TY - STD TI - J Yin, T ElBatt, G Yeung, B Ryu, S Habermas, H Krishnan, T Talty, in Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks. Performance evaluation of safety applications over DSRC vehicular ad hoc networks (ACM,Philadelphia, PA, USA, 2004), pp. 1–9. ID - ref1 ER - TY - JOUR AU - Yan, G. AU - Olariu, S. AU - Weigle, M. C. PY - 2008 DA - 2008// TI - Providing VANET security through active position detection JO - Comput. Commun. VL - 31 UR - https://doi.org/10.1016/j.comcom.2008.01.009 DO - 10.1016/j.comcom.2008.01.009 ID - Yan2008 ER - TY - STD TI - Y-C Wei, Y-M Chen, in Information Security Applications,13th International Workshop, WISA 2012. Efficient self-organized trust management in location privacy enhanced VANETs (Springer,Jeju Island, Korea, 2012), pp. 328–344. ID - ref3 ER - TY - JOUR AU - Li, Q. AU - Malip, A. AU - Martin, K. M. AU - Ng, S. -. L. AU - Zhang, J. PY - 2012 DA - 2012// TI - A reputation-based announcement scheme for VANETs JO - IEEE Trans. Vehicular Technol. VL - 61 UR - https://doi.org/10.1109/TVT.2012.2209903 DO - 10.1109/TVT.2012.2209903 ID - Li2012 ER - TY - STD TI - F Dotzer, L Fischer, P Magiera, in Sixth IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks. VARS: a vehicle ad-hoc network reputation system (IEEE,Taormina, Giardini Naxos, 2005), pp. 454–456. ID - ref5 ER - TY - JOUR AU - Raya, M. AU - Hubaux, J. -. P. PY - 2007 DA - 2007// TI - Securing vehicular ad hoc networks JO - J. Comput. Secur. VL - 15 ID - Raya2007 ER - TY - STD TI - S Gurung, D Lin, A Squicciarini, E Bertino, in Network and System Security. Information-oriented trustworthiness evaluation in vehicular ad-hoc networks (Springer,2013), pp. 94–108. ID - ref7 ER - TY - JOUR AU - Rother, E. T. PY - 2007 DA - 2007// TI - Systematic literature review x narrative review JO - Acta Paulista de Enfermagem VL - 20 UR - https://doi.org/10.1590/S0103-21002007000200001 DO - 10.1590/S0103-21002007000200001 ID - Rother2007 ER - TY - STD TI - B Kitchenham, S Charters, Guidelines for performing systematic literature reviews in software engineering (2007). http://www.dur.ac.uk/ebse/resources/Systematic-reviews-5-8.pdf ID - ref9 ER - TY - JOUR AU - Kitchenham, B. PY - 2004 DA - 2004// TI - Procedures for performing systematic reviews JO - Keele, UK, Keele Univ. VL - 33 ID - Kitchenham2004 ER - TY - JOUR AU - Bakshi, A. AU - Talaei-Khoei, A. AU - Ray, P. PY - 2013 DA - 2013// TI - Adaptive policy framework: a systematic review JO - J. Netw. Comput. Appl. VL - 36 UR - https://doi.org/10.1016/j.jnca.2012.12.007 DO - 10.1016/j.jnca.2012.12.007 ID - Bakshi2013 ER - TY - JOUR AU - Chai, J. AU - Liu, J. N. AU - Ngai, E. W. PY - 2013 DA - 2013// TI - Application of decision-making techniques in supplier selection: a systematic review of literature JO - Expert Syst. Appl. VL - 40 UR - https://doi.org/10.1016/j.eswa.2012.12.040 DO - 10.1016/j.eswa.2012.12.040 ID - Chai2013 ER - TY - STD TI - D Gambetta, Can we trust trust. Trust: making and breaking cooperative relations. Department of Sociology, University of Oxford, chapter 13, 213–237 (2000). ID - ref13 ER - TY - STD TI - M Gerlach, in Eighth International Symposium on Autonomous Decentralized Systems, ISADS’07. Trust for vehicular applications (IEEE,Washington, DC, USA, 2007), pp. 295–304. ID - ref14 ER - TY - JOUR AU - Luo, J. AU - Liu, X. AU - Fan, M. PY - 2009 DA - 2009// TI - A trust model based on fuzzy recommendation for mobile ad-hoc networks JO - Comput. Netw. VL - 53 UR - https://doi.org/10.1016/j.comnet.2009.04.008 DO - 10.1016/j.comnet.2009.04.008 ID - Luo2009 ER - TY - STD TI - S Mandala, AH Abdullah, AS Ismail, H Haron, M Ngadi, Y Coulibaly, et al, in 3rd International Conference On Instrumentation, Communications, Information Technology, and Biomedical Engineering (ICICI-BME). A review of blackhole attack in mobile adhoc network (IEEE,TB Bandung, Indonesia, 2013), pp. 339–344. ID - ref16 ER - TY - STD TI - S Mandala, K Jenni, MA Ngadi, M Kamat, Y Coulibaly, in Second International Symposium, SSCC 2014. Quantifying the severity of blackhole attack in wireless mobile adhoc networks (Springer,Delhi, India, 2014), pp. 57–67. ID - ref17 ER - TY - STD TI - Y Sun, W Yu, Z Han, KR Liu, in IEEE Global Telecommunications Conference,GLOBECOM’05, 3. Trust modeling and evaluation in ad hoc networks (IEEE,St. Louis, Missouri, 2005), p. 6. ID - ref18 ER - TY - STD TI - YL Sun, Y Yang, in IEEE International Conference On Communications, ICC’07. Trust establishment in distributed networks: analysis and modeling (IEEE,Glasgow, Scotland, UK, 2007), pp. 1266–1273. ID - ref19 ER - TY - STD TI - M Monir, A Abdel-Hamid, MA El Aziz, in First International Conference, SecNet 2013. A categorized trust-based message reporting scheme for vanets (SpringerCairo, Egypt, 2013), pp. 65–83. ID - ref20 ER - TY - STD TI - J Wang, Y Liu, X Liu, J Zhang, in IEEE Intelligent Vehicles Symposium. A trust propagation scheme in VANETs (IEEE,Xi’an, China, 2009), pp. 1067–1071. ID - ref21 ER - TY - JOUR AU - Gómez Mármol, F. AU - Martínez Pérez, G. PY - 2012 DA - 2012// TI - TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks JO - J. Netw. Comput. Appl. VL - 35 UR - https://doi.org/10.1016/j.jnca.2011.03.028 DO - 10.1016/j.jnca.2011.03.028 ID - Gómez Mármol2012 ER - TY - STD TI - X Li, J Liu, X Li, W Sun, in 5th International Conference On Intelligent Networking and Collaborative Systems (INCoS). RGTE: a reputation-based global trust establishment in VANETs (IEEE,Xi‘an, China, 2013), pp. 210–214. ID - ref23 ER - TY - STD TI - N Bißmeyer, J Njeukam, J Petit, KM Bayarou, in Proceedings of the Ninth ACM International Workshop on Vehicular Inter-networking, Systems, and Applications. Central misbehavior evaluation for VANETs based on mobility data plausibility (ACMUK, 2012), pp. 73–82. ID - ref24 ER - TY - STD TI - P Wex, J Breuer, A Held, T Leinmuller, L Delgrossi, in IEEE Vehicular Technology Conference. Trust issues for vehicular ad hoc networks (IEEE,Calgary, AB, Canada, 2008), pp. 2800–2804. ID - ref25 ER - TY - STD TI - X Hong, D Huang, M Gerla, Z Cao, in Proceedings of the 3rd International Workshop on Mobility in the Evolving Internet Architecture. SAT: situation-aware trust architecture for vehicular networks (ACMSeattle, WA, USA, 2008), pp. 31–36. ID - ref26 ER - TY - JOUR AU - Huang, Z. AU - Ruj, S. AU - Cavenaghi, M. A. AU - Stojmenovic, M. AU - Nayak, A. PY - 2014 DA - 2014// TI - A social network approach to trust management in VANETs JO - Peer-to-Peer Netw. Appl. VL - 7 UR - https://doi.org/10.1007/s12083-012-0136-8 DO - 10.1007/s12083-012-0136-8 ID - Huang2014 ER - TY - JOUR AU - Zhang, J. PY - 2012 DA - 2012// TI - Trust management for VANETs: challenges, desired properties and future directions JO - Int. J. Distributed Syst. Technol. (IJDST). VL - 3 UR - https://doi.org/10.4018/jdst.2012010104 DO - 10.4018/jdst.2012010104 ID - Zhang2012 ER - TY - STD TI - J Grover, MS Gaur, V Laxmi, in Wireless Networks and Security. Trust establishment techniques in VANET (Springer, 2013), pp. 273–301. ID - ref29 ER - TY - JOUR AU - Minhas, U. F. AU - Zhang, J. AU - Tran, T. AU - Cohen, R. PY - 2011 DA - 2011// TI - A multifaceted approach to modeling agent trust for effective communication in the application of mobile ad hoc vehicular networks JO - IEEE Trans. Syst. Man Cybern. C Appl. Rev. VL - 41 UR - https://doi.org/10.1109/TSMCC.2010.2084571 DO - 10.1109/TSMCC.2010.2084571 ID - Minhas2011 ER - TY - STD TI - M Raya, P Papadimitratos, VD Gligor, J-P Hubaux, in The 27th Conference on Computer Communications, INFOCOM 2008. On data-centric trust establishment in ephemeral ad hoc networks (IEEE,Phoenix, AZ, USA, 2008). ID - ref31 ER - TY - STD TI - RA Shaikh, AS Alzahrani, Intrusion-aware trust model for vehicular ad hoc networks. Secur. Commun. Netw. (2013). ID - ref32 ER - TY - STD TI - Q Ding, X Li, M Jiang, X Zhou, in International Conference On Wireless Communications and Signal Processing (WCSP). Reputation-based trust model in vehicular ad hoc networks (IEEE,Suzhou, China, 2010), pp. 1–6. ID - ref33 ER - TY - JOUR AU - Lo, N. -. W. AU - Tsai, H. -. C. PY - 2009 DA - 2009// TI - A reputation system for traffic safety event on vehicular ad hoc networks JO - EURASIP J. Wireless Commun. Netw. VL - 2009 UR - https://doi.org/10.1155/2009/125348 DO - 10.1155/2009/125348 ID - Lo2009 ER - TY - STD TI - A Wu, J Ma, S Zhang, in 7th International Conference On Communications, Networking and Mobile Computing (WiCOM). RATE: a RSU-aided scheme for data-centric trust establishment in VANETs (IEEE,Wuhan, China, 2011), pp. 1–6. ID - ref35 ER - TY - JOUR AU - Chen, Y. -. M. AU - Wei, Y. -. C. PY - 2013 DA - 2013// TI - A beacon-based trust management system for enhancing user centric location privacy in VANETs JO - J Commun. Netw. VL - 15 UR - https://doi.org/10.1109/JCN.2013.000028 DO - 10.1109/JCN.2013.000028 ID - Chen2013 ER - TY - STD TI - Y-C Wei, Y-M Chen, in Human Centric Technology and Service in Smart Space, HumanCom 2012. Reliability and efficiency improvement for trust management model in VANETs (Springer,2012), pp. 105–112. ID - ref37 ER - TY - STD TI - S Ma, O Wolfson, J Lin, in Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science. A survey on trust management for intelligent transportation system (ACMChicago, IL, USA, 2011), pp. 18–23. ID - ref38 ER - TY - JOUR AU - Kosch, T. AU - Adler, C. J. AU - Eichler, S. AU - Schroth, C. AU - Strassberger, M. PY - 2006 DA - 2006// TI - The scalability problem of vehicular ad hoc networks and how to solve it JO - IEEE Wireless Commun. VL - 13 UR - https://doi.org/10.1109/WC-M.2006.250354 DO - 10.1109/WC-M.2006.250354 ID - Kosch2006 ER - TY - STD TI - S Goudarzi, AH Abdullah, S Mandala, SA Soleymani, MAR Baee, MH Anisi, MS Aliyu, in the 2nd Symposium on Wireless Sensors and Cellular Networks WSCN’13). A systematic review of security in vehicular ad hoc network (Jeddah, Saudi Arabia, 2013), pp. 1–10. ID - ref40 ER - TY - STD TI - EJ Chang, FK Hussain, TS Dillon, in Proceedings of the 2005 Workshop on Secure Web Services. Fuzzy nature of trust and dynamic trust modeling in service oriented environments (ACM,Alexandria, VA, USA, 2005), pp. 75–83. ID - ref41 ER - TY - JOUR AU - Tajeddine, A. AU - Kayssi, A. AU - Chehab, A. AU - Artail, H. PY - 2011 DA - 2011// TI - Fuzzy reputation-based trust model JO - Appl. Soft Comput. VL - 11 UR - https://doi.org/10.1016/j.asoc.2009.11.025 DO - 10.1016/j.asoc.2009.11.025 ID - Tajeddine2011 ER - TY - STD TI - N-W Lo, H-C Tsai, in IEEE Globecom Workshops. Illusion attack on VANET applications - a message plausibility problem (IEEE,Washington, DC, USA, 2007), pp. 1–8. ID - ref43 ER - TY - JOUR AU - Buttyán, L. AU - Hubaux, J. -. P. PY - 2003 DA - 2003// TI - Stimulating cooperation in self-organizing mobile ad hoc networks JO - Mobile Netw. Appl. VL - 8 UR - https://doi.org/10.1023/A:1025146013151 DO - 10.1023/A:1025146013151 ID - Buttyán2003 ER - TY - STD TI - N Bißmeyer, C Stresing, KM Bayarou, in Second IEEE Vehicular Networking Conference(VNC). Intrusion detection in VANETs through verification of vehicle movement data (IEEE,Jersey City, New Jersey, USA, 2010), pp. 166–173. ID - ref45 ER - TY - STD TI - N Bißmeyer, S Mauthofer, B Kpatcha, F Kargl, Assessment of node trustworthiness in VANETs using data plausibility checks with particle filters (IEEE, Seoul, Korea, 2012). ID - ref46 ER - TY - JOUR AU - Avizienis, A. AU - Laprie, J. -. C. AU - Randell, B. AU - Landwehr, C. PY - 2004 DA - 2004// TI - Basic concepts and taxonomy of dependable and secure computing JO - IEEE Trans. Dependable Secure Comput. VL - 1 UR - https://doi.org/10.1109/TDSC.2004.2 DO - 10.1109/TDSC.2004.2 ID - Avizienis2004 ER - TY - STD TI - O Abumansoor, A Boukerche, in IEEE Global Telecommunications Conference (GLOBECOM). Towards a secure trust model for vehicular ad hoc networks services (IEEE,Houston, Texas, USA, 2011), pp. 1–5. ID - ref48 ER -