{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:41:46Z","timestamp":1774021306951,"version":"3.50.1"},"reference-count":20,"publisher":"SAGE Publications","issue":"2","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"funder":[{"name":"Key Research Project of Higher Education of Henan Province","award":["18A520052"],"award-info":[{"award-number":["18A520052"]}]},{"name":"Innovation Talent Support Program Project of University Science and Technology of Henan","award":["19HASTIT027"],"award-info":[{"award-number":["19HASTIT027"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772173"],"award-info":[{"award-number":["61772173"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Distributed Sensor Networks"],"published-print":{"date-parts":[[2020,2]]},"abstract":"<jats:p> In vehicular ad hoc networks, inside attackers can launch a false information attack by injecting false emergency messages to report bogus events such as traffic accidents. In this article, a false message detection scheme is proposed and evaluated. First, traffic flow theory is employed to analyze vehicular behavior under a traffic accident scenario. It shows that a \u201cbottleneck\u201d phenomenon is triggered because the road capacity is reduced by blocked lanes at an accident site. The traffic parameters, such as vehicular density, exhibit a distinct statistical property compared to an accident-free scenario. Based on this, a false message detection algorithm is proposed in which the traveling vehicles are exploited as witnesses to collect traffic parameters, and their observation data are used as evidence to feed a traffic flow model. A Bayesian theorem\u2013based method is used to calculate the likelihood for each traffic scenarios, and the actual traffic condition is estimated to determine whether the reported accident has actually occurred. Finally, the performance of the proposed scheme was verified through simulations in a realistic traffic scenario. It was shown that a higher detection accuracy could be obtained compared to previously proposed approach. <\/jats:p>","DOI":"10.1177\/1550147720906390","type":"journal-article","created":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T02:25:16Z","timestamp":1581906316000},"page":"155014772090639","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":17,"title":["Detecting false messages in vehicular ad hoc networks based on a traffic flow model"],"prefix":"10.1177","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6264-2939","authenticated-orcid":false,"given":"Jizhao","family":"Liu","sequence":"first","affiliation":[{"name":"School of Computer Science, Zhongyuan University of Technology, Zhengzhou, P.R. China"}]},{"given":"Weidong","family":"Yang","sequence":"additional","affiliation":[{"name":"Henan University of Technology, Zhengzhou, P.R. China"}]},{"given":"Junbao","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Zhongyuan University of Technology, Zhengzhou, P.R. China"}]},{"given":"Changlin","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science, Zhongyuan University of Technology, Zhengzhou, P.R. China"}]}],"member":"179","published-online":{"date-parts":[[2020,2,16]]},"reference":[{"key":"bibr1-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1007\/s11235-010-9400-5"},{"issue":"4","key":"bibr2-1550147720906390","first-page":"99","volume":"2","author":"Khekare GS","year":"2012","journal-title":"Int J Adv Comp Res"},{"key":"bibr3-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-018-1064-y"},{"key":"bibr4-1550147720906390","first-page":"1","author":"IEEE","year":"2016","journal-title":"IEEE std 1609.2-2016 - redline"},{"key":"bibr5-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2873088"},{"key":"bibr6-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2209903"},{"key":"bibr7-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1155\/2015\/971710"},{"key":"bibr8-1550147720906390","volume-title":"IEEE","author":"Ruj S"},{"key":"bibr9-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2366120"},{"key":"bibr10-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2010.02.008"},{"key":"bibr12-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2480244"},{"key":"bibr13-1550147720906390","first-page":"29","volume-title":"2012 IEEE international conference on connected vehicles and expo (ICCVE 2012)","author":"Rajesh B"},{"key":"bibr14-1550147720906390","doi-asserted-by":"publisher","DOI":"10.3141\/2099-08"},{"key":"bibr15-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071006"},{"key":"bibr16-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110310"},{"key":"bibr17-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2405853"},{"key":"bibr18-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2016.10.011"},{"key":"bibr20-1550147720906390","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2158566"},{"key":"bibr21-1550147720906390","volume-title":"International IEEE conference on intelligent transportation systems","author":"Song H"},{"key":"bibr22-1550147720906390","first-page":"71","volume":"3","author":"Feng W","year":"1998","journal-title":"J Syst Eng"}],"container-title":["International Journal of Distributed Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720906390","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/full-xml\/10.1177\/1550147720906390","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/1550147720906390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T02:25:24Z","timestamp":1581906324000},"score":1,"resource":{"primary":{"URL":"http:\/\/journals.sagepub.com\/doi\/10.1177\/1550147720906390"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["10.1177\/1550147720906390"],"URL":"https:\/\/doi.org\/10.1177\/1550147720906390","relation":{},"ISSN":["1550-1477","1550-1477"],"issn-type":[{"value":"1550-1477","type":"print"},{"value":"1550-1477","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,2]]}}}