{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T03:28:25Z","timestamp":1776137305362,"version":"3.50.1"},"reference-count":27,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,2,1]],"date-time":"2017-02-01T00:00:00Z","timestamp":1485907200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61471035"],"award-info":[{"award-number":["61471035"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61601129"],"award-info":[{"award-number":["61601129"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["06105031"],"award-info":[{"award-number":["06105031"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1016\/j.adhoc.2016.10.011","type":"journal-article","created":{"date-parts":[[2016,10,25]],"date-time":"2016-10-25T14:30:49Z","timestamp":1477405849000},"page":"107-118","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":132,"special_numbering":"C","title":["Using trust model to ensure reliable data acquisition in VANETs"],"prefix":"10.1016","volume":"55","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1901-8388","authenticated-orcid":false,"given":"Xuanxia","family":"Yao","sequence":"first","affiliation":[]},{"given":"Xinlei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Huansheng","family":"Ning","sequence":"additional","affiliation":[]},{"given":"Pengjian","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.adhoc.2016.10.011_bib0001","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.jnca.2013.02.036","article-title":"A comprehensive survey on Vehicular Ad Hoc Network","volume":"37","author":"Al-Sultan","year":"2014","journal-title":"J. Netw. Comput Appl."},{"issue":"1","key":"10.1016\/j.adhoc.2016.10.011_bib0002","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3233\/JCS-2007-15103","article-title":"Securing Vehicular Ad Hoc Networks","volume":"15","author":"Raya","year":"2007","journal-title":"J. Comput. Secur."},{"issue":"12","key":"10.1016\/j.adhoc.2016.10.011_bib0003","doi-asserted-by":"crossref","first-page":"2883","DOI":"10.1016\/j.comcom.2008.01.009","article-title":"Providing VANET security through active position detection","volume":"31","author":"Yan","year":"2008","journal-title":"Comput. Commun."},{"issue":"4","key":"10.1016\/j.adhoc.2016.10.011_bib0004","first-page":"571","article-title":"A recommendation based peer-to-peer trust model[J].","volume":"15","author":"Dou","year":"2004","journal-title":"J. Software"},{"issue":"2","key":"10.1016\/j.adhoc.2016.10.011_bib0005","first-page":"189","article-title":"A robust model for trusted routing in VANETs","volume":"56","author":"He","year":"2010","journal-title":"J. Wuhan Univ."},{"issue":"6","key":"10.1016\/j.adhoc.2016.10.011_bib0006","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/j.comnet.2015.12.019","article-title":"A greedy model with small world for improving the robustness of heterogeneous Internet of things","volume":"101","author":"Qiu","year":"2016","journal-title":"Comput Netw."},{"key":"10.1016\/j.adhoc.2016.10.011_bib0007","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1186\/s13638-015-0353-y","article-title":"Trust management in vehicular ad hoc network: a systematic review","author":"Soleymani","year":"2015","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"issue":"11","key":"10.1016\/j.adhoc.2016.10.011_bib0008","doi-asserted-by":"crossref","first-page":"1652","DOI":"10.1002\/sec.862","article-title":"Intrusion-aware trust model for Vehicular Ad Hoc Networks","volume":"7","author":"Shaikh","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.adhoc.2016.10.011_bib0009","first-page":"1912","article-title":"On data-centric trust establishment in ephemeral Ad Hoc Networks","author":"Raya","year":"2008","journal-title":"IEEE INFOCOM."},{"issue":"1","key":"10.1016\/j.adhoc.2016.10.011_bib0010","doi-asserted-by":"crossref","first-page":"48","DOI":"10.4018\/jdst.2012010104","article-title":"Trust management for VANETs: challenges, desired properties and future directions","volume":"3","author":"Zhang","year":"2012","journal-title":"Int. J. Distrib. Syst. Technol."},{"key":"10.1016\/j.adhoc.2016.10.011_bib0011","doi-asserted-by":"crossref","unstructured":"J. Zhang, A survey on trust management for VANETs, 2011 International Conference on Advanced Information Networking and Applications.IEEE Computer Society, pp.105\u2013112.","DOI":"10.1109\/AINA.2011.86"},{"issue":"Oct (5)","key":"10.1016\/j.adhoc.2016.10.011_bib0012","first-page":"22","article-title":"Trusted GPSR protocol without reputation faking in VANET","volume":"22","author":"Xiao","year":"2015","journal-title":"J. China Univ. Posts Telecommun."},{"issue":"3","key":"10.1016\/j.adhoc.2016.10.011_bib0013","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s12083-012-0136-8","article-title":"A social network approach to trust management in VANETs","volume":"7","author":"Huang","year":"2014","journal-title":"Peer-to-Peer Netw."},{"issue":"3","key":"10.1016\/j.adhoc.2016.10.011_bib0014","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1016\/j.jnca.2011.03.028","article-title":"TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks","volume":"35","author":"M\u00e1rmol","year":"2012","journal-title":"J. Netw.Comput. Appl."},{"key":"10.1016\/j.adhoc.2016.10.011_bib0015","doi-asserted-by":"crossref","unstructured":"J. Finnson, J. Zhang, T. Tran, U.F. Minhas, R. Cohen, A framework for modeling trustworthiness of users in mobile Vehicular Ad-Hoc Networks and its validation through simulated traffic flow. UMAP 2012, LNCS 7379, pp.76\u201387.","DOI":"10.1007\/978-3-642-31454-4_7"},{"issue":"2","key":"10.1016\/j.adhoc.2016.10.011_bib0016","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1007\/s11704-014-4212-5","article-title":"A survey on trust based detection and isolation of malicious nodes in Ad-Hoc and Sensor Networks","volume":"9","author":"Ahmed","year":"2015","journal-title":"Front. Comput. Sci."},{"key":"10.1016\/j.adhoc.2016.10.011_bib0017","series-title":"The 7th International Conference On Communications, Networking and Mobile Computing (WiCOM). RATE: a RSU-aided scheme for data-centric trust establishment in VANETs","first-page":"1","author":"Wu","year":"2011"},{"issue":"2","key":"10.1016\/j.adhoc.2016.10.011_bib0018","first-page":"62","article-title":"A novel reputation management framework for Vehicular Ad Hoc Networks","volume":"3","author":"Ding","year":"2013","journal-title":"Int. J. Multimedia Technol."},{"key":"10.1016\/j.adhoc.2016.10.011_bib0019","series-title":"Network and System Security-7th International Conference, NSS 2013","first-page":"94","article-title":"Information-oriented trustworthiness evaluation in Vehicular Ad-Hoc Networks","author":"Gurung","year":"2013"},{"issue":"2","key":"10.1016\/j.adhoc.2016.10.011_bib0020","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/JCN.2013.000028","article-title":"A beacon-based trust management system for enhancing user centric location privacy in VANETs","volume":"15","author":"Chen","year":"2013","journal-title":"J Commun Netw."},{"key":"10.1016\/j.adhoc.2016.10.011_bib0021","series-title":"Reliability And Efficiency Improvement For Trust Management Model In VANETs","first-page":"105","article-title":"Human centric technology and service in smart space, HumanCom 2012","author":"Wei","year":"2012"},{"key":"10.1016\/j.adhoc.2016.10.011_bib0022","series-title":"Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science","first-page":"18","article-title":"A survey on trust management for intelligent transportation system","author":"Ma","year":"2011"},{"issue":"8","key":"10.1016\/j.adhoc.2016.10.011_bib0023","doi-asserted-by":"crossref","first-page":"1285","DOI":"10.1016\/j.micpro.2015.07.006","article-title":"STETS: a novel energy-efficient time synchronization scheme based on embedded networking devices","volume":"39","author":"Qiu","year":"2015","journal-title":"Microprocess. Microsyst."},{"key":"10.1016\/j.adhoc.2016.10.011_bib0024","series-title":"DIVANet\u201914","article-title":"A model for situation and threat\/impact assessment in Vehicular Ad-hoc Networks","author":"Golestan","year":"2014"},{"key":"10.1016\/j.adhoc.2016.10.011_bib0025","series-title":"Proceedings of the Sixth IEEE International Symposium on World of Wireless Mobile and Multimedia Networks","first-page":"454","article-title":"VARs: a vehicle Ad-Hoc Network reputation system [C].","author":"Dotzer","year":"2005"},{"issue":"8","key":"10.1016\/j.adhoc.2016.10.011_bib0026","first-page":"7408","article-title":"Trust based opportunistic routing protocol for VANET communication","volume":"3","author":"Pophali","year":"2014","journal-title":"Int. J. Eng. Comput. Sci."},{"issue":"4","key":"10.1016\/j.adhoc.2016.10.011_bib0027","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1007\/s11277-013-1270-1","article-title":"An efficient multi-path self-organizing strategy in Internet of things","volume":"73","author":"Qiu","year":"2013","journal-title":"Wirel. Pers. Commun."}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870516302943?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870516302943?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,11,3]],"date-time":"2019-11-03T06:48:48Z","timestamp":1572763728000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870516302943"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":27,"alternative-id":["S1570870516302943"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2016.10.011","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2017,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Using trust model to ensure reliable data acquisition in VANETs","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2016.10.011","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}