{"id":"https://openalex.org/W4391827240","doi":"https://doi.org/10.1109/jiot.2024.3363755","title":"Multidimensional Trust Evidence Fusion and Path-Backtracking Mechanism for Trust Management in VANETs","display_name":"Multidimensional Trust Evidence Fusion and Path-Backtracking Mechanism for Trust Management in VANETs","publication_year":2024,"publication_date":"2024-02-14","ids":{"openalex":"https://openalex.org/W4391827240","doi":"https://doi.org/10.1109/jiot.2024.3363755"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2024.3363755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3363755","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102892893","display_name":"Chaklam Cheong","orcid":"https://orcid.org/0009-0004-0348-8416"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chaklam Cheong","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052016652","display_name":"Yujie Song","orcid":"https://orcid.org/0000-0003-0699-5267"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujie Song","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006794082","display_name":"Yue Cao","orcid":"https://orcid.org/0000-0002-2098-7637"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yue Cao","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101793600","display_name":"Yuang Zhang","orcid":"https://orcid.org/0000-0002-4702-3352"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuang Zhang","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024856110","display_name":"Bo Cai","orcid":"https://orcid.org/0000-0001-5261-0191"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Cai","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069951778","display_name":"Qiang Ni","orcid":"https://orcid.org/0000-0002-4593-1656"},"institutions":[{"id":"https://openalex.org/I67415387","display_name":"Lancaster University","ror":"https://ror.org/04f2nsd36","country_code":"GB","type":"education","lineage":["https://openalex.org/I67415387"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Qiang Ni","raw_affiliation_strings":["School of Computing and Communications, Lancaster University, Lancaster, U.K"],"affiliations":[{"raw_affiliation_string":"School of Computing and Communications, Lancaster University, Lancaster, U.K","institution_ids":["https://openalex.org/I67415387"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5102892893"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":2.8599,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.90765918,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":"11","issue":"10","first_page":"18619","last_page":"18634"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8405666351318359},{"id":"https://openalex.org/keywords/backtracking","display_name":"Backtracking","score":0.7217667102813721},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6718520522117615},{"id":"https://openalex.org/keywords/trust-management","display_name":"Trust management (information system)","score":0.6594882607460022},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.5939000248908997},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.5396570563316345},{"id":"https://openalex.org/keywords/trust-anchor","display_name":"Trust anchor","score":0.49517741799354553},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4918668270111084},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.48139262199401855},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.46722516417503357},{"id":"https://openalex.org/keywords/subjective-logic","display_name":"Subjective logic","score":0.4360211193561554},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4277569055557251},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.42116445302963257},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.415394127368927},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.32366061210632324},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.0979594886302948},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.0928792953491211},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.07946375012397766}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8405666351318359},{"id":"https://openalex.org/C156884757","wikidata":"https://www.wikidata.org/wiki/Q798554","display_name":"Backtracking","level":2,"score":0.7217667102813721},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6718520522117615},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.6594882607460022},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.5939000248908997},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.5396570563316345},{"id":"https://openalex.org/C154800190","wikidata":"https://www.wikidata.org/wiki/Q16941470","display_name":"Trust anchor","level":4,"score":0.49517741799354553},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4918668270111084},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.48139262199401855},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.46722516417503357},{"id":"https://openalex.org/C113839178","wikidata":"https://www.wikidata.org/wiki/Q7631418","display_name":"Subjective logic","level":3,"score":0.4360211193561554},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4277569055557251},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.42116445302963257},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.415394127368927},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.32366061210632324},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0979594886302948},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.0928792953491211},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.07946375012397766},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/jiot.2024.3363755","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2024.3363755","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},{"id":"pmh:oai:eprints.lancs.ac.uk:215300","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401916","display_name":"Lancaster EPrints (Lancaster University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67415387","host_organization_name":"Lancaster University","host_organization_lineage":["https://openalex.org/I67415387"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1019433598","https://openalex.org/W1661607648","https://openalex.org/W1968246212","https://openalex.org/W1977680444","https://openalex.org/W1985719683","https://openalex.org/W2021497904","https://openalex.org/W2059940612","https://openalex.org/W2117797270","https://openalex.org/W2125957038","https://openalex.org/W2295127943","https://openalex.org/W2305409997","https://openalex.org/W2477729378","https://openalex.org/W2803109435","https://openalex.org/W2803974954","https://openalex.org/W2804586371","https://openalex.org/W2883738719","https://openalex.org/W2900221635","https://openalex.org/W2909393755","https://openalex.org/W2947413395","https://openalex.org/W2947782291","https://openalex.org/W2970826199","https://openalex.org/W2989918996","https://openalex.org/W2990614443","https://openalex.org/W3000193443","https://openalex.org/W3005834336","https://openalex.org/W3006516180","https://openalex.org/W3034713986","https://openalex.org/W3035256235","https://openalex.org/W3046762796","https://openalex.org/W3138986473","https://openalex.org/W3157395879","https://openalex.org/W3210624065","https://openalex.org/W3217000788","https://openalex.org/W4285240653","https://openalex.org/W4293583448","https://openalex.org/W4301347335","https://openalex.org/W4313224764","https://openalex.org/W4319866441","https://openalex.org/W4327643799","https://openalex.org/W4328028945","https://openalex.org/W4376480647","https://openalex.org/W6696961757"],"related_works":["https://openalex.org/W2129567949","https://openalex.org/W4243605140","https://openalex.org/W2061426947","https://openalex.org/W4385687966","https://openalex.org/W2128649519","https://openalex.org/W2509590646","https://openalex.org/W2912841859","https://openalex.org/W2522348009","https://openalex.org/W2148188734","https://openalex.org/W4282977408"],"abstract_inverted_index":{"With":[0],"the":[1,39,51,74,100,136,147,165,177,197,207],"development":[2],"of":[3,41,78,103,161,167,189,210],"Vehicular":[4],"Ad-hoc":[5],"Networks":[6],"(VANETs),":[7],"several":[8],"data":[9,16,88],"security":[10,45,53,59,91],"challenges":[11],"are":[12,22,174],"revealed,":[13],"such":[14],"as":[15,105],"hijacking":[17],"and":[18,76,86,113,124,141,158,171,180,201],"interception.":[19],"Although":[20],"vehicles":[21],"authorized,":[23],"malicious":[24,203,227],"behaviors":[25,204],"still":[26],"be":[27,62],"carried":[28],"out.":[29],"Security":[30],"lapses":[31],"may":[32],"lead":[33],"to":[34,50,66,80,109,150],"potential":[35],"accidents,":[36],"which":[37],"emphasizes":[38],"importance":[40],"laying":[42],"a":[43,106,111,119,225],"solid":[44],"foundation":[46],"for":[47,127,163],"VANETs.":[48,133,232],"Thanks":[49],"base":[52],"layer":[54],"provided":[55,192],"by":[56,176,193],"cryptography":[57],"technologies,":[58],"problems":[60],"can":[61],"solved":[63],"in":[64,132],"VANETs":[65],"avoid":[67],"accidents.":[68],"However,":[69],"trust":[70,96,115,121,128,138,173],"management":[71,129],"focuses":[72],"on":[73,206],"analysis":[75],"identification":[77],"misbehavior,":[79],"ensure":[81],"secure":[82],"interactions":[83],"among":[84],"vehicles,":[85],"preserve":[87],"integrity":[89],"against":[90],"issues.":[92],"This":[93],"paper":[94],"explores":[95],"assessments":[97],"that":[98,216],"consider":[99],"transmission":[101,159,187,208],"path":[102,160,188,209],"message":[104,190],"novel":[107],"indicator,":[108],"provide":[110],"comprehensive":[112],"accurate":[114],"assessment.":[116],"We":[117],"propose":[118],"Multidimensional":[120],"Evidence":[122],"Fusion":[123],"Path-Backtracking":[125],"mechanism":[126,199],"scheme":[130,218],"(MEFPB)":[131],"MEFPB":[134,145],"integrates":[135],"multidimensional":[137],"evidence":[139],"fusion":[140],"path-backtracking":[142,198],"mechanism.":[143],"Specifically,":[144],"utilizes":[146],"Dempster-Shafer":[148],"theory":[149],"fuse":[151],"multi-dimensional":[152],"indicators":[153],"(direct":[154],"trust,":[155,157],"indirect":[156,172],"message)":[162],"evaluating":[164],"trustworthiness":[166],"vehicles.":[168],"The":[169,186],"direct":[170],"supplied":[175],"message-sending":[178],"vehicle":[179],"its":[181],"neighbors":[182],"(i.e.,":[183],"other":[184,221],"vehicles).":[185],"is":[191],"roadside":[194],"units.":[195],"Furthermore,":[196],"identifies":[200],"traces":[202],"based":[205],"message.":[211],"Moreover,":[212],"extensive":[213],"experiments":[214],"demonstrate":[215],"our":[217],"significantly":[219],"outperforms":[220],"baseline":[222],"schemes,":[223],"exhibiting":[224],"high":[226],"behavior":[228],"detection":[229],"rate":[230],"within":[231]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-08T08:50:53.379069","created_date":"2025-10-10T00:00:00"}
