{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:21:15Z","timestamp":1759335675696,"version":"3.38.0"},"reference-count":45,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.055184","type":"journal-article","created":{"date-parts":[[2024,10,16]],"date-time":"2024-10-16T06:41:46Z","timestamp":1729060906000},"page":"2517-2545","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Trust Score-Based Malicious Vehicle Detection Scheme in Vehicular Network Environments"],"prefix":"10.32604","volume":"81","author":[{"given":"Wenming","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhiquan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Shumin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Guijiang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/MCOM.2017.1601144","article-title":"5G software defined vehicular networks","volume":"55","author":"Ge","year":"Jul. 2017","journal-title":"IEEE Commun. Mag."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"24698","DOI":"10.1109\/TITS.2022.3207593","article-title":"Secure authentication and key management protocol for deployment of internet of vehicles (IoV) concerning intelligent transport systems","volume":"23","author":"Bojjagani","year":"Sep. 2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref3","doi-asserted-by":"crossref","first-page":"5403","DOI":"10.1109\/TVT.2020.2977829","article-title":"FBIA: A fog-based identity authentication scheme for privacy preservation in internet of vehicles","volume":"69","author":"Song","year":"Mar. 2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref4","doi-asserted-by":"crossref","first-page":"8864","DOI":"10.1109\/TII.2021.3128954","article-title":"An intelligent trust cloud management method for secure clustering in 5G enabled internet of medical things","volume":"18","author":"Yang","year":"Nov. 2021","journal-title":"IEEE Trans. Ind. Inf."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"1654","DOI":"10.1109\/TIFS.2019.2946933","article-title":"Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment","volume":"15","author":"Cui","year":"Oct. 2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"4922","DOI":"10.1109\/JIOT.2020.2973661","article-title":"Malicious user detection for cooperative mobility tracking in autonomous driving","volume":"7","author":"Pi","year":"Feb. 2020","journal-title":"IEEE Internet Things J."},{"key":"ref7","doi-asserted-by":"crossref","first-page":"6027","DOI":"10.1109\/TMC.2022.3182005","article-title":"Modeling and characterization of the detection and suppression of bogus messages in vehicular ad hoc networks","volume":"22","author":"Ding","year":"Jun. 2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/JIOT.2022.3200854","article-title":"Federated hierarchical trust-based interaction scheme for cross-domain industrial IoT","volume":"10","author":"Li","year":"Aug. 2022","journal-title":"IEEE Internet Things J."},{"key":"ref9","series-title":"Proc. 8th Int. Symp. Auton. Decentralized Syst.","first-page":"295","article-title":"Trust for vehicular applications","author":"Gerlach","year":"Jun. 2007"},{"key":"ref10","first-page":"3","article-title":"Towards expanded trust management for agents in vehicular ad-hoc networks","volume":"5","author":"Minhas","year":"Jun. 2010","journal-title":"Int. J. Comput. Intell. Theory Pract."},{"key":"ref11","series-title":"Proc. IEEE INFOCOM 27th Conf. Comput. Commun.","first-page":"1238","article-title":"On data-centric trust establishment in ephemeral ad hoc networks","author":"Raya","year":"Apr. 2008"},{"key":"ref12","series-title":"Proc. 6th IEEE Int. Symp. World Wireless Mobile Multimedia Netw.","first-page":"454","article-title":"VARS: A vehicle ad-hoc network reputation system","author":"D\u00f6tzer","year":"Jun. 2005"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1016\/j.aej.2015.07.011","article-title":"Survey on security issues in vehicular ad hoc networks","volume":"54","author":"Mokhtar","year":"Dec. 2015","journal-title":"Alexandria Eng. J."},{"key":"ref14","doi-asserted-by":"crossref","first-page":"3901","DOI":"10.1109\/JIOT.2019.2951620","article-title":"Vcash: A novel reputation framework for identifying denial of traffic service in internet of connected vehicles","volume":"7","author":"Tian","year":"May 2019","journal-title":"IEEE Internet Things J."},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2020.102956","article-title":"RC-chain: Reputation-based crowdsourcing blockchain for vehicular networks","volume":"176","author":"Sun","year":"Feb. 2021, Art. no. 102956","journal-title":"J. Network Comput. Appl."},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108558","article-title":"A survey of trust management in the Internet of Vehicles","volume":"203","author":"Hbaieb","year":"Feb. 2022, Art. no. 108558","journal-title":"Comput. Networks"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1109\/JAS.2020.1003039","article-title":"Securing parked vehicle assisted fog computing with blockchain and optimal smart contract design","volume":"7","author":"Huang","year":"Mar. 2020","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"8857","DOI":"10.1109\/TITS.2021.3086976","article-title":"Secure and efficient data sharing among vehicles based on consortium blockchain","volume":"23","author":"Cui","year":"Jun. 2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"4660","DOI":"10.1109\/JIOT.2018.2875542","article-title":"Blockchain for secure and efficient data sharing in vehicular edge computing and networks","volume":"6","author":"Kang","year":"Oct. 2018","journal-title":"IEEE Internet Things J."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"148913","DOI":"10.1109\/ACCESS.2018.2876153","article-title":"TMEC: A trust management based on evidence combination on attack-resistant and collaborative internet of vehicles","volume":"7","author":"Chen","year":"Nov. 2018","journal-title":"IEEE Access"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"11815","DOI":"10.1109\/JIOT.2020.3002711","article-title":"A scalable protocol for driving trust management in internet of vehicles with blockchain","volume":"7","author":"Javaid","year":"Jun. 2020","journal-title":"IEEE Internet Things J."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"1397","DOI":"10.1109\/TETC.2020.3033532","article-title":"Blockchain-based trust management for internet of vehicles","volume":"9","author":"Zhang","year":"Nov. 2020","journal-title":"IEEE Trans. Emerging Top. Comput."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1109\/JIOT.2018.2836144","article-title":"Blockchain-based decentralized trust management in vehicular networks","volume":"6","author":"Yang","year":"May 2018","journal-title":"IEEE Internet Things J."},{"key":"ref24","doi-asserted-by":"crossref","first-page":"20084","DOI":"10.1109\/TITS.2022.3187788","article-title":"A novel multifaceted trust management framework for vehicular networks","volume":"23","author":"El-Sayed","year":"Nov. 2022","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.future.2022.08.008","article-title":"Blockchain search engine: Its current research status and future prospect in Internet of Things network","volume":"138","author":"Tang","year":"Jan. 2023","journal-title":"Future Gen. Comput. Syst."},{"key":"ref26","doi-asserted-by":"crossref","first-page":"22643","DOI":"10.1109\/JIOT.2022.3181610","article-title":"TACAS-IoT: Trust aggregation certificate-based authentication scheme for edge-enabled IoT systems","volume":"9","author":"Wazid","year":"Jun. 2022","journal-title":"IEEE Internet Things J."},{"key":"ref27","doi-asserted-by":"crossref","first-page":"4443","DOI":"10.1109\/TITS.2020.3003211","article-title":"Trustworthy edge storage orchestration in intelligent transportation systems using reinforcement learning","volume":"22","author":"Qiao","year":"Jun. 2020","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MNET.2015.7018198","article-title":"Vehicle as a resource (VaaR)","volume":"29","author":"Abdelhamid","year":"Jan. 2015","journal-title":"IEEE Netw."},{"key":"ref29","doi-asserted-by":"crossref","first-page":"1401","DOI":"10.1109\/TITS.2017.2727226","article-title":"A unified framework of clustering approach in vehicular ad hoc networks","volume":"19","author":"Ren","year":"Aug. 2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref30","series-title":"Proc. IEEE Wireless Commun. Netw. Conf. (WCNC)","first-page":"1","article-title":"Content aided clustering and cluster head selection algorithms in vehicular networks","author":"Zhang","year":"Mar. 2017"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1517","DOI":"10.1109\/TITS.2018.2853165","article-title":"New multi-hop clustering algorithm for vehicular ad hoc networks","volume":"20","author":"Zhang","year":"Aug. 2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref32","doi-asserted-by":"crossref","first-page":"9356","DOI":"10.1109\/TVT.2020.2976926","article-title":"Low-delay path selection for cluster-based buffer-aided vehicular communications","volume":"69","author":"Alam","year":"Mar. 2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"3567","DOI":"10.1109\/TITS.2020.2995856","article-title":"Vehicle trajectory clustering based on dynamic representation learning of internet of vehicles","volume":"22","author":"Wang","year":"Jun. 2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"3774","DOI":"10.1109\/TIFS.2023.3287731","article-title":"Secure edge computing-assisted video reporting service in 5G-enabled vehicular networks","volume":"18","author":"Zhong","year":"Jun. 2023","journal-title":"IEEE Trans. Inform. Forensic Secur."},{"key":"ref35","series-title":"Found. Comput. Sci.","first-page":"193","article-title":"Efficient and secure pseudo-random number generation","author":"Vazirani","year":"Oct. 1984"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"6684","DOI":"10.1109\/TVT.2021.3081448","article-title":"Data forwarding scheme for vehicle tracking in named data networking","volume":"70","author":"Hou","year":"May 2021","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref37","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1109\/TITS.2011.2177456","article-title":"An efficient traffic information forwarding solution for vehicle safety communications on highways","volume":"13","author":"Chu","year":"Dec. 2011","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref38","unstructured":"Spring, \u201cSpring cloud,\u201d 2003. Accessed: Feb. 12, 2022. [Online]. Available: https:\/\/spring.io\/projects\/spring-cloud"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"3665","DOI":"10.1109\/TSC.2023.3267489","article-title":"SaaSC: Toward pay-as-you-go mode for software service transactions based on blockchain\u2019s smart legal contracts","volume":"16","author":"Chen","year":"Apr. 2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"ref40","series-title":"IEEE Int. Conf. Adv. Inf. Netw. Appl. Workshops","first-page":"551","article-title":"A comparative study into distributed load balancing algorithms for cloud computing","author":"Randles","year":"Apr. 2010"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1594835.1504188","article-title":"Efficient and scalable multiprocessor fair scheduling using distributed weighted round-robin","volume":"44","author":"Li","year":"Feb. 2009","journal-title":"ACM Sigplan Not."},{"key":"ref42","first-page":"2383","article-title":"An optimized round robin scheduling algorithm for CPU scheduling","volume":"2","author":"Singh","year":"Feb. 2010","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref43","series-title":"IEEE Inf. Technol. and Mechatronics Eng. Conf.","first-page":"1858","article-title":"Improved dynamic load balancing algorithm based on Least-Connection Scheduling","author":"Zhu","year":"Dec. 2018"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"1810","DOI":"10.1109\/TIFS.2020.3044855","article-title":"SMAKA: Secure many-to-many authentication and key agreement scheme for vehicular networks","volume":"16","author":"Zhang","year":"Dec. 2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref45","doi-asserted-by":"crossref","first-page":"1454","DOI":"10.1109\/TNSE.2023.3323972","article-title":"A practical and provably secure authentication and key agreement scheme for UAV-assisted VANETs for emergency rescue","volume":"11","author":"Cui","year":"Oct. 2023","journal-title":"IEEE Trans. Network Sci. Eng."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_55184\/TSP_CMC_55184.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:07:32Z","timestamp":1741320452000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":45,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.055184","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-06-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-13","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}