{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:08:46Z","timestamp":1760058526594,"version":"build-2065373602"},"reference-count":54,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T00:00:00Z","timestamp":1744675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Vehicle-to-Vehicle (V2V) communications technology offers enhanced road safety, traffic efficiency, and connectivity. In V2V, vehicles cooperate by broadcasting safety messages to quickly detect and avoid dangerous situations on time or to avoid and reduce congestion. However, vehicles might misbehave, creating false information and sharing it with neighboring vehicles, such as, for example, failing to report an observed accident or falsely reporting one when none exists. If other vehicles detect such misbehavior, they can report it. However, false accusations also constitute misbehavior. In disconnected areas with limited infrastructure, the potential for misbehavior increases due to the scarcity of Roadside Units (RSUs) necessary for verifying the truthfulness of communications. In such a situation, identifying malicious behavior using a standard misbehaving management system is ineffective in areas with limited connectivity. This paper presents a novel mechanism, Distributed Reputation for Accurate Misbehavior Reporting (DRAMBR), offering a fully integrated reputation solution that utilizes reputation to enhance the accuracy of the reporting system by identifying misbehavior in rural networks. The system operates in two phases: offline, using the Local Misbehavior Detection Mechanism (LMDM), where vehicles detect misbehavior and store reports locally, and online, where these reports are sent to a central reputation server. DRAMBR aggregates the reports and integrates DBSCAN for clustering spatial and temporal misbehavior reports, Isolation Forest for anomaly detection, and Gaussian Mixture Models for probabilistic classification of reports. Additionally, Random Forest and XGBoost models are combined to improve decision accuracy. DRAMBR distinguishes between honest mistakes, intentional deception, and malicious reporting. Using an existing mechanism, the updated reputation is available even in an offline environment. Through simulations, we evaluate our proposed reputation system\u2019s performance, demonstrating its effectiveness in achieving a reporting accuracy of approximately 98%. The findings highlight the potential of reputation-based strategies to minimize misbehavior and improve the reliability and security of V2V communications, particularly in rural areas with limited infrastructure, ultimately contributing to safer and more reliable transportation systems.<\/jats:p>","DOI":"10.3390\/fi17040174","type":"journal-article","created":{"date-parts":[[2025,4,15]],"date-time":"2025-04-15T09:41:11Z","timestamp":1744710071000},"page":"174","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Reputation for Accurate Vehicle Misbehavior Reporting (DRAMBR)"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6319-4840","authenticated-orcid":false,"given":"Dimah","family":"Almani","sequence":"first","affiliation":[{"name":"Cyber Security Research Group, School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1263-4230","authenticated-orcid":false,"given":"Tim","family":"Muller","sequence":"additional","affiliation":[{"name":"Cyber Security Research Group, School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0984-7542","authenticated-orcid":false,"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[{"name":"Cyber Security Research Group, School of Computer Science, University of Nottingham, Nottingham NG8 1BB, UK"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,15]]},"reference":[{"key":"ref_1","unstructured":"DOT U. Department of Transportation (2020). Interim Final Rule [IFR], Enhancing Rail Transportation Safety and Security for Hazardous Materials, U.S. Department of Transportation."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Almani, D., Muller, T., Carpent, X., Yoshizawa, T., and Furnell, S. (2024). Enabling vehicle-to-vehicle trust in rural areas: An evaluation of a pre-signature scheme for infrastructure-limited environments. Future Internet, 16.","DOI":"10.3390\/fi16030077"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"3850","DOI":"10.1109\/TITS.2018.2797529","article-title":"A Security Credential Management System for V2X Communications","volume":"19","author":"Brecht","year":"2018","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"26223","DOI":"10.1109\/ACCESS.2020.2970460","article-title":"Certificate Revocation Schemes in Vehicular Networks: A Survey","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"130","DOI":"10.4304\/jcm.5.2.130-143","article-title":"A border node based routing protocol for partially connected vehicular ad hoc networks","volume":"5","author":"Zhang","year":"2010","journal-title":"J. Commun."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/s11036-013-0446-y","article-title":"RCare: Extending secure health care to rural area using VANETs","volume":"19","author":"Barua","year":"2014","journal-title":"Mob. Netw. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Tyagi, N., and Misra, A.K. (2016, January 4\u20135). Seamless VANET connectivity through heterogeneous wireless network on rural highways. Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, Udaipur, India.","DOI":"10.1145\/2905055.2905143"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"100355","DOI":"10.1016\/j.iot.2020.100355","article-title":"A secure and distributed architecture for vehicular cloud","volume":"13","author":"Mistareehi","year":"2021","journal-title":"Internet Things"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Zhang, L., Wang, L., Zhang, L., Zhang, X., and Sun, D. (2023). An RSU deployment scheme for vehicle-infrastructure cooperated autonomous driving. Sustainability, 15.","DOI":"10.3390\/su15043847"},{"key":"ref_10","unstructured":"INTEGRITY Security Services (2025, April 10). SCMS V2X and SCMS C-ITS Certificate Management. Available online: https:\/\/www.ghsiss.com\/vehicle-to-everything-communications\/."},{"key":"ref_11","unstructured":"IEEE Xplore (2025, April 10). V2X Credential Management System Comparison Based on IEEE and ETSI Standards. Available online: https:\/\/ieeexplore.ieee.org\/document\/10774595."},{"key":"ref_12","first-page":"193","article-title":"misbehaviour detection and efficient revocation within VANET","volume":"46","author":"Hasrouny","year":"2019","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"6631","DOI":"10.1109\/TVT.2020.2984878","article-title":"Simulation Framework for misbehaviour Detection in Vehicular Networks","volume":"69","author":"Kamel","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_14","first-page":"239","article-title":"CRLMDA: CRL minimisation and distribution algorithm in cluster-based VANETs","volume":"29","author":"Singh","year":"2023","journal-title":"Int. J. Commun. Netw. Distrib. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Ning, P., Cui, Y., and Reeves, D.S. (2002, January 18\u201322). Constructing attack scenarios through correlation of intrusion alerts. Proceedings of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA.","DOI":"10.1145\/586143.586144"},{"key":"ref_16","unstructured":"(2021). Intelligent Transport Systems (ITS) (Standard No. TS 103 759-V2.1.1)."},{"key":"ref_17","unstructured":"(2022). IEEE Standard for Wireless Access in Vehicular Environments\u2014Security Services for Applications and Management Messages (Standard No. IEEE Std 1609.2TM-2022)."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"4095","DOI":"10.1109\/TVT.2012.2209903","article-title":"A reputation-based announcement scheme for VANETs","volume":"61","author":"Li","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"1654","DOI":"10.1109\/TIFS.2019.2946933","article-title":"Extensible conditional privacy protection authentication scheme for secure vehicular networks in a multi-cloud environment","volume":"15","author":"Cui","year":"2019","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","first-page":"100279","article-title":"Accountable credential management system for vehicular communication","volume":"25","author":"Khan","year":"2020","journal-title":"Veh. Commun."},{"key":"ref_21","first-page":"100227","article-title":"Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks","volume":"24","author":"Zeadally","year":"2020","journal-title":"Veh. Commun."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1016\/j.ins.2020.07.060","article-title":"Towards secure and practical consensus for blockchain-based VANET","volume":"545","author":"Kudva","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Cao, Z., Li, Q., Lim, H.W., and Zhang, J. (2014, January 8\u201310). A multi-hop reputation announcement scheme for VANETs. Proceedings of the 2014 IEEE International Conference on Service Operations and Logistics, and Informatics, Qingdao, China.","DOI":"10.1109\/SOLI.2014.6960728"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Katiyar, A., Gupta, S.K., Singh, D., and Yadav, R.S. (2020, January 1\u20133). A dynamic single-hop clustering algorithm (DSCA) in VANET. Proceedings of the 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kharagpur, India.","DOI":"10.1109\/ICCCNT49239.2020.9225285"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"250","DOI":"10.1016\/j.adhoc.2014.08.018","article-title":"Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme","volume":"24","author":"Jesudoss","year":"2015","journal-title":"Ad Hoc Netw."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Ahmed, W., Di, W., and Mukathe, D. (2022). A blockchain-enabled incentive trust management with threshold ring signature scheme for traffic event validation in VANETs. Sensors, 22.","DOI":"10.3390\/s22176715"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/TCC.2024.3406509","article-title":"A group-vehicles oriented reputation assessment scheme for edge VANETs","volume":"12","author":"Ke","year":"2024","journal-title":"IEEE Trans. Cloud Comput."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"6138251","DOI":"10.1155\/2016\/6138251","article-title":"RPRep: A robust and privacy-preserving reputation management scheme for pseudonym-enabled VANETs","volume":"12","author":"Wang","year":"2016","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Vaiana, R., Perri, G., Iuele, T., and Gallelli, V. (2021). A comprehensive approach combining regulatory procedures and accident data analysis for road safety management based on the European Directive 2019\/1936\/EC. Safety, 7.","DOI":"10.3390\/safety7010006"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Kabbur, M., and Murthy, M.V. (2023, January 15\u201316). MVR delay: Cooperative light weight detection and prevention of false emergency message dissemination in VANET. Proceedings of the International Conference on Cognitive Computing and Information Processing, Mysuru, India.","DOI":"10.1007\/978-3-031-60725-7_3"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"14361","DOI":"10.1109\/TMC.2024.3442933","article-title":"RIC-SDA: A reputation incentive committee-based secure conditional dual authentication scheme for VANETs","volume":"23","author":"Yang","year":"2024","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Huynh, T.D., Jennings, N.R., and Shadbolt, N.R. (2006, January 8\u201312). Certified reputation\u2014How an agent can trust a stranger. Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), Hakodate, Japan.","DOI":"10.1145\/1160633.1160854"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Samara, G., and Alsalihy, W.A.H.A. (2012, January 26\u201328). A new security mechanism for vehicular communication networks. Proceedings of the 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec 2012), Kuala Lumpur, Malaysia.","DOI":"10.1109\/CyberSec.2012.6246119"},{"key":"ref_34","first-page":"4540","article-title":"Enhancing Black Hole Attack Detection in VANETs: A Hybrid Approach Integrating DBSCAN Clustering with Decision Trees","volume":"25","author":"Hong","year":"2024","journal-title":"Scalable Comput. Pract. Exp."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Ripan, R.C., Sarker, I.H., Anwar, M.M., Furhad, M.H., Rahat, F., Hoque, M.M., and Sarfraz, M. (2020, January 14\u201316). An isolation forest learning based outlier detection approach for effectively classifying cyber anomalies. Proceedings of the Hybrid Intelligent Systems: 20th International Conference on Hybrid Intelligent Systems (HIS 2020), Virtual Event.","DOI":"10.1007\/978-3-030-73050-5_27"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"12591","DOI":"10.1109\/TKDE.2023.3270293","article-title":"Deep isolation forest for anomaly detection","volume":"35","author":"Xu","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Wan, H., Wang, H., Scotney, B., and Liu, J. (2019, January 6). A novel Gaussian mixture model for classification. Proceedings of the 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC), Bari, Italy.","DOI":"10.1109\/SMC.2019.8914215"},{"key":"ref_38","first-page":"651","article-title":"Experimenting XGBoost algorithm for prediction and classification of different datasets","volume":"9","author":"Ramraj","year":"2016","journal-title":"Int. J. Control Theory Appl."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Joharestani, M.Z., Cao, C., Ni, X., Bashir, B., and Talebiesfandarani, S. (2019). PM2.5 prediction based on random forest, XGBoost, and deep learning using multisource remote sensing data. Atmosphere, 10.","DOI":"10.3390\/atmos10070373"},{"key":"ref_40","unstructured":"Bankovi\u0107, Z., Vlajic, M., Puerta, D.S.G., Gonzalez, D.S.S., and Alcaraz, J. (2011, January 8\u201310). Detecting bad-mouthing attacks on reputation systems using self-organizing maps. Proceedings of the Computational Intelligence in Security for Information Systems: 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-M\u00e1laga, Spain. Proceedings."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"834","DOI":"10.3390\/futuretransp4030040","article-title":"Investigating LiDAR Sensor Accuracy for V2V and V2P Conflict Detection at Signalized Intersections","volume":"4","author":"Ansariyar","year":"2024","journal-title":"Future Transp."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"107897","DOI":"10.1016\/j.aap.2024.107897","article-title":"Conflict resolution behaviour of autonomous vehicles at intersections under mixed traffic environment","volume":"211","author":"Ashraf","year":"2025","journal-title":"Accid. Anal. Prev."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1016\/j.jsr.2022.09.002","article-title":"Using a V2V- and V2I-based collision warning system to improve vehicle interaction at unsignalized intersections","volume":"83","author":"Huang","year":"2022","journal-title":"J. Saf. Res."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"3936","DOI":"10.1109\/TNSM.2022.3220779","article-title":"Misbehaviour detection in vehicular ad hoc networks based on privacy-preserving federated learning and blockchain","volume":"19","author":"Lv","year":"2022","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_45","first-page":"102618","article-title":"Pseudonym change-based privacy-preserving schemes in vehicular ad-hoc networks: A survey","volume":"55","author":"Babaghayou","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_46","unstructured":"Wikipedia (2024, December 20). DBSCAN\u2014Density-Based Spatial Clustering of Applications with Noise. Available online: https:\/\/en.wikipedia.org\/wiki\/DBSCAN#:~:text=DBSCAN%20is%20one%20of%20the,data%20mining%20conference%2C%20ACM%20SIGKDD."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"103153","DOI":"10.1016\/j.adhoc.2023.103153","article-title":"Federated Learning-based Misbehaviour detection on an emergency message dissemination scenario for the 6G-enabled Internet of Vehicles","volume":"144","author":"Vinita","year":"2023","journal-title":"Ad Hoc Networks"},{"key":"ref_48","unstructured":"SUMO (2017, April 02). Simulation of Urban Mobility. Available online: https:\/\/eclipse.dev\/sumo\/."},{"key":"ref_49","unstructured":"Behrisch, M., Bieker, L., Erdmann, J., and Krajzewicz, D. (2011, January 23\u201328). SUMO\u2014Simulation of urban mobility: An overview. Proceedings of the 3rd Int. Conf. Adv. Syst. Simul., Barcelona, Spain."},{"key":"ref_50","unstructured":"(2017, October 16). OpenStreetMap [Online]. Available online: https:\/\/www.openstreetmap.org."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2008.80","article-title":"OpenStreetMap: User-generated street maps","volume":"7","author":"Haklay","year":"2008","journal-title":"IEEE Pervas. Comput."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"cnac019","DOI":"10.1093\/comnet\/cnac019","article-title":"Trust- and reputation-based opinion dynamics modelling over temporal networks","volume":"10","author":"Eeti","year":"2022","journal-title":"J. Complex Netw."},{"key":"ref_53","unstructured":"Lui, G.L. (1998, January 19\u201321). Threshold detection performance of GMSK signal with BT = 0.5. Proceedings of the IEEE Military Communications Conference, Proceedings, MILCOM 98 (Cat. No.98CH36201), Boston, MA, USA."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Hancock, J., Johnson, J.M., and Khoshgoftaar, T.M. (2022, January 14\u201316). A Comparative Approach to Threshold Optimization for Classifying Imbalanced Data. Proceedings of the 2022 IEEE 8th International Conference on Collaboration and Internet Computing (CIC), Atlanta, GA, USA.","DOI":"10.1109\/CIC56439.2022.00028"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/174\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:15:02Z","timestamp":1760030102000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/17\/4\/174"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,15]]},"references-count":54,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["fi17040174"],"URL":"https:\/\/doi.org\/10.3390\/fi17040174","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2025,4,15]]}}}