{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:12:51Z","timestamp":1761581571209},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,6,1]],"date-time":"2017-06-01T00:00:00Z","timestamp":1496275200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Commun. Inf. Netw."],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s41650-017-0025-7","type":"journal-article","created":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T09:10:05Z","timestamp":1498122605000},"page":"46-58","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["On the security of warning message dissemination in vehicular Ad hoc networks"],"prefix":"10.23919","volume":"2","author":[{"given":"Jieqiong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Guoqiang","family":"Mao","sequence":"additional","affiliation":[]}],"member":"263","published-online":{"date-parts":[[2017,6,22]]},"reference":[{"issue":"4","key":"25_CR1","doi-asserted-by":"crossref","first-page":"2377","DOI":"10.1109\/COMST.2015.2440103","volume":"17","author":"K. Zheng","year":"2015","unstructured":"K. Zheng, Q. Zheng, P. Chatzimisios, et al. Heterogeneous vehicular networking: a survey on architecture, challenges, and solutions [J]. IEEE communication survey & tutorials, 2015, 17(4): 2377\u20132396.","journal-title":"IEEE communication survey & tutorials"},{"issue":"7","key":"25_CR2","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/JPROC.2011.2132790","volume":"99","author":"J. Kenny","year":"2011","unstructured":"J. Kenny. Dedicated Short-Range Communications (DSRC) standards in the United States [J]. Proceedings of the IEEE, 2011, 99(7): 1162\u20131182.","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"25_CR3","doi-asserted-by":"crossref","first-page":"2420","DOI":"10.1109\/COMST.2015.2472395","volume":"17","author":"S. Ilarri","year":"2015","unstructured":"S. Ilarri, T. Delot, R. Trillo-Lado. A data management perspective on vehicular networks [J]. IEEE communication survey & tutorials, 2015, 17(4): 2420\u20132460.","journal-title":"IEEE communication survey & tutorials"},{"key":"25_CR4","first-page":"1","volume-title":"Graph theoretic models and tools for the analysis of dynamic wireless multihop networks","author":"G. Mao","year":"2009","unstructured":"G. Mao, B. D. O. Anderson. Graph theoretic models and tools for the analysis of dynamic wireless multihop networks [C]\/\/IEEE Wireless Communications & Networking Conference, 2009: 1\u20136."},{"key":"25_CR5","first-page":"201","volume-title":"A distributed advanced analytical trust model for VANETs","author":"T. Gazdar","year":"2012","unstructured":"T. Gazdar, A. Rachedi, A. Benslimane, et al. A distributed advanced analytical trust model for VANETs [C]\/\/IEEE Global Communications Conference (GLOBECOM) 2012: 201\u2013206."},{"key":"25_CR6","doi-asserted-by":"crossref","first-page":"965","DOI":"10.1016\/j.procs.2015.01.006","volume":"46","author":"U. Khan","year":"2015","unstructured":"U. Khan, S. Agrawal, S. Silakari. Detection of Malicious Nodes (DMN) in vehicular Ad hoc networks [J]. Procedia computer science, 2015, 46: 965\u2013972.","journal-title":"Procedia computer science"},{"issue":"8","key":"25_CR7","doi-asserted-by":"crossref","first-page":"3657","DOI":"10.1109\/TVT.2014.2360883","volume":"64","author":"N. Haddadou","year":"2015","unstructured":"N. Haddadou, A. Rachedi, Y. Ghamri-Doudane. A job market signaling scheme for incentive and trust management in vehicular Ad hoc networks [J]. IEEE transactions on vehicular technology, 2015, 64(8): 3657\u20133674.","journal-title":"IEEE transactions on vehicular technology"},{"key":"25_CR8","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.compeleceng.2015.02.018","volume":"43","author":"H. Sedjelmaci","year":"2015","unstructured":"H. Sedjelmaci, S. M. Senouci. An accurate and efficient collaborative intrusion detection framework to secure vehicular networks [J]. Computers and electrical engineering, 2015, 43: 33\u201347.","journal-title":"Computers and electrical engineering"},{"issue":"4","key":"25_CR9","doi-asserted-by":"crossref","first-page":"1505","DOI":"10.1109\/TVT.2012.2236117","volume":"62","author":"S. Dietzel","year":"2013","unstructured":"S. Dietzel, J. Petit, G. Heijenk, et al. Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols [J]. IEEE transactions on vehicular technology, 2013, 62(4): 1505\u20131518.","journal-title":"IEEE transactions on vehicular technology"},{"key":"25_CR10","first-page":"1238","volume-title":"On data-centric trust establishment in ephemeral Ad hoc networks","author":"M. Raya","year":"2008","unstructured":"M. Raya, P. Papadimitratos, V. D. Gligor, et al. On data-centric trust establishment in ephemeral Ad hoc networks [C]\/\/IEEE Infocom the Conference on Computer Communications, 2008: 1238\u20131246."},{"issue":"3","key":"25_CR11","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s12083-012-0136-8","volume":"7","author":"Z. Huang","year":"2014","unstructured":"Z. Huang, S. Ruj, M. A. Cavenaghi, et al. A social network approach to trust management in VANETs [J]. Peer-to-peer networking and applications, 2014, 7(3): 229\u2013242.","journal-title":"Peer-to-peer networking and applications"},{"issue":"8","key":"25_CR12","doi-asserted-by":"crossref","first-page":"6703","DOI":"10.1109\/TVT.2015.2480244","volume":"65","author":"K. Zaidi","year":"2014","unstructured":"K. Zaidi, M. B. Milojevic, V. Rakocevic, et al. Hostbased intrusion detection for VANETs: a statistical approach to rogue node detection [J]. IEEE transactions on vehicular technology, 2014, 65(8): 6703\u20136714.","journal-title":"IEEE transactions on vehicular technology"},{"issue":"1","key":"25_CR13","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/TITS.2015.2464707","volume":"17","author":"J. Radak","year":"2016","unstructured":"J. Radak, B. Ducourthial, V. Cherfaoui, et al. Detecting road events using distributed data fusion: experimental evaluation for the icy roads case [J]. IEEE transactions on intelligent transportation systems, 2016, 17(1): 184\u2013194.","journal-title":"IEEE transactions on intelligent transportation systems"},{"issue":"2","key":"25_CR14","doi-asserted-by":"crossref","first-page":"384","DOI":"10.1109\/JSYST.2013.2245971","volume":"8","author":"S. K. Dhurandher","year":"2014","unstructured":"S. K. Dhurandher, M. S. Obaidat, A. Jaiswal, et al. Vehicular security through reputation and plausibility checks [J]. IEEE system journal, 2014, 8(2): 384\u2013394.","journal-title":"IEEE system journal"},{"issue":"4","key":"25_CR15","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TITS.2015.2494017","volume":"17","author":"W. Li","year":"2016","unstructured":"W. Li, H. Song. ART: an attack-resistant trust management scheme for securing vehicular Ad hoc networks [J]. IEEE transactions on intelligent transportation systems, 2016, 17(4): 960\u2013969.","journal-title":"IEEE transactions on intelligent transportation systems"},{"key":"25_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2426-4","volume-title":"Probability, stochastic processes, and queueing theory: the mathematics of computer performance modeling [M]","author":"R. Nelson","year":"1995","unstructured":"R. Nelson. Probability, stochastic processes, and queueing theory: the mathematics of computer performance modeling [M]. New York: Springer-Verlag, 1995."},{"issue":"8","key":"25_CR17","doi-asserted-by":"crossref","first-page":"1538","DOI":"10.1109\/JSAC.2007.071005","volume":"25","author":"N. Wisitpongphan","year":"2007","unstructured":"N. Wisitpongphan, B. Fan, P. Mudalige, et al. Routing in sparse vehicular Ad hoc wireless networks [J]. IEEE journal on selected areas in communications, 2007, 25(8): 1538\u20131556.","journal-title":"IEEE journal on selected areas in communications"},{"issue":"6","key":"25_CR18","doi-asserted-by":"crossref","first-page":"2794","DOI":"10.1109\/TVT.2013.2292519","volume":"63","author":"A. B. Reis","year":"2014","unstructured":"A. B. Reis, S. Sargento, F. Neves, et al. Deploying roadside units in sparse vehicular networks: what really works and what does not [J]. IEEE transactions on vehicular technology, 2014, 63(6): 2794\u20132806.","journal-title":"IEEE transactions on vehicular technology"},{"key":"25_CR19","first-page":"324","volume-title":"Cooperative information forwarding in vehicular networks subject to channel randomness","author":"Z. Zhang","year":"2014","unstructured":"Z. Zhang, G. Mao, T. Han et al. Cooperative information forwarding in vehicular networks subject to channel randomness [C]\/\/IEEE international conference on communications, 2014: 324\u2013329."},{"issue":"1","key":"25_CR20","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/TITS.2013.2274274","volume":"15","author":"Z. Zhang","year":"2014","unstructured":"Z. Zhang, G. Mao, B. D. O. Anderson. Stochastic characterization of information propagation process in vehicular ad hoc networks [J]. IEEE transactions on intelligent transportation systems, 2014, 15(1): 122\u2013135.","journal-title":"IEEE transactions on intelligent transportation systems"},{"issue":"2","key":"25_CR21","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1109\/TVT.2015.2402177","volume":"65","author":"M. Azimifar","year":"2016","unstructured":"M. Azimifar, T. Todd, G. Karakostas, et al. Vehicle-tovehicle forwarding in green roadside infrastructure [J]. IEEE transactions on vehicular technology, 2016, 65(2): 780\u2013795.","journal-title":"IEEE transactions on vehicular technology"},{"issue":"5","key":"25_CR22","doi-asserted-by":"crossref","first-page":"2297","DOI":"10.1109\/TITS.2014.2314453","volume":"15","author":"K. Abboud","year":"2014","unstructured":"K. Abboud, W. Zhuang. Stochastic analysis of a singlehop communication link in vehicular Ad hoc networks [J]. IEEE transactions on intelligent transportation systems, 2014, 15(5): 2297\u20132307.","journal-title":"IEEE transactions on intelligent transportation systems"},{"key":"25_CR23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-52989-9","volume-title":"Connectivity of communication networks [M]","author":"G. Mao","year":"2017","unstructured":"G. Mao. Connectivity of communication networks [M]. New York: Springer, 2017."},{"issue":"2","key":"25_CR24","doi-asserted-by":"crossref","first-page":"408","DOI":"10.1109\/TNET.2011.2160650","volume":"20","author":"G. Mao","year":"2012","unstructured":"G. Mao, B. D. O. Anderson. Towards a better understanding of large scale network models [J]. IEEE\/ACM transactions on networking, 2012, 20(2): 408\u2013421.","journal-title":"IEEE\/ACM transactions on networking"},{"issue":"3","key":"25_CR25","doi-asserted-by":"crossref","first-page":"1761","DOI":"10.1109\/TIT.2012.2228894","volume":"59","author":"G. Mao","year":"2013","unstructured":"G. Mao, B. D. O. Anderson. Connectivity of large wireless networks under a general connection Model [J]. IEEE transactions on information theory, 2013, 59(3): 1761\u20131772.","journal-title":"IEEE transactions on information theory"},{"issue":"6","key":"25_CR26","doi-asserted-by":"crossref","first-page":"2644","DOI":"10.1109\/TITS.2014.2321293","volume":"15","author":"Z. Haibo","year":"2014","unstructured":"Z. Haibo, L. Bo, T. H. Luan, et al. ChainCluster: engineering a cooperative content distribution framework for highway vehicular communications[J]. IEEE transactions on intelligent transportation systems, 2014, 15(6): 2644\u20132657.","journal-title":"IEEE transactions on intelligent transportation systems"}],"container-title":["Journal of Communications and Information Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s41650-017-0025-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41650-017-0025-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s41650-017-0025-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,24]],"date-time":"2022-06-24T12:12:31Z","timestamp":1656072751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s41650-017-0025-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["25"],"URL":"https:\/\/doi.org\/10.1007\/s41650-017-0025-7","relation":{},"ISSN":["2096-1081","2509-3312"],"issn-type":[{"value":"2096-1081","type":"print"},{"value":"2509-3312","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6]]}}}