2021
DOI: 10.1007/s10668-021-01632-5
|View full text |Cite
|
Sign up to set email alerts
|

Collaborative-trust approach toward malicious node detection in vehicular ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 23 publications
(12 citation statements)
references
References 32 publications
0
12
0
Order By: Relevance
“…The estimation is performed by a voting strategy whose outcome relies on the majority concept. However, relying on node behavior is sub-optimal because the cITS is non-stationary and since nodes change their behavior as the topology changes [22,23]. Moreover, relying on a voting approach for the trustworthiness estimation is always biased towards the majority, which in some cases, can be compromised when the attacker gains a majority foothold.…”
Section: Related Workmentioning
confidence: 99%
“…The estimation is performed by a voting strategy whose outcome relies on the majority concept. However, relying on node behavior is sub-optimal because the cITS is non-stationary and since nodes change their behavior as the topology changes [22,23]. Moreover, relying on a voting approach for the trustworthiness estimation is always biased towards the majority, which in some cases, can be compromised when the attacker gains a majority foothold.…”
Section: Related Workmentioning
confidence: 99%
“…The Internet of Things (IoT) and machine learning have shown improved performance in many applications, such as facial recognition, biometrics, and surveillance [27,28]. Recently, the blockchain-based multi-IoT method was presented by Jeong et al [29].…”
Section: Related Workmentioning
confidence: 99%
“…In the application scenario of opportunistic social networking, when people transfer data through portable mobile devices, considering that there is no suitable transmission target within a certain transmission range, or the transmission target does not respond, it will occupy a large amount of buffer in the data storage area of the device, which affected the data transmission rate [11]. On the one hand, the information has not been received and responded for a long time, and it is always in a waiting state, which causes a large amount of reserved information to be stored in the device, resulting in transmission delay [12]. On the other hand, when there is a large amount of buffer space when new urgent data information is received, the information release sequence needs to be updated to achieve real-time release [13].…”
Section: Introductionmentioning
confidence: 99%