{"id":"https://openalex.org/W4313156502","doi":"https://doi.org/10.1109/icdcs54860.2022.00137","title":"Demo:Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET Communication","display_name":"Demo:Dynamic Suppression of Selfish Node Attack Motivation in the Process of VANET Communication","publication_year":2022,"publication_date":"2022-07-01","ids":{"openalex":"https://openalex.org/W4313156502","doi":"https://doi.org/10.1109/icdcs54860.2022.00137"},"language":"en","primary_location":{"id":"doi:10.1109/icdcs54860.2022.00137","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs54860.2022.00137","pdf_url":null,"source":{"id":"https://openalex.org/S4363608224","display_name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/conference_contribution/Demo_Dynamic_Suppression_of_Selfish_Node_Attack_Motivation_in_the_Process_of_VANET_Communication/22124063","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100680816","display_name":"Bowei Zhang","orcid":"https://orcid.org/0000-0002-6228-5238"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bowei Zhang","raw_affiliation_strings":["Hunan University of Science and Technology,School of Computer Science and Technology,Xiangtan,China","Hunan Key Laboratory for Service Computing and Novel SoftwareTechnology, Xiangtan, China","School of Computer Science and Technology, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"Hunan University of Science and Technology,School of Computer Science and Technology,Xiangtan,China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"Hunan Key Laboratory for Service Computing and Novel SoftwareTechnology, Xiangtan, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100369107","display_name":"Xiaoliang Wang","orcid":"https://orcid.org/0000-0001-5479-5994"},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoliang Wang","raw_affiliation_strings":["Hunan University of Science and Technology,School of Computer Science and Technology,Xiangtan,China","School of Computer Science and Technology, Hunan University of Science and Technology, Xiangtan, China","Hunan Key Laboratory for Service Computing and Novel SoftwareTechnology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"Hunan University of Science and Technology,School of Computer Science and Technology,Xiangtan,China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"School of Computer Science and Technology, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"Hunan Key Laboratory for Service Computing and Novel SoftwareTechnology, Xiangtan, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5008382970","display_name":"Ru Xie","orcid":null},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ru Xie","raw_affiliation_strings":["Hunan University of Science and Technology,School of Computer Science and Technology,Xiangtan,China","Hunan Key Laboratory for Service Computing and Novel SoftwareTechnology, Xiangtan, China","School of Computer Science and Technology, Hunan University of Science and Technology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"Hunan University of Science and Technology,School of Computer Science and Technology,Xiangtan,China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"Hunan Key Laboratory for Service Computing and Novel SoftwareTechnology, Xiangtan, China","institution_ids":[]},{"raw_affiliation_string":"School of Computer Science and Technology, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021802443","display_name":"Huazheng Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I121296143","display_name":"Hunan University of Science and Technology","ror":"https://ror.org/02m9vrb24","country_code":"CN","type":"education","lineage":["https://openalex.org/I121296143"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huazheng Zhang","raw_affiliation_strings":["Hunan University of Science and Technology,School of Computer Science and Technology,Xiangtan,China","School of Computer Science and Technology, Hunan University of Science and Technology, Xiangtan, China","Hunan Key Laboratory for Service Computing and Novel SoftwareTechnology, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"Hunan University of Science and Technology,School of Computer Science and Technology,Xiangtan,China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"School of Computer Science and Technology, Hunan University of Science and Technology, Xiangtan, China","institution_ids":["https://openalex.org/I121296143"]},{"raw_affiliation_string":"Hunan Key Laboratory for Service Computing and Novel SoftwareTechnology, Xiangtan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016008862","display_name":"Frank Jiang","orcid":"https://orcid.org/0000-0003-3088-8525"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Frank Jiang","raw_affiliation_strings":["Deakin University,School of Info Technology,Geelong,Australia","School of Info Technology, Deakin University, Geelong, Australia"],"affiliations":[{"raw_affiliation_string":"Deakin University,School of Info Technology,Geelong,Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Info Technology, Deakin University, Geelong, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5100680816"],"corresponding_institution_ids":["https://openalex.org/I121296143"],"apc_list":null,"apc_paid":null,"fwci":0.6401,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63128346,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1288","last_page":"1291"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9800000190734863,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9794999957084656,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7767492532730103},{"id":"https://openalex.org/keywords/reciprocity","display_name":"Reciprocity (cultural anthropology)","score":0.6965363621711731},{"id":"https://openalex.org/keywords/vehicular-ad-hoc-network","display_name":"Vehicular ad hoc network","score":0.6550272703170776},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.571298360824585},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5473496913909912},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5471332669258118},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.5310512185096741},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.5292182564735413},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.47172442078590393},{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.4466641843318939},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.2805545926094055},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1235630214214325},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08992955088615417},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08010175824165344}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7767492532730103},{"id":"https://openalex.org/C169903001","wikidata":"https://www.wikidata.org/wiki/Q3264987","display_name":"Reciprocity (cultural anthropology)","level":2,"score":0.6965363621711731},{"id":"https://openalex.org/C192448918","wikidata":"https://www.wikidata.org/wiki/Q682677","display_name":"Vehicular ad hoc network","level":4,"score":0.6550272703170776},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.571298360824585},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5473496913909912},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5471332669258118},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.5310512185096741},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.5292182564735413},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.47172442078590393},{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.4466641843318939},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.2805545926094055},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1235630214214325},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08992955088615417},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08010175824165344},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icdcs54860.2022.00137","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icdcs54860.2022.00137","pdf_url":null,"source":{"id":"https://openalex.org/S4363608224","display_name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","raw_type":"proceedings-article"},{"id":"pmh:oai:figshare.com:article/22124063","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Demo_Dynamic_Suppression_of_Selfish_Node_Attack_Motivation_in_the_Process_of_VANET_Communication/22124063","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/22124063","is_oa":true,"landing_page_url":"https://figshare.com/articles/conference_contribution/Demo_Dynamic_Suppression_of_Selfish_Node_Attack_Motivation_in_the_Process_of_VANET_Communication/22124063","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320322191","display_name":"Hunan University","ror":"https://ror.org/05htk5m33"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W2053225008","https://openalex.org/W2460379932","https://openalex.org/W2545176003","https://openalex.org/W2570263810","https://openalex.org/W2916008479","https://openalex.org/W2936578932","https://openalex.org/W2941980679","https://openalex.org/W2972811434","https://openalex.org/W3008343234","https://openalex.org/W3089656219","https://openalex.org/W3100121400","https://openalex.org/W3161863195","https://openalex.org/W3213862827","https://openalex.org/W3216225457","https://openalex.org/W6804336304"],"related_works":["https://openalex.org/W2183673732","https://openalex.org/W2351085950","https://openalex.org/W2086593384","https://openalex.org/W2356163173","https://openalex.org/W3006992597","https://openalex.org/W2121707290","https://openalex.org/W2055245052","https://openalex.org/W4366306856","https://openalex.org/W1509891749","https://openalex.org/W1620532565"],"abstract_inverted_index":{"The":[0,148],"selfish":[1,115,174],"On-Board-Unit":[2],"(OBU)":[3],"attacks":[4,11,122,132],"Vehicular":[5],"Ad-Hoc":[6],"Network":[7],"(VANET)":[8],"by":[9,237],"various":[10],"for":[12,26],"profit.":[13],"However,":[14],"many":[15],"existing":[16],"methods":[17],"are":[18,89],"based":[19,72,186],"on":[20,73,187],"the":[21,39,48,53,59,63,77,80,100,109,144,170,181,219,231,238],"principle":[22],"of":[23,41,50,62,93,102,112,146,152,173,216,221,230],"direct":[24],"reciprocity":[25,150],"communication,":[27],"and":[28,57,116,123,176,207,234],"when":[29,99],"an":[30,67,184],"attack":[31,60,171,182,196],"occurs,":[32],"it":[33],"is":[34,105,192,225,235],"easy":[35],"to":[36,46,75,82,129,142,168,194,200],"crash":[37],"in":[38,52,79,90,155,204],"case":[40],"large-scale":[42],"networks.":[43],"In":[44,127,166],"order":[45,167],"reduce":[47],"number":[49,215],"attackers":[51],"vehicle":[54],"ad-hoc":[55],"network":[56,94,103],"restrain":[58,169],"motivation":[61,172],"OBUs,":[64],"we":[65,137],"propose":[66],"indirect":[68,149],"reciprocal":[69],"incentive":[70],"mechanism":[71],"reputation":[74],"encourage":[76],"OBUs":[78,88],"VANET":[81,156],"help":[83],"each":[84,153],"other.":[85],"Since":[86],"most":[87],"great":[91],"need":[92],"services,":[95],"including":[96],"potential":[97],"attackers,":[98],"loss":[101],"services":[104],"far":[106],"greater":[107],"than":[108,228],"illegal":[110],"benefits":[111],"their":[113],"attacks,":[114],"rational":[117],"OBU":[118,154,202],"will":[119],"give":[120],"up":[121],"take":[124],"desirable":[125],"behavior.":[126],"addition,":[128],"prevent":[130],"some":[131],"from":[133],"tampering":[134],"with":[135],"information,":[136],"also":[138],"apply":[139],"blockchain":[140],"technology":[141],"record":[143],"behavior":[145],"OBU.":[147],"process":[151],"can":[157],"be":[158],"regarded":[159],"as":[160,199],"a":[161,213],"Markov":[162],"Decision":[163],"Process":[164],"(MDP).":[165],"nodes":[175],"communicate":[177],"normally":[178],"without":[179],"knowing":[180],"model,":[183],"algorithm":[185,224],"Deep":[188],"Reinforcement":[189],"Learning":[190],"(DRL)":[191],"proposed":[193,223],"suppress":[195],"motivation,":[197],"so":[198],"activate":[201],"learning":[203],"dynamic":[205],"environment":[206],"make":[208],"wise":[209],"decisions.":[210],"Finally,":[211],"through":[212],"large":[214],"simulation":[217,239],"experiments,":[218],"performance":[220],"our":[222],"obviously":[226],"better":[227],"that":[229],"baseline":[232],"strategy,":[233],"verified":[236],"results.":[240]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
