{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,1]],"date-time":"2026-03-01T05:29:52Z","timestamp":1772342992415,"version":"3.50.1"},"reference-count":29,"publisher":"MDPI AG","issue":"8","license":[{"start":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T00:00:00Z","timestamp":1658793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Vehicular ad hoc networks have played a key role in intelligent transportation systems that considerably improve road safety and management. This new technology allows vehicles to communicate and share road information. However, malicious users may inject false emergency alerts into vehicular ad hoc networks, preventing nodes from accessing accurate road information. In order to assure the reliability and trustworthiness of information through the networks, assessing the credibility of nodes has become a critical task in vehicular ad hoc networks. A new scheme for malicious node detection is proposed in this work. Multiple factors are fed into a fuzzy logic model for evaluating the trust for each node. Vehicles are divided into clusters in our approach, and a road side unit manages each cluster. The road side unit assesses the credibility of nodes before accessing vehicular ad hoc networks. The road side unit evicts a malicious node based on trust value. Simulations are used to validate our technique. We demonstrate that our scheme can detect and evict all malicious nodes in the vehicular ad hoc network over time, lowering the ratio of malicious nodes. Furthermore, it has a positive impact on selfish node participation. The scheme increases the success rate of delivered data to the same level as the ideal cases when no selfish node is present.<\/jats:p>","DOI":"10.3390\/fi14080223","type":"journal-article","created":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T22:03:42Z","timestamp":1658873022000},"page":"223","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A New Scheme for Detecting Malicious Nodes in Vehicular Ad Hoc Networks Based on Monitoring Node Behavior"],"prefix":"10.3390","volume":"14","author":[{"given":"Muhsen","family":"Alkhalidy","sequence":"first","affiliation":[{"name":"Department of Computer Science and Applications, Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Zarqa 13133, Jordan"}]},{"given":"Atalla Fahed","family":"Al-Serhan","sequence":"additional","affiliation":[{"name":"Department of Business Administration, Al-Bayt University, Al-Mafraq 25113, Jordan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9075-2828","authenticated-orcid":false,"given":"Ayoub","family":"Alsarhan","sequence":"additional","affiliation":[{"name":"Department of Information Technology, Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Zarqa 13133, Jordan"}]},{"given":"Bashar","family":"Igried","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Applications, Faculty of Prince Al-Hussein Bin Abdallah II for Information Technology, The Hashemite University, Zarqa 13133, Jordan"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/s11235-010-9400-5","article-title":"Vehicular ad hoc networks (VANETS): Status, results, and challenges","volume":"50","author":"Zeadally","year":"2012","journal-title":"Telecommun. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1779","DOI":"10.1109\/TIFS.2018.2885277","article-title":"Privacy-Preserving Cloud-Based Road Condition Monitoring with Source Authentication in VANETs","volume":"14","author":"Wang","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Mishra, R., Singh, A., and Kumar, R. (2016, January 3\u20135). VANET security: Issues, challenges and solutions. Proceedings of the International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), Chennai, India.","DOI":"10.1109\/ICEEOT.2016.7754846"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Shankar, R., and Singh, A.V. (2015, January 2\u20134). Use of VANETs for human Safety in road transportation. Proceedings of the International Conference on Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), Noida, India.","DOI":"10.1109\/ICRITO.2015.7359228"},{"key":"ref_5","first-page":"8","article-title":"Attacks on vanet security","volume":"9","author":"Upadhyaya","year":"2018","journal-title":"Int. J. Comput. Eng. Technol."},{"key":"ref_6","first-page":"460","article-title":"A Surveying on Road Safety Using Vehicular Communication Networks","volume":"5","author":"Padmavathi","year":"2012","journal-title":"J. Comput. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Khan, A.S., Balan, K., Javed, Y., Tarmizi, S., and Abdullah, J. (2019). Secure Trust-Based Blockchain Architecture to Prevent Attacks in VANET. Sensors, 19.","DOI":"10.3390\/s19224954"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1786","DOI":"10.1109\/TVT.2016.2565001","article-title":"REPLACE: A Reliable Trust-Based Platoon Service Recommendation Scheme in VANET","volume":"66","author":"Hu","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"21077","DOI":"10.1109\/ACCESS.2020.2966747","article-title":"AATMS: An Anti-Attack Trust Management Scheme in VANET","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_10","first-page":"7611619","article-title":"Hierarchical Hybrid Trust Management Scheme in SDN-Enabled VANETs","volume":"2021","author":"Ming","year":"2021","journal-title":"Mob. Inf. Syst."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"3157","DOI":"10.1109\/JIOT.2020.3044296","article-title":"AIT: An AI-Enabled Trust Management System for Vehicular Networks Using Blockchain Technology","volume":"8","author":"Zhang","year":"2021","journal-title":"Internet Things J. IEEE"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Madl, T. (2021, January 1\u201317). Security Concept with Distributed Trust-Levels for Autonomous Cooperative Vehicle Networks. Proceedings of the IEEE Intelligent Vehicles Symposium (IV), Nagoya, Japan.","DOI":"10.1109\/IV48863.2021.9576024"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11276-016-1336-6","article-title":"Trust based authentication technique for cluster based vehicular ad hoc networks (VANET)","volume":"24","author":"Sugumar","year":"2018","journal-title":"Wirel. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1186\/s13673-020-00248-4","article-title":"TSME: A trust-based security scheme for message exchange in vehicular Ad hoc networks","volume":"10","author":"Abassi","year":"2020","journal-title":"Hum.-Cent. Comput. Inf. Sci."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Awan, K.A., Din, I.U., Almogren, A., Kim, B.-S., and Altameem, A. (2021). vTrust: An IoT-Enabled Trust-Based Secure Wireless Energy Sharing Mechanism for Vehicular Ad Hoc Networks. Sensors, 21.","DOI":"10.3390\/s21217363"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Vintimilla-Tapia, P., Bravo-Torres, J., L\u00f3pez-Nores, M., Gallegos-Segovia, P., Ord\u00f3\u00f1ez-Morales, E., and Ramos-Cabrer, M. (2020). VaNetChain: A Framework for Trustworthy Exchanges of Information in VANETs Based on Blockchain and a Virtualization Layer. Appl. Sci., 10.","DOI":"10.3390\/app10217930"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.adhoc.2016.10.011","article-title":"Using trust model to ensure reliable data acquisition in VANETs","volume":"55","author":"Yao","year":"2017","journal-title":"Ad Hoc Netw."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Haddaji, A., Ayed, S., and Chaari, L. (2022, January 13\u201315). Federated Learning with Blockchain Approach for Trust Management in IoV. Proceedings of the International Conference on Advanced Information Networking and Applications, Sydney, Australia.","DOI":"10.1007\/978-3-030-99584-3_36"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Patel, A., Shah, N., Limbasiya, T., and Das, D. (2019, January 28). VehicleChain: Blockchain-based Vehicular Data Transmission Scheme for Smart City. Proceedings of the IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy.","DOI":"10.1109\/SMC.2019.8914391"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2740","DOI":"10.1109\/TITS.2017.2657649","article-title":"Efficient privacy-preserving dual authentication and key agreement scheme for secure V2V communications in an IoV paradigm","volume":"18","author":"Liu","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Alsarhan, A., and Agarwal, A. (2009, January 3\u20136). Cluster-Based Spectrum Management Using Cognitive Radios in Wireless Mesh Network. Proceedings of the 18th International Conference on Computer Communications and Networks, San Francisco, CA, USA.","DOI":"10.1109\/ICCCN.2009.5235261"},{"key":"ref_22","unstructured":"Weisstein, E.W. (2022, July 17). \u201cBernoulli Distribution.\u201d From MathWorld\u2014A Wolfram Web Resource. Available online: https:\/\/mathworld.wolfram.com\/BernoulliDistribution.html."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Fischer, H. (2011). A History of the Central Limit Theorem: From Classical to Modern Probability Theory, Springer. Sources and Studies in the History of Mathematics and Physical Sciences.","DOI":"10.1007\/978-0-387-87857-7"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"409","DOI":"10.1016\/j.ins.2004.07.001","article-title":"Hierarchical MADM with fuzzy integral for evaluating enterprise intranet web sites","volume":"169","author":"Tzeng","year":"2005","journal-title":"Inf. Sci."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"136","DOI":"10.3991\/ijim.v16i03.27933","article-title":"A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique","volume":"16","author":"Alsarhan","year":"2022","journal-title":"Int. J. Interact. Mob. Technol."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3129","DOI":"10.1007\/s11277-020-07797-y","article-title":"Machine learning-driven optimization for intrusion detection in smart vehicular networks","volume":"117","author":"Alsarhan","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Alsarhan, A., Alauthman, M., Alshdaifat, E., Al-Ghuwairi, A.-R., and Al-Dubai, A. (2021). Machine Learning-driven optimization for SVM-based intrusion detection system in vehicular ad hoc networks. J. Ambient. Intell. Humaniz. Comput., 1\u201310.","DOI":"10.1007\/s12652-021-02963-x"},{"key":"ref_28","unstructured":"Han, J., Kamber, M., and Pei, J. (2011). Data Mining: Concepts and Techniques, Morgan Kaufmann Publishers."},{"key":"ref_29","unstructured":"Sugeno, M. (1974). Theory of Fuzzy Integrals and Its Applications. [Ph.D. Dissertation, Tokyo Institute of Technology]."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/8\/223\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:56:47Z","timestamp":1760140607000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/8\/223"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,26]]},"references-count":29,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["fi14080223"],"URL":"https:\/\/doi.org\/10.3390\/fi14080223","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,26]]}}}