{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,7]],"date-time":"2026-05-07T23:22:19Z","timestamp":1778196139524,"version":"3.51.4"},"reference-count":29,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T00:00:00Z","timestamp":1742083200000},"content-version":"vor","delay-in-days":74,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1016\/j.procs.2025.03.079","type":"journal-article","created":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T06:16:37Z","timestamp":1745561797000},"page":"615-622","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["VANETGuard: A Secure Hybrid Trust Management System for VANETs"],"prefix":"10.1016","volume":"257","author":[{"given":"Reem","family":"Almaziad","sequence":"first","affiliation":[]},{"given":"Heba","family":"Kurdi","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2025.03.079_bib1","doi-asserted-by":"crossref","unstructured":"I. Baird, I. Wadhaj, B. Ghaleb, and C. Thomson, \"Impact Analysis of Security Attacks on Mobile Ad Hoc Networks (MANETs),\" Electronics, vol. 13, no. 16, Aug. 2024.","DOI":"10.3390\/electronics13163314"},{"key":"10.1016\/j.procs.2025.03.079_bib2","unstructured":"S. U. Rehman, M. A. Khan, T. A. Zia, and L. Zheng, \"Vehicular ad-hoc networks (VANETs)\u2014An overview and challenges,\" EURASIP Journal on Wireless Communications and Networking, vol. 2013, no. 1, pp. 1-12, 2013."},{"key":"10.1016\/j.procs.2025.03.079_bib3","doi-asserted-by":"crossref","unstructured":"A. Feraudo, N. Romandini, C. Mazzocca, R. Montanari, and P. Bellavista, \"DIVA: A DID-based reputation system for secure transmission in VANETs using IOTA,\" Computer Networks, vol. 244, 2024.","DOI":"10.1016\/j.comnet.2024.110332"},{"key":"10.1016\/j.procs.2025.03.079_bib4","unstructured":"W3C, \"Decentralised Identifiers (DIDs) v1.0,\" W3C Recommendation, 2022. [Online]. Available: https:\/\/www.w3.org\/TR\/did-core\/."},{"key":"10.1016\/j.procs.2025.03.079_bib5","doi-asserted-by":"crossref","unstructured":"C. Mazzocca, A. Acar, S. Uluagac, R. Montanari, P. Bellavista, and M. Conti, \"A survey on decentralised identifiers and verifiable credentials,\" arXiv preprint, 2024.","DOI":"10.1109\/COMST.2025.3543197"},{"key":"10.1016\/j.procs.2025.03.079_bib6","unstructured":"W3C, \"Verifiable Credentials Data Model v1.1,\" W3C Recommendation, 2022. [Online]. Available: https:\/\/www.w3.org\/TR\/vc-data-model\/."},{"key":"10.1016\/j.procs.2025.03.079_bib7","unstructured":"S. Popov, O. Saa, and P. Finardi, \"Equilibria in the tangle,\" Computers & Mathematics with Applications, vol. 78, no. 5, pp. 1321-1332, 2019."},{"key":"10.1016\/j.procs.2025.03.079_bib8","doi-asserted-by":"crossref","unstructured":"M. N. Mejri and J. Ben-Othman, \"Entropy as a New Metric for Denial of Service Attack Detection in Vehicular Ad-hoc Networks,\" in Proc. 2014 Int. Wireless Commun. Mobile Comput. Conf. (IWCMC), Nicosia, Cyprus, 2014.","DOI":"10.1145\/2641798.2641800"},{"key":"10.1016\/j.procs.2025.03.079_bib9","doi-asserted-by":"crossref","unstructured":"W. Fang, W. Zhang, Y. Liu, W. Yang, and Z. Gao, \"BTDS: Bayesian-based trust decision scheme for intelligent connected vehicles in VANETs,\" Trans. Emerg. Telecommun. Technol., vol. 31, e3879, 2020.","DOI":"10.1002\/ett.3879"},{"key":"10.1016\/j.procs.2025.03.079_bib10","doi-asserted-by":"crossref","unstructured":"M. Raya and J.-P. Hubaux, \"Securing vehicular ad hoc networks,\" Journal of Computer Security, vol. 15, no. 1, pp. 39-68, Jan. 2007.","DOI":"10.3233\/JCS-2007-15103"},{"key":"10.1016\/j.procs.2025.03.079_bib11","unstructured":"R. Dahiya, F. Jiang, and R. Doss, \"Feedback-Driven Accuracy-Based Reputation Mechanism for Internet of Vehicles,\" JoWUA, vol. 8, no. 2, pp. 101-117, 2017."},{"key":"10.1016\/j.procs.2025.03.079_bib12","doi-asserted-by":"crossref","unstructured":"G. Zhang, et al., \"Intelligent Reputation System for Enhancing the Reliability of Safety Messages in VANETs,\" IEEE Transactions on Vehicular Technology, vol. 65, no. 12, pp. 9479-9491, Dec. 2016.","DOI":"10.1109\/TVT.2016.2614369"},{"key":"10.1016\/j.procs.2025.03.079_bib13","unstructured":"S. Kumar, P. Chauhan, and A. Agrawal, \"An Enhanced Reputation-Based Data Forwarding Mechanism in VANETs,\" in Springer Lecture Notes in Computer Science, vol. 1036, pp. 45-60, 2019."},{"key":"10.1016\/j.procs.2025.03.079_bib14","doi-asserted-by":"crossref","unstructured":"W. M\u00fchlbauer, et al., \"Certified Reputation System for VANETs with Digital Certificates,\" IEEE Communications Magazine, vol. 56, no. 3, pp. 70-77, Mar. 2018.","DOI":"10.1109\/MCOM.2018.8255742"},{"key":"10.1016\/j.procs.2025.03.079_bib15","unstructured":"I. Mahmood, A. Khan, and M. Ali, \"Distributed Reputation System for Scalable VANET Trust Management,\" IEEE Access, vol. 11, pp. 31035-31047, Mar. 2023."},{"key":"10.1016\/j.procs.2025.03.079_bib16","unstructured":"S. Sheikh, R. Ali, and Z. Ahmed, \"Blockchain-Assisted Reputation Management System for Secure Message Authentication in VANETs,\" IEEE Access, vol. 7, pp. 46984-46995, Apr. 2019."},{"key":"10.1016\/j.procs.2025.03.079_bib17","doi-asserted-by":"crossref","unstructured":"M. N. Mejri and J. Ben-Othman, \"Entropy as a New Metric for Denial of Service Attack Detection in Vehicular Ad-hoc Networks,\" in Proc. 7th ACM Symp. QoS Security Wireless Mobile Networks, 2014.","DOI":"10.1145\/2641798.2641800"},{"key":"10.1016\/j.procs.2025.03.079_bib18","doi-asserted-by":"crossref","unstructured":"S. Ahmed and K. Tepe, \"Entropy-Based Recommendation Trust Model for Machine to Machine Communications,\" in Proc. 8th Int. Conf. Ad-Hoc Networks Wireless, 2017.","DOI":"10.1007\/978-3-319-51204-4_24"},{"key":"10.1016\/j.procs.2025.03.079_bib19","unstructured":"R. Kumar and G. Mann, \"An Entropy-Based Trust Model for Mitigating Denial of Service Attacks in Vehicular Ad-hoc Networks,\" Int. J. Netw. Secur., vol. 21, no. 5, pp. 718-726, Sept. 2019."},{"key":"10.1016\/j.procs.2025.03.079_bib20","doi-asserted-by":"crossref","unstructured":"X. Yin and S. Li, \"Trust Evaluation Model with Entropy-Based Weight Assignment for Malicious Node Detection in Wireless Sensor Networks,\" EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 198, pp. 1-10, Dec. 2019.","DOI":"10.1186\/s13638-019-1524-z"},{"key":"10.1016\/j.procs.2025.03.079_bib21","unstructured":"R. Mercy and R. Padmavathi, \"Entropy-Based Trust Management for Real-Time Anomaly Detection in VANETs,\" Int. J. Adv. Comput. Sci. Appl., vol. 10, no. 4, pp. 54-60, 2019."},{"key":"10.1016\/j.procs.2025.03.079_bib22","first-page":"1","article-title":"\"AATMS: An Anti-Attack Trust Management Scheme in VANET\"","volume":"4","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2025.03.079_bib23","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.adhoc.2018.11.006","article-title":"\"Trust Management for Secure Cognitive Radio Vehicular Ad Hoc Networks\"","volume":"86","author":"He","year":"2019","journal-title":"Ad Hoc Networks"},{"key":"10.1016\/j.procs.2025.03.079_bib24","doi-asserted-by":"crossref","unstructured":"W. Fang, W. Zhang, Y. Liu, W. Yang, and Z. Gao, \"BTDS: Bayesian-based trust decision scheme for intelligent connected vehicles in VANETs,\" Trans. Emerg. Telecommun. Technol., vol. 31, e3879, 2020.","DOI":"10.1002\/ett.3879"},{"key":"10.1016\/j.procs.2025.03.079_bib25","doi-asserted-by":"crossref","first-page":"3267","DOI":"10.1109\/TVT.2020.2964685","article-title":"\"Trust-Based Secure Content Delivery in Vehicular Networks: A Bargaining Game Theoretical Approach\"","volume":"69","author":"Li","year":"2020","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"10.1016\/j.procs.2025.03.079_bib26","doi-asserted-by":"crossref","unstructured":"T. Halabi and M. Zulkernine, \"Trust-Based Cooperative Game Model for Secure Collaboration in the Internet of Vehicles,\" in Proc. Int. Conf. Commun. (ICC), 2019.","DOI":"10.1109\/ICC.2019.8762069"},{"key":"10.1016\/j.procs.2025.03.079_bib27","unstructured":"Z. Yang, et al., \"A Blockchain-based Reputation System for Data Credibility Assessment in Vehicular Networks,\" IEEE Access, vol. xx, 2023."},{"key":"10.1016\/j.procs.2025.03.079_bib28","doi-asserted-by":"crossref","unstructured":"C. Pu, \"A Novel Blockchain-Based Trust Management Scheme for Vehicular Networks,\" 2021.","DOI":"10.1109\/WTS51064.2021.9433711"},{"key":"10.1016\/j.procs.2025.03.079_bib29","doi-asserted-by":"crossref","unstructured":"S. Kudva, S. Badsha, S. Sengupta, H. La, I. Khalil, and M. Atiquzzaman, \"A scalable blockchain-based trust management in VANET routing protocol,\" Journal of Parallel and Distributed Computing, vol. 152, pp. 144-156, 2021.","DOI":"10.1016\/j.jpdc.2021.02.024"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925008154?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050925008154?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T13:42:30Z","timestamp":1763646150000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050925008154"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":29,"alternative-id":["S1877050925008154"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2025.03.079","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"VANETGuard: A Secure Hybrid Trust Management System for VANETs","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2025.03.079","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2025 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}