{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:47:19Z","timestamp":1776181639183,"version":"3.50.1"},"reference-count":149,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Intell. Transport. Syst."],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1109\/tits.2020.2973715","type":"journal-article","created":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T19:35:01Z","timestamp":1583436901000},"page":"2553-2571","source":"Crossref","is-referenced-by-count":192,"title":["Trust in VANET: A Survey of Current Solutions and Future Research Opportunities"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3771-7537","authenticated-orcid":false,"given":"Rasheed","family":"Hussain","sequence":"first","affiliation":[]},{"given":"Jooyoung","family":"Lee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5982-8190","authenticated-orcid":false,"given":"Sherali","family":"Zeadally","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2017.7986315"},{"key":"ref38","first-page":"1","author":"lee","year":"2015","journal-title":"A Node-Centric Reputation Computation Algorithm on Online Social Networks"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2491285"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2495325"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2587259"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"key":"ref37","first-page":"214","author":"hussain","year":"2016","journal-title":"A Hybrid Trust Management Framework for Vehicular Social Networks"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2017.8108459"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-014-4212-5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2437285"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MACS.2018.8628440"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2496147"},{"key":"ref29","first-page":"47","author":"eschenauer","year":"2004","journal-title":"On Trust Establishment in Mobile Ad-Hoc Networks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1049\/iet-wss.2018.5211"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2059690"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2019.10022743"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.4018\/jdst.2012010104"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2011.86"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.08.001"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1116"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2018.8581849"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2013.6726668"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2016.022"},{"key":"ref51","article-title":"Survey on vehicular ad hoc networks and its access technologies security vulnerabilities and countermeasures","author":"kelarestaghi","year":"2019","journal-title":"arXiv 1903 01541"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.07.011"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2764925"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2685390"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.06.006"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-015-0257-x"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1618"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7564966"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2425357"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35416-8_21"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2864189"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1659-5"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.01.002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ICECT.2004.1319751"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3390\/s18041212"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3084-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700467"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2649538"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2009.0191"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2014.61"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2439292"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2473820"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36252-1_59"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.05.006"},{"key":"ref48","first-page":"289","author":"j\u00f8sang","year":"2016","journal-title":"Bayesian Reputation Systems"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2005.1577971"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/RIVF.2007.369149"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3390\/s19061467"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","article-title":"Information theoretic framework of trust modeling and evaluation for ad hoc networks","volume":"24","author":"lindsay sun","year":"2006","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2014.34"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7180506"},{"key":"ref126","first-page":"203","author":"mahmood","year":"2019","journal-title":"Trust ManagementTrust Management for Software-Defined Heterogeneous Vehicular Ad Hoc NetworksVehicular Ad hoc Networks"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3272036.3272037"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2018.8581756"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2764955"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0146"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057106"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.4028\/www.scientific.net\/AMM.687-691.3007"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2019.2891417"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.10.012"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504149"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1177\/1550147719825820"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/BDCloud-SocialCom-SustainCom.2016.53"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2015.52"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICSENS.2018.8589697"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/5672154"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2749508"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894816"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554563"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.3390\/s18082683"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICARCV.2018.8581173"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996451"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2392629"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2019.100071"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2017.12.005"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6576841"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2919681"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/7628231"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2565001"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.10.011"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2016.11.010"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2875906"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2017.12.001"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.03.008"},{"key":"ref66","first-page":"150","article-title":"CAT: Consensus-assisted trust estimation of MDS-equipped collaborators in vehicular ad-hoc network","volume":"2","author":"krishna","year":"2015","journal-title":"Veh Commun"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.09.015"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2016.114"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2951620"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.004"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249449"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2739830"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2815595"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1016\/j.socec.2015.06.001"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2014.09.001"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/9083608"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ComComAp.2013.6533601"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2012.2211870"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.08.018"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2018.5336"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5621979"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2894056"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2010.5421586"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2884899"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-016-0328-y"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.06.008"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2388581"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2018.8647426"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2018.08.010"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.006"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2018.2813422"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7842180"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00025"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2836144"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2360883"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292724"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2818888"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2710124"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.05.013"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.04.024"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2018.04.006"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2015.7354563"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2903202"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/VNC.2012.6407448"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2671404"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2016.7794617"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-015-0353-y"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249374"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249488"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2645452"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2733225"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3317549.3323402"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2895136"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/3229616.3229621"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2880332"},{"key":"ref115","first-page":"1","article-title":"Security trust zone in 5G networks","author":"han","year":"2017","journal-title":"Proc 24th Int Conf Telecommun (ICT)"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.08.001"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2015.2494017"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.3390\/s19020396"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2989275.2989285"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2018.8343132"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2334655"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.3390\/s16020245"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-016-0027-x"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/wivec.2013.6698224"}],"container-title":["IEEE Transactions on Intelligent Transportation Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6979\/9420410\/09025055.pdf?arnumber=9025055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:36:01Z","timestamp":1641987361000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9025055\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":149,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tits.2020.2973715","relation":{},"ISSN":["1524-9050","1558-0016"],"issn-type":[{"value":"1524-9050","type":"print"},{"value":"1558-0016","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5]]}}}