{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,14]],"date-time":"2026-04-14T15:46:58Z","timestamp":1776181618756,"version":"3.50.1"},"reference-count":47,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Information Security and Applications"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1016\/j.jisa.2024.103699","type":"journal-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T13:02:34Z","timestamp":1704805354000},"page":"103699","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks"],"prefix":"10.1016","volume":"81","author":[{"given":"Jianxiang","family":"Qi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ning","family":"Zheng","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9332-5258","authenticated-orcid":false,"given":"Ming","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ping","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wenqiang","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/j.jisa.2024.103699_b1","doi-asserted-by":"crossref","first-page":"2377","DOI":"10.1109\/COMST.2015.2440103","article-title":"Heterogeneous vehicular networking: A survey on architecture, challenges, and solutions","volume":"17","author":"Zheng","year":"2015","journal-title":"IEEE Commun Surv Tutor"},{"issue":"3","key":"10.1016\/j.jisa.2024.103699_b2","doi-asserted-by":"crossref","first-page":"1575","DOI":"10.1109\/JIOT.2017.2788848","article-title":"Driver\u2019s intention identification and risk evaluation at intersections in the internet of vehicles","volume":"5","author":"Chen","year":"2018","journal-title":"IEEE Internet Things J"},{"issue":"2","key":"10.1016\/j.jisa.2024.103699_b3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2817552","article-title":"How close are we to realizing a pragmatic VANET solution? A meta-survey","volume":"48","author":"Saini","year":"2015","journal-title":"ACM Comput Surv"},{"issue":"7","key":"10.1016\/j.jisa.2024.103699_b4","doi-asserted-by":"crossref","first-page":"1490","DOI":"10.1109\/TMC.2014.2359664","article-title":"ROFF: Robust and fast forwarding in vehicular ad-hoc networks","volume":"14","author":"Yoo","year":"2014","journal-title":"IEEE Trans Mob Comput"},{"issue":"2","key":"10.1016\/j.jisa.2024.103699_b5","doi-asserted-by":"crossref","first-page":"1218","DOI":"10.1109\/JIOT.2018.2791627","article-title":"A distributed position-based protocol for emergency messages broadcasting in vehicular ad hoc networks","volume":"5","author":"Tian","year":"2018","journal-title":"IEEE Internet Things J"},{"issue":"4","key":"10.1016\/j.jisa.2024.103699_b6","doi-asserted-by":"crossref","first-page":"3586","DOI":"10.1109\/TVT.2017.2780829","article-title":"SS-MAC: A novel time slot-sharing MAC for safety messages broadcasting in VANETs","volume":"67","author":"Lyu","year":"2017","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"10.1016\/j.jisa.2024.103699_b7","doi-asserted-by":"crossref","first-page":"280","DOI":"10.1109\/COMST.2021.3139052","article-title":"Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions","volume":"24","author":"Li","year":"2021","journal-title":"IEEE Commun Surv Tutor"},{"issue":"1","key":"10.1016\/j.jisa.2024.103699_b8","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MNET.2010.5395779","article-title":"Broadcasting safety information in vehicular networks: issues and approaches","volume":"24","author":"Chen","year":"2010","journal-title":"IEEE Netw"},{"issue":"10","key":"10.1016\/j.jisa.2024.103699_b9","doi-asserted-by":"crossref","first-page":"11189","DOI":"10.1109\/TVT.2022.3189540","article-title":"Hybrid and hierarchical aggregation-verification scheme for VANET","volume":"71","author":"Zhang","year":"2022","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.jisa.2024.103699_b10","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2020.100350","article-title":"A scalable and distributed architecture for secure and privacy-preserving authentication and message dissemination in VANETs","volume":"13","author":"Moni","year":"2021","journal-title":"Internet Things"},{"key":"10.1016\/j.jisa.2024.103699_b11","article-title":"Trusting computing as a service for blockchain applications","author":"Li","year":"2023","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.jisa.2024.103699_b12","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2022.102961","article-title":"Hybrid optimization enabled trust-based secure routing with deep learning-based attack detection in VANET","volume":"136","author":"Kaur","year":"2022","journal-title":"Ad Hoc Netw"},{"key":"10.1016\/j.jisa.2024.103699_b13","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2022.103071","article-title":"A blockchain-based reputation system for trusted VANET nodes","volume":"140","author":"Fernandes","year":"2023","journal-title":"Ad Hoc Netw"},{"issue":"8","key":"10.1016\/j.jisa.2024.103699_b14","doi-asserted-by":"crossref","first-page":"1613","DOI":"10.1109\/LWC.2021.3070630","article-title":"A malicious node detection strategy based on fuzzy trust model and the abc algorithm in wireless sensor network","volume":"10","author":"Pang","year":"2021","journal-title":"IEEE Wirel Commun Lett"},{"issue":"4","key":"10.1016\/j.jisa.2024.103699_b15","doi-asserted-by":"crossref","first-page":"1564","DOI":"10.1007\/s11036-019-01492-4","article-title":"A novel algorithm for improving malicious node detection effect in wireless sensor networks","volume":"26","author":"Yang","year":"2021","journal-title":"Mob Netw Appl"},{"key":"10.1016\/j.jisa.2024.103699_b16","series-title":"2021 IEEE 20th international conference on trust, security and privacy in computing and communications (TrustCom)","first-page":"122","article-title":"Enhancing trust-based medical smartphone networks via blockchain-based traffic sampling","author":"Li","year":"2021"},{"key":"10.1016\/j.jisa.2024.103699_b17","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.107952","article-title":"An adaptive trust model based on recommendation filtering algorithm for the internet of things systems","volume":"190","author":"Chen","year":"2021","journal-title":"Comput Netw"},{"key":"10.1016\/j.jisa.2024.103699_b18","doi-asserted-by":"crossref","DOI":"10.1109\/JIOT.2022.3181610","article-title":"TACAS-IoT: Trust aggregation certificate-based authentication scheme for edge enabled IoT systems","author":"Wazid","year":"2022","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"10.1016\/j.jisa.2024.103699_b19","first-page":"1771","article-title":"Review of effective trust management systems in VANET environments","volume":"14","author":"Deshpande","year":"2021","journal-title":"Int J Grid Distrib Comput"},{"issue":"5","key":"10.1016\/j.jisa.2024.103699_b20","doi-asserted-by":"crossref","first-page":"3157","DOI":"10.1109\/JIOT.2020.3044296","article-title":"AIT: An AI-enabled trust management system for vehicular networks using blockchain technology","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"10.1016\/j.jisa.2024.103699_b21","first-page":"304","article-title":"An optimized deep learning-based trust mechanism in VANET for selfish node detection","volume":"18","author":"Jyothi","year":"2021","journal-title":"Int J Pervasive Comput Commun"},{"key":"10.1016\/j.jisa.2024.103699_b22","article-title":"A trust management framework using forest fire model to propagate emergency messages in the internet of vehicles (IoV)","volume":"33","author":"Fabi","year":"2022","journal-title":"Veh Commun"},{"key":"10.1016\/j.jisa.2024.103699_b23","doi-asserted-by":"crossref","DOI":"10.1145\/3514243","article-title":"CARES: Context-aware trust estimation system for realtime crowdsensing services in vehicular edge networks","author":"Jang","year":"2022","journal-title":"ACM Trans Internet Technol (TOIT)"},{"issue":"11","key":"10.1016\/j.jisa.2024.103699_b24","doi-asserted-by":"crossref","first-page":"20084","DOI":"10.1109\/TITS.2022.3187788","article-title":"A novel multifaceted trust management framework for vehicular networks","volume":"23","author":"El-Sayed","year":"2022","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"10.1016\/j.jisa.2024.103699_b25","doi-asserted-by":"crossref","first-page":"16504","DOI":"10.1109\/TITS.2021.3129458","article-title":"A hybrid approach to trust node assessment and management for vanets cooperative data communication: Historical interaction perspective","volume":"23","author":"Gao","year":"2021","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10.1016\/j.jisa.2024.103699_b26","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2022.103062","article-title":"TGRV: A trust-based geographic routing protocol for VANETs","volume":"140","author":"Shokrollahi","year":"2023","journal-title":"Ad Hoc Netw"},{"issue":"1","key":"10.1016\/j.jisa.2024.103699_b27","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1109\/TITS.2018.2889746","article-title":"A topological approach to secure message dissemination in vehicular networks","volume":"21","author":"Chen","year":"2019","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"9","key":"10.1016\/j.jisa.2024.103699_b28","doi-asserted-by":"crossref","first-page":"9244","DOI":"10.1109\/TVT.2021.3049189","article-title":"NOTRINO: a novel hybrid trust management scheme for internet-of-vehicles","volume":"70","author":"Ahmad","year":"2021","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.jisa.2024.103699_b29","doi-asserted-by":"crossref","DOI":"10.1109\/TITS.2021.3136548","article-title":"DUEL: Dempster uncertainty-based enhanced-trust level scheme for VANET","author":"Bhargava","year":"2022","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10.1016\/j.jisa.2024.103699_b30","article-title":"Filtering malicious messages by trust-aware cognitive routing in vehicular ad hoc networks","author":"Mirzadeh","year":"2022","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"5","key":"10.1016\/j.jisa.2024.103699_b31","doi-asserted-by":"crossref","first-page":"3311","DOI":"10.1109\/TII.2019.2950192","article-title":"TrustData: Trustworthy and secured data collection for event detection in industrial cyber-physical system","volume":"16","author":"Tao","year":"2019","journal-title":"IEEE Trans Ind Inf"},{"issue":"5","key":"10.1016\/j.jisa.2024.103699_b32","doi-asserted-by":"crossref","first-page":"3901","DOI":"10.1109\/JIOT.2019.2951620","article-title":"Vcash: a novel reputation framework for identifying denial of traffic service in internet of connected vehicles","volume":"7","author":"Tian","year":"2019","journal-title":"IEEE Internet Things J"},{"key":"10.1016\/j.jisa.2024.103699_b33","article-title":"A three-factor based trust model for anonymous bacon message in VANETs","author":"Zhang","year":"2023","journal-title":"IEEE Trans Veh Technol"},{"key":"10.1016\/j.jisa.2024.103699_b34","article-title":"A dynamic trust management model for vehicular ad hoc networks","volume":"41","author":"Aslan","year":"2023","journal-title":"Veh Commun"},{"issue":"1","key":"10.1016\/j.jisa.2024.103699_b35","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/TDSC.2015.2449845","article-title":"Random transmit power control for DSRC and its application to cooperative safety","volume":"13","author":"Kloiber","year":"2015","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"10.1016\/j.jisa.2024.103699_b36","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1007\/s13198-019-00871-0","article-title":"A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS)","volume":"11","author":"Tripathi","year":"2020","journal-title":"Int J Syst Assur Eng Manag"},{"key":"10.1016\/j.jisa.2024.103699_b37","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100510","article-title":"LAMD: Location-based alert message dissemination scheme for emerging infrastructure-based vehicular networks","volume":"19","author":"Chakroun","year":"2022","journal-title":"Internet Things"},{"key":"10.1016\/j.jisa.2024.103699_b38","doi-asserted-by":"crossref","DOI":"10.1016\/j.adhoc.2023.103095","article-title":"BEMD: Beacon-oriented emergency message dissemination scheme for highways","author":"Bilal","year":"2023","journal-title":"Ad Hoc Netw"},{"issue":"9","key":"10.1016\/j.jisa.2024.103699_b39","doi-asserted-by":"crossref","first-page":"3280","DOI":"10.1109\/TMC.2021.3056712","article-title":"Proven secure tree-based authenticated key agreement for securing V2V and V2I communications in VANETs","volume":"21","author":"Wei","year":"2021","journal-title":"IEEE Trans Mob Comput"},{"key":"10.1016\/j.jisa.2024.103699_b40","doi-asserted-by":"crossref","DOI":"10.1016\/j.iot.2022.100605","article-title":"CREASE: Certificateless and reused-pseudonym based authentication scheme for enabling security and privacy in VANETs","volume":"20","author":"Moni","year":"2022","journal-title":"Internet Things"},{"key":"10.1016\/j.jisa.2024.103699_b41","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108558","article-title":"A survey of trust management in the internet of vehicles","volume":"203","author":"Hbaieb","year":"2022","journal-title":"Comput Netw"},{"key":"10.1016\/j.jisa.2024.103699_b42","doi-asserted-by":"crossref","unstructured":"Abdelmaguid Mohammed A, Hassanein Hossam S, Zulkernine Mohammad. SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET. In: Proceedings of the 17th international conference on availability, reliability and security. 2022, p. 1\u201310.","DOI":"10.1145\/3538969.3543788"},{"issue":"4","key":"10.1016\/j.jisa.2024.103699_b43","doi-asserted-by":"crossref","first-page":"3310","DOI":"10.1109\/JIOT.2020.2967568","article-title":"MARINE: Man-in-the-middle attack resistant trust model in connected vehicles","volume":"7","author":"Ahmad","year":"2020","journal-title":"IEEE Internet Things J"},{"issue":"12","key":"10.1016\/j.jisa.2024.103699_b44","doi-asserted-by":"crossref","first-page":"23906","DOI":"10.1109\/TITS.2022.3190432","article-title":"LSTM-based intrusion detection system for VANETs: a time series classification approach to false message detection","volume":"23","author":"Yu","year":"2022","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"5","key":"10.1016\/j.jisa.2024.103699_b45","doi-asserted-by":"crossref","first-page":"1897","DOI":"10.3390\/s22051897","article-title":"An efficient dynamic solution for the detection and prevention of black hole attack in vanets","volume":"22","author":"Malik","year":"2022","journal-title":"Sensors"},{"issue":"8","key":"10.1016\/j.jisa.2024.103699_b46","doi-asserted-by":"crossref","first-page":"12766","DOI":"10.1109\/TITS.2021.3117289","article-title":"HDRS: A hybrid reputation system with dynamic update interval for detecting malicious vehicles in VANETs","volume":"23","author":"Liu","year":"2021","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"10.1016\/j.jisa.2024.103699_b47","series-title":"The second international conference on availability, reliability and security (ARES\u201907)","first-page":"422","article-title":"Enhancing the security of local dangerwarnings in vanets-a simulative analysis of voting schemes","author":"Ostermaier","year":"2007"}],"container-title":["Journal of Information Security and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212624000024?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2214212624000024?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T11:48:16Z","timestamp":1773834496000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2214212624000024"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":47,"alternative-id":["S2214212624000024"],"URL":"https:\/\/doi.org\/10.1016\/j.jisa.2024.103699","relation":{},"ISSN":["2214-2126"],"issn-type":[{"value":"2214-2126","type":"print"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A hybrid-trust-based emergency message dissemination model for vehicular ad hoc networks","name":"articletitle","label":"Article Title"},{"value":"Journal of Information Security and Applications","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jisa.2024.103699","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103699"}}