{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:39:29Z","timestamp":1762004369908},"reference-count":51,"publisher":"IGI Global","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1,1]]},"abstract":"<p>An increasingly large number of cars are being equipped with GPS and Wi-Fi devices, forming vehicular ad-hoc networks (VANETs) and enabling vehicle to vehicle communication with the goal of providing increased passenger and road safety. However, dishonest peers (vehicles) in a VANET may send out false information to maximize their own utility. Given the dire consequences of acting on false information in this context, there is a serious need to establish trust among peers. This article first discusses the challenges for trust management caused by the important characteristics of VANET environments, and identifies desired properties that effective trust management should incorporate in order to address the challenges. The author then surveys and evaluates existing trust models in VANETs, and points out that none of the trust models has achieved all the properties. Finally, the author proposes some important future directions for research towards effective trust management for VANETs.<\/p>","DOI":"10.4018\/jdst.2012010104","type":"journal-article","created":{"date-parts":[[2012,2,2]],"date-time":"2012-02-02T13:33:43Z","timestamp":1328189623000},"page":"48-62","source":"Crossref","is-referenced-by-count":47,"title":["Trust Management for VANETs"],"prefix":"10.4018","volume":"3","author":[{"given":"Jie","family":"Zhang","sequence":"first","affiliation":[{"name":"Nanyang Technological University, Singapore"}]}],"member":"2432","reference":[{"issue":"3","key":"jdst.2012010104-0","first-page":"27","article-title":"The pgp trust model.","volume":"10","author":"A.Abdul-Rahman","year":"1997","journal-title":"EDI-Forum: The Journal of Electronic Commerce"},{"key":"jdst.2012010104-1","doi-asserted-by":"crossref","unstructured":"Balakrishnan, V., Varadharajan, V., & Tupakula, U. (2008). Subjective logic based trust model for mobile ad hoc networks. In Proceedings of the International Conference on Security and Privacy in Communication Networks.","DOI":"10.1145\/1460877.1460916"},{"key":"jdst.2012010104-2","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhang, J., Cohen, R., & Ho, P. H. (2010a). Secure and efficient trust opinion aggregation for vehicular ad-hoc networks. In Proceedings of the IEEE 72nd Vehicular Technology Conference (pp. 1-5).","DOI":"10.1109\/VETECF.2010.5594420"},{"key":"jdst.2012010104-3","doi-asserted-by":"crossref","unstructured":"Chen, C., Zhang, J., Cohen, R., & Ho, P. H. (2010b). A trust-based message propagation and evaluation framework in vanets. In Proceedings of the International Conference on Information Technology Convergence and Services.","DOI":"10.1109\/ITCS.2010.5581298"},{"key":"jdst.2012010104-4","doi-asserted-by":"crossref","unstructured":"Choffnes, D. R., & Bustamante, F. E. (2005). An integrated mobility and traffic model for vehicular wireless networks. In Proceedings of the International Workshop on Vehicular Ad Hoc Networks (pp. 69-78).","DOI":"10.1145\/1080754.1080765"},{"key":"jdst.2012010104-5","doi-asserted-by":"crossref","unstructured":"Dellarocas, C. (2000). Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the ACM Conference on Electronic Commerce (pp. 150-157).","DOI":"10.1145\/352871.352889"},{"key":"jdst.2012010104-6","doi-asserted-by":"crossref","unstructured":"Dotzer, F., Fischer, L., & Magiera, P. (2005). Vars: A vehicle ad-hoc network reputation system. In Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (pp. 454-456).","DOI":"10.1109\/WOWMOM.2005.109"},{"key":"jdst.2012010104-7","doi-asserted-by":"crossref","unstructured":"Douceur, J. (2002). The sybil attack. In Proceedings of the First International Workshop on Peer-to-Peer Systems.","DOI":"10.1007\/3-540-45748-8_24"},{"key":"jdst.2012010104-8","unstructured":"Eichler, S., Schroth, C., & Eberspacher, J. (2006). Car-to-car communication. In Proceedings of the VDE-Kongress: Innovations for Europe."},{"key":"jdst.2012010104-9","doi-asserted-by":"crossref","unstructured":"Elbatt, T., Goel, S. K., Holland, G., Krishnan, H., & Parikh, J. (2006). Cooperative collision warning using dedicated short range wireless communications. In Proceedings of the International Workshop on Vehicular Ad Hoc Networks (pp. 1-9).","DOI":"10.1145\/1161064.1161066"},{"key":"jdst.2012010104-10","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2011.050311.100028"},{"key":"jdst.2012010104-11","doi-asserted-by":"crossref","unstructured":"Gerlach, M. (2007). Trust for vehicular applications. In Proceedings of the International Symposium on Autonomous Decentralized Systems (pp. 295-304).","DOI":"10.1109\/ISADS.2007.76"},{"key":"jdst.2012010104-12","doi-asserted-by":"crossref","unstructured":"Golle, P., Greene, D., & Staddon, J. (2004). Detecting and correcting malicious data in vanets. In Proceedings of the International Workshop on Vehicular Ad Hoc Networks (pp. 29-37).","DOI":"10.1145\/1023875.1023881"},{"key":"jdst.2012010104-13","doi-asserted-by":"crossref","unstructured":"Guo, G., Zhang, J., & Vassileva, J. (2011). Improving pgp web of trust through the expansion of trusted neighborhood. In Proceedings of the IEEE\/WIC\/ACM International Conference on Web Intelligence (pp. 489-494).","DOI":"10.1109\/WI-IAT.2011.134"},{"key":"jdst.2012010104-14","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"key":"jdst.2012010104-15","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-005-6825-4"},{"key":"jdst.2012010104-16","unstructured":"J\u00f8sang, A., & Golbeck, J. (2009). Challenges for robust of trust and reputation systems. In Proceedings of the 5th International Workshop on Security and Trust Management."},{"key":"jdst.2012010104-17","unstructured":"J\u00f8sang, A., & Ismail, R. (2002). The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference (pp. 324-337)."},{"key":"jdst.2012010104-18","unstructured":"Leckie, C., & Kotagiri, R. (2003). Policies for sharing distributed probabilistic beliefs. In Proceedings of the 26th Australasian Computer Science Conference (Vol. 16)."},{"key":"jdst.2012010104-19","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2007.912927"},{"key":"jdst.2012010104-20","doi-asserted-by":"crossref","unstructured":"Mass, Y., & Shehory, O. (2001). Distributed trust in open multi-agent systems. In R. Falcone, M. Singh, & Y.-H. Tan (Eds.), Proceedings of the Conference on Trust in Cybersocieties (LNCS 2246, pp. 159-173).","DOI":"10.1007\/3-540-45547-7_10"},{"key":"jdst.2012010104-21","doi-asserted-by":"crossref","unstructured":"Minhas, U. F., Zhang, J., Tran, T., & Cohen, R. (2010a). Intelligent agents in mobile vehicular ad-hoc networks: Leveraging trust modeling based on direct experience with incentives for honesty. In Proceedings of the IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology (pp. 243-247).","DOI":"10.1109\/WI-IAT.2010.66"},{"issue":"1","key":"jdst.2012010104-22","article-title":"Towards expanded trust management for agents in vehicular ad-hoc networks.","volume":"5","author":"U. F.Minhas","year":"2010","journal-title":"International Journal of Computational Intelligence Theory and Practice"},{"key":"jdst.2012010104-23","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2084571"},{"key":"jdst.2012010104-24","doi-asserted-by":"crossref","unstructured":"Mui, L., Mohtashemi, M., & Halberstadt, A. (2002). A computational model of trust and reputation. In Proceedings of the 35th Hawaii International Conference on System Science (pp. 2431-2439).","DOI":"10.1109\/HICSS.2002.994181"},{"key":"jdst.2012010104-25","doi-asserted-by":"publisher","DOI":"10.1145\/1031483.1031487"},{"key":"jdst.2012010104-26","doi-asserted-by":"crossref","unstructured":"Patwardhan, A., Joshi, A., Finin, T., & Yesha, Y. (2006). A data intensive reputation management scheme for vehicular ad hoc networks. In Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems (pp. 1-8).","DOI":"10.1109\/MOBIQW.2006.361754"},{"key":"jdst.2012010104-27","doi-asserted-by":"crossref","unstructured":"Poslad, S., Calisti, M., & Charlton, P. (2002). Specifying standard security mechanisms in multi-agent systems. In Proceedings of AAMAS Workshop on Deception, Fraud and Trust in Agent Societies (pp. 163-176).","DOI":"10.1007\/3-540-36609-1_13"},{"key":"jdst.2012010104-28","unstructured":"Rahman, S., & Hengartner, U. (2007). Secure vehicle crash reporting. In Proceedings of the International Conference on Mobile Computing."},{"key":"jdst.2012010104-29","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing vehicular ad hoc networks.","volume":"15","author":"M.Raya","year":"2007","journal-title":"Journal of Computer Security"},{"key":"jdst.2012010104-30","doi-asserted-by":"crossref","unstructured":"Raya, M., Papadimitratos, P., Gligor, V., & Hubaux, J. (2008). On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE Conference INFOCOM (pp. 1238-1246).","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"jdst.2012010104-31","unstructured":"Regan, K., Poupart, P., & Cohen, R. (2006). Bayesian reputation modeling in e-marketplaces sensitive to subjectivity, deception and change. In Proceedings of the Conference on Artificial Intelligence (pp. 1206-1212)."},{"key":"jdst.2012010104-32","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"jdst.2012010104-33","doi-asserted-by":"crossref","unstructured":"Sabater, J., & Sierra, C. (2001). Regret: A reputation model for gregarious societies. In Proceedings of the AAMAS Workshop on Deception, Fraud and Trust in Agent Societies (pp. 475-482).","DOI":"10.1145\/375735.376110"},{"key":"jdst.2012010104-34","doi-asserted-by":"crossref","unstructured":"Staab, E., Fusenig, V., & Engel, T. (2008). Towards trust-based acquisition of unverifiable information. In Proceedings of the 12th International Workshop on Cooperative Information Agents (pp. 41-54).","DOI":"10.1007\/978-3-540-85834-8_6"},{"key":"jdst.2012010104-35","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-006-5952-x"},{"issue":"1","key":"jdst.2012010104-36","first-page":"69","article-title":"A reliability modelling based strategy to avoid infinite harm from dishonest sellers in electronic marketplaces.","volume":"1","author":"T.Tran","year":"2005","journal-title":"Journal of Business and Technology"},{"key":"jdst.2012010104-37","unstructured":"Wang, Y., & Singh, M. P. (2007). Formal trust model for multiagent systems. In Proceedings of the 20th International Joint Conference on Artificial Intelligence."},{"key":"jdst.2012010104-38","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zhang, J., & Vassileva, J. (2010a). Effective web service selection via communities formed by super-agents. In Proceedings of the IEEE\/WIC\/ACM International Conference on Web Intelligence (pp. 546-556).","DOI":"10.1109\/WI-IAT.2010.221"},{"key":"jdst.2012010104-39","unstructured":"Wang, Y., Zhang, J., & Vassileva, J. (2010b). Super-agent based reputation management with a practical reward mechanism in decentralized systems. In Proceedings of the IFIP International Conference on Trust Management."},{"key":"jdst.2012010104-40","doi-asserted-by":"crossref","unstructured":"Wex, P., Breuer, J., Held, A., Leinmuller, T., & Delgrossi, L. (2008). Trust issues for vehicular ad hoc networks. In Proceedings of the 67th IEEE Vehicular Technology Conference (pp. 2800-2804).","DOI":"10.1109\/VETECS.2008.611"},{"key":"jdst.2012010104-41","unstructured":"Wikipedia. (n.d.). Road traffic safety. Retrieved from http:\/\/en.wikipedia.org\/wiki\/Road_traffic_safety"},{"key":"jdst.2012010104-42","doi-asserted-by":"crossref","unstructured":"Wu, D. J., & Sun, Y. (2001). The emergence of trust in multi-agent bidding: a computational approach. In Proceedings of Hawaii International Conference on System Sciences.","DOI":"10.1109\/HICSS.2001.926222"},{"key":"jdst.2012010104-43","doi-asserted-by":"crossref","unstructured":"Xu, Q., Mak, T., Ko, J., & Sengupta, R. (2004). Vehicle-to-vehicle safety messaging in DSRC. In Proceedings of the International Workshop on Vehicular Ad Hoc Networks.","DOI":"10.1145\/1023875.1023879"},{"key":"jdst.2012010104-44","doi-asserted-by":"crossref","unstructured":"Yu, B., & Singh, M. (2000). A social mechanism of reputation management in electronic communities. In Proceedings of the 4th International Workshop on Cooperative Information Agents (pp. 154-165).","DOI":"10.1007\/978-3-540-45012-2_15"},{"key":"jdst.2012010104-45","doi-asserted-by":"publisher","DOI":"10.1111\/1467-8640.00202"},{"key":"jdst.2012010104-46","doi-asserted-by":"crossref","unstructured":"Yu, B., & Singh, M. (2002b). An evidential model of distributed reputation management. In Proceedings of International Autonomous Agents and Multi Agent Systems (pp. 294-301).","DOI":"10.1145\/544741.544809"},{"issue":"2","key":"jdst.2012010104-47","first-page":"1","article-title":"Vehicular ad hoc networks (vanets): Status, results, and challenges.","volume":"51","author":"S.Zeadally","year":"2010","journal-title":"Telecommunication Systems"},{"key":"jdst.2012010104-48","doi-asserted-by":"crossref","unstructured":"Zhang, J. (2011). A survey on trust management for vanets. In Proceedings of the 25th International Conference on Advanced Information Networking and Applications (pp. 105-112).","DOI":"10.1109\/AINA.2011.86"},{"key":"jdst.2012010104-49","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2008.03.001"},{"key":"jdst.2012010104-50","doi-asserted-by":"crossref","unstructured":"Zhang, J., Sensoy, M., & Cohen, R. (2008). A detailed comparison of probabilistic approaches for coping with unfair ratings in trust and reputation systems. In Proceedings of the 6th Annual Conference on Privacy, Security and Trust (pp. 189-200).","DOI":"10.1109\/PST.2008.16"}],"container-title":["International Journal of Distributed Systems and Technologies"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=63635","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T05:23:57Z","timestamp":1654147437000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jdst.2012010104"}},"subtitle":["Challenges, Desired Properties and Future Directions"],"short-title":[],"issued":{"date-parts":[[2012,1,1]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"URL":"https:\/\/doi.org\/10.4018\/jdst.2012010104","relation":{},"ISSN":["1947-3532","1947-3540"],"issn-type":[{"value":"1947-3532","type":"print"},{"value":"1947-3540","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1,1]]}}}