{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T08:52:52Z","timestamp":1767084772392,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,16]],"date-time":"2020-11-16T00:00:00Z","timestamp":1605484800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,16]]},"DOI":"10.1145\/3416011.3424757","type":"proceedings-article","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T18:49:51Z","timestamp":1606243791000},"page":"9-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Detection of Position Falsification Attacks in VANETs Applying Trust Model and Machine Learning"],"prefix":"10.1145","author":[{"given":"Jordan","family":"Montenegro","sequence":"first","affiliation":[{"name":"Yachay Tech University, Urcuqu\u00ed, Ecuador"}]},{"given":"Cristhian","family":"Iza","sequence":"additional","affiliation":[{"name":"Yachay Tech University, Urcuqu\u00ed, Ecuador"}]},{"given":"M\u00f3nica","family":"Aguilar Igartua","sequence":"additional","affiliation":[{"name":"Universitat Polit\u00e8cnica de Catalunya, Barcelona, Spain"}]}],"member":"320","published-online":{"date-parts":[[2020,11,16]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/CCECE.2017.7946711"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1016\/j.adhoc.2016.02.017"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1145\/3341145"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/j.adhoc.2018.08.010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/GLOCOM.2012.6503113"},{"key":"e_1_3_2_1_6_1","volume-title":"Manoj Singh Gaur, and Vijay Laxmi","author":"Grover Jyoti","year":"2013","unstructured":"Jyoti Grover , Manoj Singh Gaur, and Vijay Laxmi . 2013 . Trust establishment techniques in VANET. In Wireless Networks and Security. Springer , 273--301. https:\/\/doi.org\/10.1007\/978--3--642--36169--2_8 10.1007\/978--3--642--36169--2_8 Jyoti Grover, Manoj Singh Gaur, and Vijay Laxmi. 2013. Trust establishment techniques in VANET. In Wireless Networks and Security. Springer, 273--301. https:\/\/doi.org\/10.1007\/978--3--642--36169--2_8"},{"key":"e_1_3_2_1_7_1","volume-title":"The 4th International Conference on CSCEET .","author":"Hasrouny Hamssa","year":"2017","unstructured":"Hamssa Hasrouny , Abed Ellatif Samhat , Carole Bassil , and Anis Laouiti . 2017 . Trust model for group leader selection in VANET . In The 4th International Conference on CSCEET . Hamssa Hasrouny, Abed Ellatif Samhat, Carole Bassil, and Anis Laouiti. 2017. Trust model for group leader selection in VANET. In The 4th International Conference on CSCEET ."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1007\/s11276-018-1756-6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/VETECS.2008.458"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/345910.345953"},{"key":"e_1_3_2_1_11_1","volume-title":"Mobile Information Systems","volume":"2016","author":"Liu Zhiquan","year":"2016","unstructured":"Zhiquan Liu , Jianfeng Ma , Zhongyuan Jiang , Hui Zhu , and Yinbin Miao . 2016 . LSOT: a lightweight self-organized trust model in VANETs . Mobile Information Systems , Vol. 2016 (2016). https:\/\/doi.org\/10.1155\/2016\/7628231 10.1155\/2016 Zhiquan Liu, Jianfeng Ma, Zhongyuan Jiang, Hui Zhu, and Yinbin Miao. 2016. LSOT: a lightweight self-organized trust model in VANETs. Mobile Information Systems, Vol. 2016 (2016). https:\/\/doi.org\/10.1155\/2016\/7628231"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/ITSC.2018.8569938"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/ACCESS.2018.2864189"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1016\/j.jnca.2011.03.028"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1016\/j.comnet.2017.04.024"},{"key":"e_1_3_2_1_16_1","volume-title":"Retrieved","author":"Omnet","year":"2020","unstructured":"Omnet [n.d.].OMNeT++ , discrete event simulator . Retrieved July 20, 2020 fromhttps:\/\/www.omnetpp.org\/ Omnet [n.d.].OMNeT++, discrete event simulator. Retrieved July 20, 2020 fromhttps:\/\/www.omnetpp.org\/"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/ICETET.2009.198"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.5555\/1953048.2078195"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/CICN.2013.86"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.2307\/1403796"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1007\/978-981-13-7561-3_13"},{"key":"e_1_3_2_1_22_1","volume-title":"Integrating Plausibility Checks and Machine Learning for Misbehavior Detection in VANET. In 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). 564--571","author":"So S.","year":"2018","unstructured":"S. So , P. Sharma , and J. Petit . 2018 . Integrating Plausibility Checks and Machine Learning for Misbehavior Detection in VANET. In 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). 564--571 . https:\/\/doi.org\/10.1109\/ICMLA. 2018 .00091 10.1109\/ICMLA.2018.00091 S. So, P. Sharma, and J. Petit. 2018. Integrating Plausibility Checks and Machine Learning for Misbehavior Detection in VANET. In 2018 17th IEEE International Conference on Machine Learning and Applications (ICMLA). 564--571. https:\/\/doi.org\/10.1109\/ICMLA.2018.00091"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1109\/ACCESS.2017.2733225"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/TMC.2010.133"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1109\/CIT.2010.157"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1016\/j.adhoc.2016.10.011"}],"event":{"sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"acronym":"MSWiM '20","name":"MSWiM '20: 23rd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Alicante Spain"},"container-title":["Proceedings of the 17th ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, &amp; Ubiquitous Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3416011.3424757","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3416011.3424757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:44Z","timestamp":1750197764000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3416011.3424757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,16]]},"references-count":26,"alternative-id":["10.1145\/3416011.3424757","10.1145\/3416011"],"URL":"https:\/\/doi.org\/10.1145\/3416011.3424757","relation":{},"subject":[],"published":{"date-parts":[[2020,11,16]]},"assertion":[{"value":"2020-11-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}