{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T05:58:22Z","timestamp":1775887102290,"version":"3.50.1"},"reference-count":88,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Remote Sensing"],"abstract":"<jats:p>Life-saving decisions in vehicular ad hoc networks (VANETs) depend on the availability of highly accurate, up-to-date, and reliable data exchanged by neighboring vehicles. However, spreading inaccurate, unreliable, and false data by intruders create traffic illusions that may cause loss of lives and assets. Although several solutions for misbehavior detection have been proposed to address these issues, those solutions lack adequate representation and the adaptability to vehicular context. The use of predefined static thresholds and lack of comprehensive context representation have rendered the existing solutions limited to specific scenarios and attack types, which impedes their generalizability. This paper addresses these limitations by proposing an ensemble-based hybrid context-aware misbehavior detection system (EHCA-MDS) model. EHCA-MDS has been developed in four phases, as follows. The static thresholds have been replaced by dynamic ones created on the fly by analyzing the spatial and temporal properties of the mobility information collected from neighboring vehicles. Kalman filter-based algorithms were used to collect the mobility information of neighboring vehicles. Three sets of features were then derived, each of which has a different perspective, namely data consistency, data plausibility, and vehicle behavior. These features were used to construct a dynamic context reference using the Hampel filter. The Hampel-based z-score was used to evaluate the vehicles based on their behavioral activities, data consistency, and plausibility. For comprehensive features representation, multifaceted, non-parametric-based statistical classifiers were constructed and updated online using a Hampel filter-based algorithm. For accurate representation, the output of the statistical classifiers, vehicles\u2019 scores, context reference parameters, and the derived features were used as input to an ensemble learning-based algorithm. Such representation helps to identify the misbehaving vehicles more effectively. The proposed EHCA-MDS model was evaluated in the presence of different types of misbehaving vehicles under different context scenarios through extensive simulations, utilizing a real-world traffic dataset. The results show that the accuracy and robustness of the proposed EHCA-MDS under different vehicular dynamic context scenarios were higher than existing solutions, which confirms its feasibility and effectiveness to improve the performance of VANET critical applications.<\/jats:p>","DOI":"10.3390\/rs11232852","type":"journal-article","created":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T10:50:45Z","timestamp":1575283845000},"page":"2852","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Ensemble-Based Hybrid Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1468-0655","authenticated-orcid":false,"given":"Fuad A.","family":"Ghaleb","sequence":"first","affiliation":[{"name":"Cyber Threat Intelligence Lab (CTIL), School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor 81310, Malaysia"}]},{"given":"Mohd Aizaini","family":"Maarof","sequence":"additional","affiliation":[{"name":"Cyber Threat Intelligence Lab (CTIL), School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor 81310, Malaysia"}]},{"given":"Anazida","family":"Zainal","sequence":"additional","affiliation":[{"name":"Cyber Threat Intelligence Lab (CTIL), School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor 81310, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3048-5961","authenticated-orcid":false,"given":"Bander Ali Saleh","family":"Al-rimy","sequence":"additional","affiliation":[{"name":"Cyber Threat Intelligence Lab (CTIL), School of Computing, Faculty of Engineering, Universiti Teknologi Malaysia, Johor 81310, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7974-7638","authenticated-orcid":false,"given":"Abdullah","family":"Alsaeedi","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2133-0757","authenticated-orcid":false,"given":"Wadii","family":"Boulila","sequence":"additional","affiliation":[{"name":"College of Computer Science and Engineering, Taibah University, Medina 42353, Saudi Arabia"},{"name":"RIADI Laboratory, National School of Computer Sciences, University of Manouba, Manouba 2010, Tunisia"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,1]]},"reference":[{"key":"ref_1","unstructured":"WHO (2019, June 20). 10 Facts on Global Road Safety. Available online: http:\/\/www.who.int\/features\/factfiles\/roadsafety\/en\/."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.eswa.2015.12.006","article-title":"CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks","volume":"50","author":"Wahab","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/0094-1190(90)90028-L","article-title":"Economics of a bottleneck","volume":"27","author":"Arnott","year":"1990","journal-title":"J. Urban Econ."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"391","DOI":"10.1177\/0885412211409754","article-title":"Does traffic congestion slow the economy?","volume":"26","author":"Sweet","year":"2011","journal-title":"J. Plan. Lit."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1109\/TITS.2007.894193","article-title":"Traffic Management Center Use of Incident Detection Algorithms: Findings of a Nationwide Survey","volume":"8","author":"Williams","year":"2007","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_6","first-page":"43","article-title":"A survey on context-aware vehicular network applications","volume":"3","author":"Ramazani","year":"2016","journal-title":"Veh. Commun."},{"key":"ref_7","unstructured":"Heijden, R.W., and Kargl, F. (2014). Open Issues in Differentiating Misbehavior and Anomalies for VANETs, Vehicular Lab, University of Luxembourg."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Santamaria, A.F., Sottile, C., De Rango, F., and Voznak, M. (2014, January 5\u20139). Road Safety Alerting System with Radar and GPS Cooperation in a VANET Environment. Proceedings of the Wireless Sensing, Localization, and Processing Ix, Baltimore, MD, USA.","DOI":"10.1117\/12.2053299"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1109\/MCOM.2009.4939288","article-title":"Wave: A tutorial","volume":"47","author":"Uzcategui","year":"2009","journal-title":"IEEE Commun. Mag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1505","DOI":"10.1109\/TVT.2012.2236117","article-title":"Graph-Based Metrics for Insider Attack Detection in VANET Multihop Data Dissemination Protocols","volume":"62","author":"Dietzel","year":"2013","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1049\/iet-its.2012.0101","article-title":"Cooperative vehicle collision warning system using the vector-based approach with dedicated short range communication data transmission","volume":"8","author":"Huang","year":"2014","journal-title":"IET Intell. Transp. Syst."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/MCOM.2009.5307473","article-title":"Vehicular wireless short-range communication for improving intersection safety","volume":"47","author":"Le","year":"2009","journal-title":"IEEE Commun. Mag."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1109\/TITS.2002.802929","article-title":"Vehicle control algorithms for cooperative driving with automated vehicles and intervehicle communications","volume":"3","author":"Kato","year":"2002","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1109\/TITS.2013.2278494","article-title":"Cooperative Adaptive Cruise Control in Real Traffic Situations","volume":"15","author":"Milan","year":"2014","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1109\/TITS.2011.2159493","article-title":"Cognitive Cars: A New Frontier for ADAS Research","volume":"13","author":"Li","year":"2012","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_16","unstructured":"NHTSA (2005). Vehicle Safety Communications Project Task 3 Final Report, Identify Intelligent Vehicle Safety Applications Enabled by Dsrc."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"St\u00fcbing, H. (2013). Car-to-X Communication: System Architecture and Applications. Multilayered Security and Privacy Protection in Car-to-X Networks, Springer Fachmedien Wiesbaden.","DOI":"10.1007\/978-3-658-02531-1"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"2544","DOI":"10.1109\/TVT.2013.2296071","article-title":"Improving positioning accuracy using GPS pseudorange measurements for cooperative vehicular localization","volume":"63","author":"Liu","year":"2014","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1016\/j.adhoc.2017.03.006","article-title":"A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV","volume":"61","author":"Sakiz","year":"2017","journal-title":"Ad Hoc Netw."},{"key":"ref_20","unstructured":"Bissmeyer, N., Michael, W., and Frank, K. (2014). Misbehavior Detection and Attacker Identification in Vehicular Ad-Hoc Networks. [Ph.D. Thesis, Technische Universit\u00e4t Darmstadt]."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Leinmuller, T., Schoch, E., Kargl, F., and Maih\u00f6fer, C. (2005). Influence of falsified position data on geographic ad-hoc routing. Security and Privacy in Ad-hoc and Sensor Networks, Springer.","DOI":"10.1007\/11601494_9"},{"key":"ref_22","unstructured":"Leinmuller, T., and Schoch, E. (2006, January 14\u201315). Greedy routing in highway scenarios: The impact of position faking nodes. Proceedings of the Workshop On Intelligent Transportation (WIT 2006), Hamburg, Germany."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Grover, J., Gaur, M.S., and Laxmi, V. (2011, January 4\u20138). Position Forging Attacks in Vehicular Ad Hoc Networks: Implementation, Impact and Detection. Proceedings of the 7th International Wireless Communications and Mobile Computing Conference (IWCMC), Istanbul, Turkey.","DOI":"10.1109\/IWCMC.2011.5982632"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MITP.2004.1265539","article-title":"The threat of intelligent collisions","volume":"6","author":"Blum","year":"2004","journal-title":"IT Prof."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Lo, N.-W., and Tsai, H.-C. (2007, January 26\u201330). Illusion Attack on VANET Applications\u2014A Message Plausibility Problem. Proceedings of the IEEE Globecom Workshops, Washington, DC, USA.","DOI":"10.1109\/GLOCOMW.2007.4437823"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1016\/j.jpdc.2013.02.001","article-title":"Detecting Sybil attacks in VANETs","volume":"73","author":"Yu","year":"2013","journal-title":"J. Parallel Distrib. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1016\/j.jnca.2013.05.015","article-title":"Information management in vehicular ad hoc networks: A review","volume":"39","author":"Kakkasageri","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1169","DOI":"10.1016\/j.eswa.2009.06.008","article-title":"A comparison of outlier detection algorithms for ITS data","volume":"37","author":"Chen","year":"2010","journal-title":"Expert Syst. Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1109\/TITS.2013.2262176","article-title":"MARV-X: Applying Maneuver Assessment for Reliable Verification of Car-to-X Mobility Data","volume":"14","author":"Firl","year":"2013","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1109\/COMST.2018.2873088","article-title":"Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems","volume":"21","author":"Stefan","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"423","DOI":"10.3233\/JIFS-169600","article-title":"Driving-situation-aware adaptive broadcasting rate scheme for vehicular ad hoc network","volume":"35","author":"Ghaleb","year":"2018","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_32","unstructured":"Zhengming, L., Chunxiao, C., and Wong, D. (December, January 30). AWF-NA: A Complete Solution for Tampered Packet Detection in VANETs. Proceedings of the IEEE GLOBECOM 2008\u20142008 Global Telecommunications Conference, New Orleans, LO, USA."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Hortelano, J., Ruiz, J.C., and Manzoni, P. (2010, January 23\u201327). Evaluating the Usefulness of Watchdogs for Intrusion Detection in VANETs. Proceedings of the 2010 IEEE International Conference on Communications Workshops, Capetown, South Africa.","DOI":"10.1109\/ICCW.2010.5503946"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/s11042-011-0789-y","article-title":"Detection of malicious vehicles (DMV) through monitoring in Vehicular Ad-Hoc Networks","volume":"66","author":"Daeinabi","year":"2013","journal-title":"Multimed. Tools Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1016\/j.comcom.2013.12.005","article-title":"A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles","volume":"41","author":"Wahab","year":"2014","journal-title":"Comput. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1893","DOI":"10.1109\/TMC.2012.257","article-title":"AMD: Audit-Based Misbehavior Detection in Wireless Ad Hoc Networks","volume":"15","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"1550147716673928","DOI":"10.1177\/1550147716673928","article-title":"On-demand Misbehavior Detection for Vehicular Ad Hoc Network","volume":"12","author":"Ho","year":"2016","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"778","DOI":"10.1016\/j.adhoc.2010.02.008","article-title":"Detecting misbehaviors in VANET with integrated root-cause analysis","volume":"8","author":"Ghosh","year":"2010","journal-title":"Ad Hoc Netw."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Thilagam, P.S., Pais, A.R., Chandrasekaran, K., and Balakrishnan, N. (2012). Misbehavior Detection Based on Ensemble Learning in VANET. International Conference on Advanced Computing, Networking and Security. ADCONS 2011, Surathkal, India, December 16-18, 2011, Revised Selected Papers, Springer.","DOI":"10.1007\/978-3-642-29280-4"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Lee, D., and Yung, M. (2012). Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice. Information Security Applications, Springer.","DOI":"10.1007\/978-3-642-35416-8"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Zaidi, K., Milojevic, M., Rakocevic, V., and Rajarajan, M. (2014, January 24\u201326). Data-centric Rogue Node Detection in VANETs. Proceedings of the IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, Beijing, China.","DOI":"10.1109\/TrustCom.2014.51"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Ruj, S., Cavenaghi, M.A., Huang, Z., Nayak, A., and Stojmenovic, I. (2011, January 5\u20138). On data-centric misbehavior detection in VANETs. Proceedings of the IEEE Vehicular Technology Conference (VTC Fall), San Francisco, CA, USA.","DOI":"10.1109\/VETECF.2011.6093096"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Raya, M., Papadimitratos, P., Gligor, V.D., and Hubaux, J.-P. (2008, January 13\u201318). On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. Proceedings of the IEEE INFOCOM 2008\u2014The 27th Conference on Computer Communications, Phoenix, AZ, USA.","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"6703","DOI":"10.1109\/TVT.2015.2480244","article-title":"Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection","volume":"65","author":"Zaidi","year":"2016","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1007\/978-3-642-14478-3_47","article-title":"Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks","volume":"89","author":"Grover","year":"2010","journal-title":"Recent Trends Netw. Secur. Appl."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Dietzel, S., van der Heijden, R., Decke, H., and Kargl, F. (2014, January 19). A flexible, subjective logic-based framework for misbehavior detection in V2V networks. Proceedings of the IEEE 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Sydney, Australia.","DOI":"10.1109\/WoWMoM.2014.6918989"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Golle, P., Greene, D., and Staddon, J. (2004, January 1). Detecting and correcting malicious data in VANETs. Proceedings of the 1st ACM International Workshop on Vehicular ad hoc Networks, Philadelphia, PA, USA.","DOI":"10.1145\/1023875.1023881"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MWC.2009.5361178","article-title":"Providing Location Security in Vehicular Ad Hoc Networks","volume":"16","author":"Yan","year":"2009","journal-title":"IEEE Wirel. Commun."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Bissmeyer, N., Njeukam, J., Petit, J., and Bayarou, K.M. (2012, January 25). Central misbehavior evaluation for VANETs based on mobility data plausibility. Proceedings of the Ninth ACM International Workshop on Vehicular Inter-networking, Systems, and Applications, Low Wood Bay, Lake District, UK.","DOI":"10.1145\/2307888.2307902"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1002\/sec.56","article-title":"Decentralized position verification in geographic ad hoc routing","volume":"3","author":"Leinmuller","year":"2010","journal-title":"Secur. Commun. Netw."},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Bissmeyer, N., Stresing, C., and Bayarou, K.M. (2010, January 13\u201315). Intrusion detection in VANETs through verification of vehicle movement data. Proceedings of the IEEE Vehicular Networking Conference (VNC), Jersey City, NJ, USA.","DOI":"10.1109\/VNC.2010.5698232"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Bissmeyer, N., Schr\u00f6der, K.H., Petit, J., Mauthofer, S., and Bayarou, K.M. (2013, January 16\u201318). Short paper: Experimental analysis of misbehavior detection and prevention in VANETs. Proceedings of the Fifth IEEE Vehicular Networking Conference (VNC), Boston, MA, USA.","DOI":"10.1109\/VNC.2013.6737612"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.trc.2011.08.002","article-title":"Hindering false event dissemination in VANETs with proof-of-work mechanisms","volume":"23","author":"Palomar","year":"2012","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"ref_54","unstructured":"Van der Heijden, R.W., Dietzel, S., Leinm\u00fcller, T., and Kargl, F. (2016). Survey on Misbehavior Detection in Cooperative Intelligent Transportation Systems. arXiv."},{"key":"ref_55","unstructured":"Schmidt, R.K., Leinm\u00fcller, T., Schoch, E., Held, A., and Sch\u00e4fer, G. (2008, January 3). Vehicle behavior analysis to enhance security in vanets. Proceedings of the 4th IEEE Vehicle-to-Vehicle Communications Workshop (V2VCOM2008), Eindhoven, The Netherlands."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/WC-M.2006.250353","article-title":"Position verification approaches for vehicular ad hoc networks","volume":"13","author":"Leinmuller","year":"2006","journal-title":"IEEE Wirel. Commun."},{"key":"ref_57","first-page":"11","article-title":"A Novel Framework for Efficient Mobility Data Verification in Vehicular Ad-hoc Networks","volume":"10","author":"Jaeger","year":"2012","journal-title":"Int. J. Intell. Transp. Syst. Res."},{"key":"ref_58","unstructured":"St\u00fcbing, H., Jaeger, A., Schmidt, C., and Huss, S.A. (2010, January 25\u201329). Verifying mobility data under privacy considerations in car-to-x communication. Proceedings of the 17th ITS World Congress, Busan, Korea."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"St\u00fcbing, H., Firl, J., and Huss, S.A. (2011, January 14\u201316). A two-stage verification process for Car-to-X mobility data based on path prediction and probabilistic maneuver recognition. Proceedings of the 2011 IEEE Vehicular Networking Conference (VNC), Amsterdam, The Netherlands.","DOI":"10.1109\/VNC.2011.6117119"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Ghaleb, F.A., Razzaque, M.A., and Isnin, I.F. (2013, January 2\u20135). Security and privacy enhancement in VANETs using mobility pattern. Proceedings of the 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN), Da Nang, Vietnam.","DOI":"10.1109\/ICUFN.2013.6614808"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Firl, J., St\u00fcbing, H., Huss, S.A., and Stiller, C. (2012, January 3\u20137). Predictive maneuver evaluation for enhancement of Car-to-X mobility data. Proceedings of the IEEE Intelligent Vehicles Symposium (IV), Alcala de Henares, Spain.","DOI":"10.1109\/IVS.2012.6232217"},{"key":"ref_62","first-page":"221","article-title":"Mobility information estimation algorithm using Kalman-filter for vehicular ad hoc networks","volume":"8","author":"Ghaleb","year":"2016","journal-title":"Int. J. Inf. Comput. Secur."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"St\u00fcbing, H. (2013). Facility Layer Security: Mobility Data Verification. Multilayered Security and Privacy Protection in Car-to-X Networks, Springer Fachmedien Wiesbaden.","DOI":"10.1007\/978-3-658-02531-1"},{"key":"ref_64","first-page":"482","article-title":"A practical note on evaluating Kalman filter performance optimality and degradation","volume":"193","author":"Jwo","year":"2007","journal-title":"Appl. Math. Comput."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1243","DOI":"10.1016\/j.trc.2010.12.007","article-title":"On the assessment of vehicle trajectory data accuracy and application to the Next Generation SIMulation (NGSIM) program data","volume":"19","author":"Punzo","year":"2011","journal-title":"Transp. Res. Part C Emerg. Technol."},{"key":"ref_66","first-page":"1072","article-title":"A Metropolitan Taxi Mobility Model from Real GPS Traces","volume":"18","author":"Huang","year":"2012","journal-title":"J. Univers. Comput. Sci."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"159119","DOI":"10.1109\/ACCESS.2019.2950805","article-title":"Hybrid and Multifaceted Context-Aware Misbehavior Detection Model for Vehicular Ad Hoc Network","volume":"7","author":"Ghaleb","year":"2019","journal-title":"IEEE Access"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Ghaleb, F.A., Zainal, A., Rassam, M.A., and Mohammed, F. (2017, January 13\u201314). An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications. Proceedings of the 2017 IEEE Conference on Application, Information and Network Security (AINS), Miri, Malaysia.","DOI":"10.1109\/AINS.2017.8270417"},{"key":"ref_69","first-page":"100186","article-title":"Context-Aware Data-Centric Misbehaviour Detection Scheme for Vehicular Ad Hoc Networks using Sequential Analysis of the Temporal and Spatial Correlation of the Consistency between the Cooperative Awareness Messages","volume":"20","author":"Ghaleb","year":"2019","journal-title":"Veh. Commun."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.pmcj.2017.06.008","article-title":"Improved vehicle positioning algorithm using enhanced innovation-based adaptive Kalman filter","volume":"40","author":"Ghaleb","year":"2017","journal-title":"Pervasive Mob. Comput."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.02.020","article-title":"VANET security surveys","volume":"44","author":"Engoulou","year":"2014","journal-title":"Comput. Commun."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/MWC.2007.4407221","article-title":"Localization systems for wireless sensor networks","volume":"14","author":"Boukerche","year":"2007","journal-title":"IEEE Wirel. Commun."},{"key":"ref_73","unstructured":"Krell, M.M., Tabie, M., Woehrle, H., and Kirchner, E.A. (2013, January 19\u201320). Memory and Processing Efficient Formula for Moving Variance Calculation in EEG and EMG Signal Processing. Proceedings of the International Congress on Neurotechnology, Electronics and Informatics (NEUROTECHNIX-2013), Vilamoura, Portugal."},{"key":"ref_74","unstructured":"FHWA (2015, December 17). Next Generation Simulation (NGSIM) Vehicle Trajctories Dataset, Available online: http:\/\/ngsim-community.org\/."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1109\/TITS.2013.2285337","article-title":"Modeling Mandatory Lane Changing Using Bayes Classifier and Decision Trees","volume":"15","author":"Hou","year":"2014","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"5268","DOI":"10.1109\/ACCESS.2016.2598155","article-title":"Computational Security for Context-Awareness in Vehicular Ad-Hoc Networks","volume":"4","author":"Tian","year":"2016","journal-title":"IEEE Access"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Erskine, S.K., and Elleithy, K.M. (2019). Real-Time Detection of DoS Attacks in IEEE 802.11 p Using Fog Computing for a Secure Intelligent Vehicular Network. Electronics, 8.","DOI":"10.3390\/electronics8070776"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1145\/365723.365727","article-title":"A MATLAB differentiation matrix suite","volume":"26","author":"Weideman","year":"2000","journal-title":"ACM Trans. Math. Softw."},{"key":"ref_79","first-page":"100","article-title":"Algorithm AS 136: A k-means clustering algorithm","volume":"28","author":"Hartigan","year":"1979","journal-title":"J. R. Stat. Soc. Ser. C (Appl. Stat.)"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1109\/TITS.2010.2048562","article-title":"Intervehicle-Communication-Assisted Localization","volume":"11","author":"Drawil","year":"2010","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"3371","DOI":"10.1109\/TVT.2007.907687","article-title":"Vehicular Node Localization Using Received-Signal-Strength Indicator","volume":"56","author":"Parker","year":"2007","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"4756","DOI":"10.1109\/TVT.2014.2367037","article-title":"A Methodology for Studying 802.11p VANET Broadcasting Performance with Practical Vehicle Distribution","volume":"64","author":"Qiu","year":"2015","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_83","unstructured":"Mcquighan, P. (2010). SIMULATING THE POISSON PROCESS, Department of Mathematics, University of Chicago."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"1854","DOI":"10.1109\/TVT.2012.2190119","article-title":"Application-Level Frequency Control of Periodic Safety Messages in the IEEE WAVE","volume":"61","author":"Park","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s11277-013-1222-9","article-title":"Beaconing Approaches in Vehicular Ad Hoc Networks: A Survey","volume":"73","author":"Ghafoor","year":"2013","journal-title":"Wirel. Pers. Commun."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1109\/TVT.2011.2177675","article-title":"Design and Analysis of a Robust Broadcast Scheme for VANET Safety-Related Services","volume":"61","author":"Ma","year":"2012","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_87","doi-asserted-by":"crossref","unstructured":"Nikaein, N., Kanti, S.D., Marecar, I., and Bonnet, C. (2013, January 5\u20137). Application Distribution Model and Related Security Attacks in VANET. Proceedings of the International Conference on Graphic and Image Processing (Icgip 2012), Singapore.","DOI":"10.1117\/12.2010545"},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/JCN.2013.000028","article-title":"A beacon-based trust management system for enhancing user centric location privacy in VANETs","volume":"15","author":"Chen","year":"2013","journal-title":"J. Commun. Netw."}],"container-title":["Remote Sensing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2072-4292\/11\/23\/2852\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:39:03Z","timestamp":1760189943000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2072-4292\/11\/23\/2852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,1]]},"references-count":88,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["rs11232852"],"URL":"https:\/\/doi.org\/10.3390\/rs11232852","relation":{},"ISSN":["2072-4292"],"issn-type":[{"value":"2072-4292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,1]]}}}