Fig. 3From: A survey of local/cooperative-based malicious information detection techniques in VANETsMalicious information detection schemes in VANETsBack to article page