th international conference on computational intelligence and communication networks (CICN), Bangkok, pp 421\u2013427. https:\/\/doi.org\/10.1109\/CICN59264.2023.10402294","DOI":"10.1109\/CICN59264.2023.10402294"},{"key":"1835_CR44","doi-asserted-by":"publisher","unstructured":"Naik DB, Dondeti V (2023) Pothole detection and classification in vehicular networks using ResNet-18. In: IEEE 7th conference on information and communication technology (CICT), Jabalpur, pp 1\u20136. https:\/\/doi.org\/10.1109\/CICT59886.2023.10455573","DOI":"10.1109\/CICT59886.2023.10455573"},{"key":"1835_CR45","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/TSG.2012.2224390","volume":"4","author":"Y Zhang","year":"2013","unstructured":"Zhang Y, Wang L, Sun W (2013) Trust system design optimization in smart grid network infrastructure. IEEE Trans Smart Grid 4:184\u2013195","journal-title":"IEEE Trans Smart Grid"},{"key":"1835_CR46","doi-asserted-by":"publisher","unstructured":"Naik DSB, Kumar SD, Ramakrishna SV (2013) Parallel processing of enhanced K-means using OpenMP. In: 2013 IEEE international conference on computational intelligence and computing research, Enathi, pp 1\u20134. https:\/\/doi.org\/10.1109\/ICCIC.2013.6724291","DOI":"10.1109\/ICCIC.2013.6724291"},{"issue":"1","key":"1835_CR47","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijirr.298647","volume":"12","author":"DS Bhupal Naik","year":"2022","unstructured":"Bhupal Naik DS, Dondeti V, Balakrishna S (2022) Comparative analysis of machine learning-based algorithms for detection of anomalies in IIoT. Int J Inf Retr Res 12(1):1\u201355. https:\/\/doi.org\/10.4018\/ijirr.298647","journal-title":"Int J Inf Retr Res"},{"key":"1835_CR48","doi-asserted-by":"publisher","unstructured":"Kogut Al, Annino G, El Bakkali M, Laamara RA, Arora SK, Bhupal Naik DS, Maniraguha F (2022) Millimeter wave all-around antenna based on whispering gallery mode dielectric resonator for IoT-based applications. Wirel Commun Mob Comput:5877263. https:\/\/doi.org\/10.1155\/2022\/5877263","DOI":"10.1155\/2022\/5877263"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01835-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01835-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01835-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:34:55Z","timestamp":1747474495000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01835-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,3]]},"references-count":48,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["1835"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01835-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,3]]},"assertion":[{"value":"21 June 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 October 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 January 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"This manuscript is approved by all authors for publication.\u00a0The authors declare that they have no conflicts of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"10"}}