{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:11:11Z","timestamp":1755925871044,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,21]],"date-time":"2014-09-21T00:00:00Z","timestamp":1411257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,21]]},"DOI":"10.1145\/2656346.2656353","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"103-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Trust based security enhancements for vehicular ad hocnetworks"],"prefix":"10.1145","author":[{"given":"Zhexiong","family":"Wei","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Fei Richard","family":"Yu","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Canada"}]},{"given":"Azzedine","family":"Boukerche","sequence":"additional","affiliation":[{"name":"University of Ottawa, Ottawa, Canada"}]}],"member":"320","published-online":{"date-parts":[[2014,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Proc. Signal Processing and Communication Systems (ICSPCS)","author":"M.","year":"2012","unstructured":"M. Al-kahtani. Survey on security attacks in vehicular ad hoc networks (VANETs) . In Proc. Signal Processing and Communication Systems (ICSPCS) , pages 1 -- 9 , 2012 . M. Al-kahtani. Survey on security attacks in vehicular ad hoc networks (VANETs). In Proc. Signal Processing and Communication Systems (ICSPCS), pages 1--9, 2012."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/TVT.2013.2278101"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/JPROC.2012.2208211"},{"key":"e_1_3_2_1_4_1","volume-title":"Introduction to Probability","author":"Bertsekas D. P.","year":"2008","unstructured":"D. P. Bertsekas and J. N. Tsitsiklis . Introduction to Probability , Second Edition. Athena Scientific , 2008 . D. P. Bertsekas and J. N. Tsitsiklis. Introduction to Probability, Second Edition. Athena Scientific, 2008."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/TVT.2014.2313604"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","first-page":"3014","DOI":"10.1109\/TWC.2012.052512.111766","article-title":"When the smart grid meets energy-efficient communications: Green wireless cellular networks powered by the smart grid","volume":"11","author":"Bu S.","year":"2012","unstructured":"S. Bu , F. R. Yu , Y. Cai , and P. Liu . When the smart grid meets energy-efficient communications: Green wireless cellular networks powered by the smart grid . IEEE Trans. Wireless Commun. , 11 : 3014 -- 3024 , Aug. 2012 . S. Bu, F. R. Yu, Y. Cai, and P. Liu. When the smart grid meets energy-efficient communications: Green wireless cellular networks powered by the smart grid. IEEE Trans. Wireless Commun., 11:3014--3024, Aug. 2012.","journal-title":"IEEE Trans. Wireless Commun."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/TVT.2010.2103098"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. IEEE Infocom'11 Workshop on Green Comm. Net.","author":"Bu S.","year":"2011","unstructured":"S. Bu , F. R. Yu , and P. X. Liu . Stochastic unit commitment in smart grid communications . In Proc. IEEE Infocom'11 Workshop on Green Comm. Net. , Shanghai, China , Apr. 2011 . S. Bu, F. R. Yu, and P. X. Liu. Stochastic unit commitment in smart grid communications. In Proc. IEEE Infocom'11 Workshop on Green Comm. Net., Shanghai, China, Apr. 2011."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/TWC.2011.071411.102123"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/MIC.2005.123"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/SURV.2011.092110.00088"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/TVT.2012.2196061"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/MWC.2012.6189416"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/MOBHOC.2007.4428742"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/ICPCA.2007.4365481"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1109\/ICFCC.2009.120"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1049\/iet-ifs.2010.0160"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/1102219.1102223"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/INFOCOM.2008.180"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1109\/WCSE.2009.787"},{"key":"e_1_3_2_1_21_1","volume-title":"Morgan Kaufmann","author":"Shafer G.","year":"1990","unstructured":"G. Shafer and J. Pearl . Readings in Uncertain Reasoning . Morgan Kaufmann , 1990 . G. Shafer and J. Pearl. Readings in Uncertain Reasoning. Morgan Kaufmann, 1990."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/MILCOM.2008.4753658"},{"key":"e_1_3_2_1_23_1","article-title":"A mean field game theoretic approach for security enhancements in mobile ad hoc networks","author":"Wang Y.","year":"2014","unstructured":"Y. Wang , F. R. Yu , H. Tang , and M. Huang . A mean field game theoretic approach for security enhancements in mobile ad hoc networks . IEEE Trans. Wireless Commun. , 2014 . to appear. Y. Wang, F. R. Yu, H. Tang, and M. Huang. A mean field game theoretic approach for security enhancements in mobile ad hoc networks. IEEE Trans. Wireless Commun., 2014. to appear.","journal-title":"IEEE Trans. Wireless Commun."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/TWC.2012.092112.111510"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/544741.544809"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.5555\/2051746"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1109\/MNET.2011.6033032"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/ICC.2008.281"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/1102219.1102222"}],"event":{"sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"acronym":"MSWiM'14","name":"MSWiM'14: 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Montreal QC Canada"},"container-title":["Proceedings of the fourth ACM international symposium on Development and analysis of intelligent vehicular networks and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656346.2656353","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2656346.2656353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:37Z","timestamp":1750231177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656346.2656353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,21]]},"references-count":29,"alternative-id":["10.1145\/2656346.2656353","10.1145\/2656346"],"URL":"https:\/\/doi.org\/10.1145\/2656346.2656353","relation":{},"subject":[],"published":{"date-parts":[[2014,9,21]]},"assertion":[{"value":"2014-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}