Fig. 1From: A survey of local/cooperative-based malicious information detection techniques in VANETsVANET architectureBack to article page