{"id":"https://openalex.org/W3000193443","doi":"https://doi.org/10.1109/jiot.2020.2967568","title":"MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles","display_name":"MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles","publication_year":2020,"publication_date":"2020-01-17","ids":{"openalex":"https://openalex.org/W3000193443","doi":"https://doi.org/10.1109/jiot.2020.2967568","mag":"3000193443"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.2967568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2967568","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://hdl.handle.net/10545/624408","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018618593","display_name":"Farhan Ahmad","orcid":"https://orcid.org/0000-0002-1988-0971"},"institutions":[{"id":"https://openalex.org/I22128151","display_name":"University of Derby","ror":"https://ror.org/02yhrrk59","country_code":"GB","type":"education","lineage":["https://openalex.org/I22128151"]},{"id":"https://openalex.org/I4210123711","display_name":"Derby College","ror":"https://ror.org/02q4zda14","country_code":"GB","type":"education","lineage":["https://openalex.org/I4210123711"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Farhan Ahmad","raw_affiliation_strings":["Cyber Security Research Group, College of Engineering and Technology, University of Derby, Derby, U.K"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Group, College of Engineering and Technology, University of Derby, Derby, U.K","institution_ids":["https://openalex.org/I22128151","https://openalex.org/I4210123711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085690468","display_name":"Fatih Kurug\u00f6ll\u00fc","orcid":"https://orcid.org/0000-0002-2508-4496"},"institutions":[{"id":"https://openalex.org/I22128151","display_name":"University of Derby","ror":"https://ror.org/02yhrrk59","country_code":"GB","type":"education","lineage":["https://openalex.org/I22128151"]},{"id":"https://openalex.org/I4210123711","display_name":"Derby College","ror":"https://ror.org/02q4zda14","country_code":"GB","type":"education","lineage":["https://openalex.org/I4210123711"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Fatih Kurugollu","raw_affiliation_strings":["Cyber Security Research Group, College of Engineering and Technology, University of Derby, Derby, U.K"],"affiliations":[{"raw_affiliation_string":"Cyber Security Research Group, College of Engineering and Technology, University of Derby, Derby, U.K","institution_ids":["https://openalex.org/I22128151","https://openalex.org/I4210123711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010632419","display_name":"Asma Adnane","orcid":"https://orcid.org/0000-0001-6659-9245"},"institutions":[{"id":"https://openalex.org/I143804889","display_name":"Loughborough University","ror":"https://ror.org/04vg4w365","country_code":"GB","type":"education","lineage":["https://openalex.org/I143804889"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Asma Adnane","raw_affiliation_strings":["Networks and System Research, Loughborough University, Loughborough, U.K"],"affiliations":[{"raw_affiliation_string":"Networks and System Research, Loughborough University, Loughborough, U.K","institution_ids":["https://openalex.org/I143804889"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090705977","display_name":"Rasheed Hussain","orcid":"https://orcid.org/0000-0002-3771-7537"},"institutions":[{"id":"https://openalex.org/I4210116741","display_name":"Innopolis University","ror":"https://ror.org/02b7jh107","country_code":"RU","type":"education","lineage":["https://openalex.org/I4210116741"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Rasheed Hussain","raw_affiliation_strings":["Networks and Blockchain Lab, Institute of Information Security and Cyber-Physical Systems, Innopolis University, Innopolis, Russia"],"affiliations":[{"raw_affiliation_string":"Networks and Blockchain Lab, Institute of Information Security and Cyber-Physical Systems, Innopolis University, Innopolis, Russia","institution_ids":["https://openalex.org/I4210116741"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044266495","display_name":"Fatima Hussain","orcid":"https://orcid.org/0000-0002-6306-9772"},"institutions":[{"id":"https://openalex.org/I125133608","display_name":"Royal Bank of Canada","ror":"https://ror.org/03hgnwx26","country_code":"CA","type":"other","lineage":["https://openalex.org/I125133608"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Fatima Hussain","raw_affiliation_strings":["API Delivery and Operations, Royal Bank of Canada, Toronto, Canada"],"affiliations":[{"raw_affiliation_string":"API Delivery and Operations, Royal Bank of Canada, Toronto, Canada","institution_ids":["https://openalex.org/I125133608"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5018618593"],"corresponding_institution_ids":["https://openalex.org/I22128151","https://openalex.org/I4210123711"],"apc_list":null,"apc_paid":null,"fwci":10.3981,"has_fulltext":false,"cited_by_count":155,"citation_normalized_percentile":{"value":0.98841242,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"7","issue":"4","first_page":"3310","last_page":"3322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":1.0,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9919000267982483,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9807000160217285,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.9196745753288269},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.8462815284729004},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8178211450576782},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7387772798538208},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.6026586890220642},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.5353034138679504},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5238837599754333},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4980158805847168},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.17087167501449585},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.15308690071105957},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.09238183498382568},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.0771036446094513}],"concepts":[{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.9196745753288269},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.8462815284729004},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8178211450576782},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7387772798538208},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.6026586890220642},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.5353034138679504},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5238837599754333},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4980158805847168},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.17087167501449585},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.15308690071105957},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.09238183498382568},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0771036446094513},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/jiot.2020.2967568","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2967568","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:research-information.bris.ac.uk:openaire_cris_publications/08da2532-c855-4c44-b076-398c2246cac6","is_oa":false,"landing_page_url":"https://research-information.bris.ac.uk/en/publications/08da2532-c855-4c44-b076-398c2246cac6","pdf_url":null,"source":{"id":"https://openalex.org/S4306400895","display_name":"Bristol Research (University of Bristol)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I36234482","host_organization_name":"University of Bristol","host_organization_lineage":["https://openalex.org/I36234482"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ahmad, F, Kurugollu, F, Adnane, A, Hussain, R & Hussain, F 2020, 'MARINE : Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles', IEEE Internet of Things Journal, vol. 7, no. 4, 8962285, pp. 3310-3322. https://doi.org/10.1109/JIOT.2020.2967568","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:derby.openrepository.com:10545/624408","is_oa":true,"landing_page_url":"http://hdl.handle.net/10545/624408","pdf_url":null,"source":{"id":"https://openalex.org/S4306402138","display_name":"University of Derby Online Research Archive. (University of Derby)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I22128151","host_organization_name":"University of Derby","host_organization_lineage":["https://openalex.org/I22128151"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:figshare.com:article/19213305","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/MARINE_man-in-the-middle_attack_resistant_trust_model_in_connected_vehicles/19213305","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:derby.openrepository.com:10545/624408","is_oa":true,"landing_page_url":"http://hdl.handle.net/10545/624408","pdf_url":null,"source":{"id":"https://openalex.org/S4306402138","display_name":"University of Derby Online Research Archive. (University of Derby)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I22128151","host_organization_name":"University of Derby","host_organization_lineage":["https://openalex.org/I22128151"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/14","score":0.8299999833106995,"display_name":"Life below water"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":45,"referenced_works":["https://openalex.org/W1526820147","https://openalex.org/W1967618071","https://openalex.org/W1978231569","https://openalex.org/W1985937836","https://openalex.org/W1989327382","https://openalex.org/W1995064428","https://openalex.org/W2031795630","https://openalex.org/W2047989528","https://openalex.org/W2048294994","https://openalex.org/W2070268576","https://openalex.org/W2100975384","https://openalex.org/W2103165057","https://openalex.org/W2114902045","https://openalex.org/W2126601274","https://openalex.org/W2132536388","https://openalex.org/W2152955640","https://openalex.org/W2154612449","https://openalex.org/W2157766189","https://openalex.org/W2203670367","https://openalex.org/W2208438930","https://openalex.org/W2295127943","https://openalex.org/W2305409997","https://openalex.org/W2405294165","https://openalex.org/W2490051280","https://openalex.org/W2565449908","https://openalex.org/W2580195172","https://openalex.org/W2595545394","https://openalex.org/W2599961404","https://openalex.org/W2735576826","https://openalex.org/W2770988671","https://openalex.org/W2794723998","https://openalex.org/W2799867512","https://openalex.org/W2804841426","https://openalex.org/W2885864854","https://openalex.org/W2888894393","https://openalex.org/W2899767908","https://openalex.org/W2900703231","https://openalex.org/W2909842700","https://openalex.org/W2926294591","https://openalex.org/W2937019946","https://openalex.org/W2952159320","https://openalex.org/W2952548325","https://openalex.org/W2956139143","https://openalex.org/W6644800264","https://openalex.org/W6696961757"],"related_works":["https://openalex.org/W2027636740","https://openalex.org/W2062688728","https://openalex.org/W2061231656","https://openalex.org/W2771454953","https://openalex.org/W4231650586","https://openalex.org/W3046762796","https://openalex.org/W3202102306","https://openalex.org/W4327774248","https://openalex.org/W2998294818","https://openalex.org/W2384544638"],"abstract_inverted_index":{"Vehicular":[0],"ad":[1],"hoc":[2],"network":[3,67,200],"(VANET),":[4],"a":[5,9,39,103,199],"novel":[6,104],"technology,":[7],"holds":[8],"paramount":[10],"importance":[11],"within":[12,95],"the":[13,36,62,66,96,143,151,154,157,159,176,189,208],"transportation":[14],"domain":[15],"due":[16],"to":[17,20,55,174],"its":[18],"abilities":[19],"increase":[21,80],"traffic":[22],"efficiency":[23],"and":[24,57,88,92,167,178,188,215,221],"safety.":[25],"Connected":[26],"vehicles":[27,78,115],"propagate":[28,89],"sensitive":[29],"information":[30],"which":[31,117],"must":[32],"be":[33],"shared":[34],"with":[35,61,68],"neighbors":[37],"in":[38,113,124,218],"secure":[40],"environment.":[41],"However,":[42],"VANET":[43],"may":[44],"also":[45],"include":[46],"dishonest":[47,119],"nodes":[48,120],"such":[49],"as":[50,82,128,130],"man-in-the-middle":[51],"(MiTM)":[52],"attackers":[53],"aiming":[54],"distribute":[56],"share":[58],"malicious":[59],"content":[60,94],"vehicles,":[63],"thus":[64],"polluting":[65],"compromised":[69],"information.":[70],"In":[71,98],"this":[72,99],"regard,":[73],"establishing":[74],"trust":[75,105,111,141,191,210],"among":[76],"connected":[77,114],"can":[79],"security":[81],"every":[83],"participating":[84],"vehicle":[85],"will":[86],"generate":[87],"authentic,":[90],"accurate,":[91],"trusted":[93],"network.":[97],"article,":[100],"we":[101],"propose":[102],"model,":[106],"namely,":[107],"MiTM":[108,122,185,204],"attack":[109],"resistance":[110],"model":[112,211],"(MARINE),":[116],"identifies":[118],"performing":[121,146],"attacks":[123],"an":[125],"efficient":[126],"way":[127],"well":[129],"revokes":[131],"their":[132],"credentials.":[133],"Every":[134],"node":[135],"running":[136],"MARINE":[137,181,206],"system":[138],"first":[139],"establishes":[140],"for":[142,198],"sender":[144],"by":[145,212],"multidimensional":[147],"plausibility":[148],"checks.":[149],"Once":[150],"receiver":[152],"verifies":[153],"trustworthiness":[155],"of":[156,180,203],"sender,":[158],"received":[160],"data":[161],"are":[162,171],"then":[163],"evaluated":[164],"both":[165],"directly":[166],"indirectly.":[168],"Extensive":[169],"simulations":[170],"carried":[172],"out":[173],"evaluate":[175],"performance":[177],"accuracy":[179],"rigorously":[182],"across":[183],"three":[184],"attacker":[186],"models":[187],"benchmarked":[190],"model.":[192],"The":[193],"simulation":[194],"results":[195],"show":[196],"that":[197],"containing":[201],"35%":[202],"attackers,":[205],"outperforms":[207],"state-of-the-art":[209],"15%,":[213],"18%,":[214],"17%":[216],"improvements":[217],"precision,":[219],"recall,":[220],"F-score,":[222],"respectively.":[223]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":28},{"year":2024,"cited_by_count":25},{"year":2023,"cited_by_count":32},{"year":2022,"cited_by_count":33},{"year":2021,"cited_by_count":22},{"year":2020,"cited_by_count":13}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
