{"id":"https://openalex.org/W4417282006","doi":"https://doi.org/10.1109/pimrc62392.2025.11275116","title":"Digital Twin-Enabled Federated Misbehavior Detection Model for Internet of Vehicles Networks","display_name":"Digital Twin-Enabled Federated Misbehavior Detection Model for Internet of Vehicles Networks","publication_year":2025,"publication_date":"2025-09-01","ids":{"openalex":"https://openalex.org/W4417282006","doi":"https://doi.org/10.1109/pimrc62392.2025.11275116"},"language":null,"primary_location":{"id":"doi:10.1109/pimrc62392.2025.11275116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11275116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106462277","display_name":"Burcu Bolat-Ak\u00e7a","orcid":null},"institutions":[{"id":"https://openalex.org/I157637111","display_name":"Naval Academy","ror":"https://ror.org/05syseh24","country_code":"TR","type":"education","lineage":["https://openalex.org/I157637111"]}],"countries":["TR"],"is_corresponding":true,"raw_author_name":"Burcu Bolat-Ak\u00e7a","raw_affiliation_strings":["National Defence University Turkish Naval Academy,Department of Computer Engineering,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"National Defence University Turkish Naval Academy,Department of Computer Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I157637111"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120787327","display_name":"Nimet Merve Tel\u00e7eken","orcid":null},"institutions":[{"id":"https://openalex.org/I157637111","display_name":"Naval Academy","ror":"https://ror.org/05syseh24","country_code":"TR","type":"education","lineage":["https://openalex.org/I157637111"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Nimet Merve Tel\u00e7eken","raw_affiliation_strings":["Turkish Naval Research Center Command,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"Turkish Naval Research Center Command,Istanbul,Turkey","institution_ids":["https://openalex.org/I157637111"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036229988","display_name":"Elif Bozkaya","orcid":"https://orcid.org/0000-0001-6960-2585"},"institutions":[{"id":"https://openalex.org/I157637111","display_name":"Naval Academy","ror":"https://ror.org/05syseh24","country_code":"TR","type":"education","lineage":["https://openalex.org/I157637111"]}],"countries":["TR"],"is_corresponding":false,"raw_author_name":"Elif Bozkaya-Aras","raw_affiliation_strings":["National Defence University Turkish Naval Academy,Department of Computer Engineering,Istanbul,Turkey"],"affiliations":[{"raw_affiliation_string":"National Defence University Turkish Naval Academy,Department of Computer Engineering,Istanbul,Turkey","institution_ids":["https://openalex.org/I157637111"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5106462277"],"corresponding_institution_ids":["https://openalex.org/I157637111"],"apc_list":null,"apc_paid":null,"fwci":0.8194,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.81116743,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.670199990272522,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.670199990272522,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.057999998331069946,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.05139999836683273,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/federated-learning","display_name":"Federated learning","score":0.6669999957084656},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6377000212669373},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.6055999994277954},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6004999876022339},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5187000036239624},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.38029998540878296},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.3538999855518341},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.3314000070095062}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8740000128746033},{"id":"https://openalex.org/C2992525071","wikidata":"https://www.wikidata.org/wiki/Q50818671","display_name":"Federated learning","level":2,"score":0.6669999957084656},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6377000212669373},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.6055999994277954},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6004999876022339},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5187000036239624},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4607999920845032},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.39160001277923584},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.38029998540878296},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.3538999855518341},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.34929999709129333},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.336899995803833},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.3314000070095062},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.31529998779296875},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.3116999864578247},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.31060001254081726},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2955000102519989},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.28769999742507935},{"id":"https://openalex.org/C140547941","wikidata":"https://www.wikidata.org/wiki/Q7797194","display_name":"Threat model","level":2,"score":0.2727000117301941},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.27090001106262207},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2696000039577484},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.26669999957084656},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.2612000107765198},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.2599000036716461},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.25760000944137573},{"id":"https://openalex.org/C51632099","wikidata":"https://www.wikidata.org/wiki/Q3985153","display_name":"Training set","level":2,"score":0.2542000114917755},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2515999972820282}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pimrc62392.2025.11275116","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pimrc62392.2025.11275116","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE 36th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2007689358","https://openalex.org/W2292446757","https://openalex.org/W2900221635","https://openalex.org/W3011132155","https://openalex.org/W3045657906","https://openalex.org/W3158350046","https://openalex.org/W3209227865","https://openalex.org/W4206683212","https://openalex.org/W4206707323","https://openalex.org/W4295308688","https://openalex.org/W4387986831","https://openalex.org/W4389371100","https://openalex.org/W4390188670","https://openalex.org/W4391216281","https://openalex.org/W4401007500","https://openalex.org/W4401509421","https://openalex.org/W4402389238","https://openalex.org/W4406267829"],"related_works":[],"abstract_inverted_index":{"The":[0],"concept":[1],"of":[2,10,12,20,34,80,142,189,196],"federated":[3,92,127,176],"learning":[4,36,177],"enhances":[5],"the":[6,18,32,40,44,72,78,81,174,180,194,197],"security":[7],"and":[8,24,76,119,134,154,164],"privacy":[9],"Internet":[11],"Vehicles":[13],"(IoV)":[14],"networks":[15,103],"while":[16,191],"accelerating":[17],"development":[19],"more":[21,162],"intelligent,":[22],"secure,":[23],"efficient":[25],"vehicular":[26],"applications.":[27],"Federated":[28],"learning-based":[29],"approaches":[30,59],"allow":[31],"training":[33,75],"machine":[35],"models":[37],"directly":[38],"on":[39],"IoVs":[41,63],"without":[42,104],"transferring":[43],"sensitive":[45,106],"information":[46],"to":[47,70,96,150,156],"a":[48,89,126,161,186],"Mobile":[49],"Edge":[50],"Computing":[51],"(MEC)":[52],"server.":[53],"One":[54],"persisting":[55],"drawback":[56],"in":[57,67,101],"these":[58],"is":[60],"that":[61,173],"malicious":[62,68,99,140],"may":[64],"deliberately":[65],"engage":[66],"behaviors":[69,100],"manipulate":[71],"edge":[73,158],"model":[74,95,159,178],"reduce":[77],"trustworthiness":[79,195],"system.":[82],"To":[83],"overcome":[84],"this":[85],"challenge,":[86],"we":[87,114],"propose":[88],"digital":[90,109],"twin-enabled":[91],"misbehavior":[93,128,166],"detection":[94,129,167],"collaboratively":[97],"detect":[98],"IoV":[102,112,149],"sharing":[105],"data.":[107,198],"Combining":[108],"twin":[110],"with":[111,179,185],"networks,":[113],"analyze":[115],"real-world":[116],"vehicle":[117],"behavior":[118],"investigate":[120],"various":[121],"attack":[122],"scenarios.":[123],"We":[124],"develop":[125],"algorithm,":[130],"which":[131],"continuously":[132],"learns":[133],"improves":[135],"system":[136],"performance":[137],"by":[138],"identifying":[139],"activities":[141],"potential":[143],"attacks.":[144],"This":[145],"algorithm":[146,182],"allows":[147],"each":[148],"process":[151],"data":[152],"locally":[153],"contribute":[155],"an":[157],"for":[160],"robust":[163],"secure":[165],"model.":[168],"Our":[169],"simulation":[170],"results":[171],"show":[172],"proposed":[175],"XGBoost":[181],"detects":[183],"attacks":[184],"maximum":[187],"accuracy":[188],"99%,":[190],"also":[192],"ensuring":[193]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-12-12T00:00:00"}
