2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops) 2019
DOI: 10.1109/percomw.2019.8730675
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Trust Management Heuristic for VANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
24
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(25 citation statements)
references
References 18 publications
0
24
0
1
Order By: Relevance
“…Mahmood et al presented a novel combined trust model which relies on traditional clustering mechanism to evaluate trust on the network nodes [31]. In this trust model, CH is elected in the network based on the trust of the participating nodes and their available resources.…”
Section: Combined Trust Models (Ct)mentioning
confidence: 99%
“…Mahmood et al presented a novel combined trust model which relies on traditional clustering mechanism to evaluate trust on the network nodes [31]. In this trust model, CH is elected in the network based on the trust of the participating nodes and their available resources.…”
Section: Combined Trust Models (Ct)mentioning
confidence: 99%
“…Recently, Mahmood et al presented a novel combined trust model which relies on traditional clustering mechanism to evaluate trust of the network nodes [32]. In this trust model, cluster head (CH) is elected in the network based on the trust of the participating nodes and their available resources.…”
Section: Combined Trust Models (Ctm)mentioning
confidence: 99%
“…Mahmood et al [23] proposed a hybrid trust management scheme to identify malicious vehicles and to prevent them from being elected as the GH. Their scheme encompasses a composite metric (i.e., trust values assigned to the vehicles coupled with their resource availability) for GH and proxy GH selection via intermittent elections.…”
Section: Related Workmentioning
confidence: 99%
“…Some of them [16,17] were proposed to deal with a specific type of message while others [3,6,19] used decentralized trust systems, relying on interactions with neighbors, which is not practical in the highly dynamic environment of a VANET. Several works [4,10,15,23] tried to cope with a specific type of attack, which can be a limitation whereas several others were designed to handle a specific challenge such as authentication [24], privacy [20,25] or localization [18,22]. Therefore, unlike other solutions, we propose an adaptive trust-based security scheme for message exchange in VANETs based on VGA, our new clustering algorithm designed to handle the dynamicity such networks.…”
Section: Related Workmentioning
confidence: 99%