{"id":"https://openalex.org/W4412517277","doi":"https://doi.org/10.3390/jcp5030048","title":"Fed-DTB: A Dynamic Trust-Based Framework for Secure and Efficient Federated Learning in IoV Networks: Securing V2V/V2I Communication","display_name":"Fed-DTB: A Dynamic Trust-Based Framework for Secure and Efficient Federated Learning in IoV Networks: Securing V2V/V2I Communication","publication_year":2025,"publication_date":"2025-07-19","ids":{"openalex":"https://openalex.org/W4412517277","doi":"https://doi.org/10.3390/jcp5030048"},"language":"en","primary_location":{"id":"doi:10.3390/jcp5030048","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5030048","pdf_url":null,"source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.3390/jcp5030048","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034231373","display_name":"Ahmed Alruwaili","orcid":"https://orcid.org/0000-0003-0310-6516"},"institutions":[{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"education","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"Ahmed Alruwaili","raw_affiliation_strings":["Institute for Sustainable Industries & Liveable Cities (ISILC), Victoria University, Melbourne, VIC 3000, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Sustainable Industries & Liveable Cities (ISILC), Victoria University, Melbourne, VIC 3000, Australia","institution_ids":["https://openalex.org/I71270174"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035580856","display_name":"Sardar M. N. Islam","orcid":"https://orcid.org/0000-0001-9451-7390"},"institutions":[{"id":"https://openalex.org/I71270174","display_name":"Victoria University","ror":"https://ror.org/04j757h98","country_code":"AU","type":"education","lineage":["https://openalex.org/I71270174"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Sardar Islam","raw_affiliation_strings":["Institute for Sustainable Industries & Liveable Cities (ISILC), Victoria University, Melbourne, VIC 3000, Australia"],"affiliations":[{"raw_affiliation_string":"Institute for Sustainable Industries & Liveable Cities (ISILC), Victoria University, Melbourne, VIC 3000, Australia","institution_ids":["https://openalex.org/I71270174"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003563704","display_name":"Iqbal Gondal","orcid":"https://orcid.org/0000-0001-7963-2446"},"institutions":[{"id":"https://openalex.org/I4210135439","display_name":"RMIT Europe","ror":"https://ror.org/03m3ca021","country_code":"ES","type":"education","lineage":["https://openalex.org/I4210135439","https://openalex.org/I82951845"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Iqbal Gondal","raw_affiliation_strings":["School of Computing Tech, Royal Melbourne Institute of Technology (RMIT), Melbourne, VIC 3000, Australia"],"affiliations":[{"raw_affiliation_string":"School of Computing Tech, Royal Melbourne Institute of Technology (RMIT), Melbourne, VIC 3000, Australia","institution_ids":["https://openalex.org/I4210135439"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034231373"],"corresponding_institution_ids":["https://openalex.org/I71270174"],"apc_list":{"value":1000,"currency":"CHF","value_usd":1082},"apc_paid":{"value":1000,"currency":"CHF","value_usd":1082},"fwci":9.6229,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.97679594,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"5","issue":"3","first_page":"48","last_page":"48"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7275111675262451},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6187412738800049},{"id":"https://openalex.org/keywords/secure-communication","display_name":"Secure communication","score":0.5433486104011536},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3793514668941498},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3666391372680664},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.12145322561264038}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7275111675262451},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6187412738800049},{"id":"https://openalex.org/C510870077","wikidata":"https://www.wikidata.org/wiki/Q7444868","display_name":"Secure communication","level":3,"score":0.5433486104011536},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3793514668941498},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3666391372680664},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.12145322561264038}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/jcp5030048","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5030048","pdf_url":null,"source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:c5b2538842f945f4895cba0309fa9f71","is_oa":true,"landing_page_url":"https://doaj.org/article/c5b2538842f945f4895cba0309fa9f71","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cybersecurity and Privacy, Vol 5, Iss 3, p 48 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/jcp5030048","is_oa":true,"landing_page_url":"https://doi.org/10.3390/jcp5030048","pdf_url":null,"source":{"id":"https://openalex.org/S4210232532","display_name":"Journal of Cybersecurity and Privacy","issn_l":"2624-800X","issn":["2624-800X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cybersecurity and Privacy","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W1492443699","https://openalex.org/W2023835067","https://openalex.org/W2097726984","https://openalex.org/W2222341944","https://openalex.org/W2541884796","https://openalex.org/W2703342623","https://openalex.org/W2798720628","https://openalex.org/W2912213068","https://openalex.org/W2964262308","https://openalex.org/W2993563221","https://openalex.org/W2997499903","https://openalex.org/W3033988836","https://openalex.org/W3036874940","https://openalex.org/W3040325268","https://openalex.org/W3045736930","https://openalex.org/W3101813280","https://openalex.org/W3105122387","https://openalex.org/W3106378891","https://openalex.org/W3118608800","https://openalex.org/W3127561923","https://openalex.org/W3141567114","https://openalex.org/W3155912831","https://openalex.org/W3159080474","https://openalex.org/W3165330780","https://openalex.org/W3173731599","https://openalex.org/W3181932393","https://openalex.org/W3193949656","https://openalex.org/W3203600060","https://openalex.org/W3205598877","https://openalex.org/W3206162503","https://openalex.org/W3209696639","https://openalex.org/W3213330817","https://openalex.org/W4205765703","https://openalex.org/W4210654156","https://openalex.org/W4281763929","https://openalex.org/W4285722492","https://openalex.org/W4285728720","https://openalex.org/W4288075785","https://openalex.org/W4293168685","https://openalex.org/W4293212679","https://openalex.org/W4321021933","https://openalex.org/W4360994409","https://openalex.org/W4382053359","https://openalex.org/W4386867882","https://openalex.org/W4388106271","https://openalex.org/W4388658024","https://openalex.org/W4389403334","https://openalex.org/W4390465979","https://openalex.org/W4391942399","https://openalex.org/W4401112561","https://openalex.org/W4401242579","https://openalex.org/W4401538767","https://openalex.org/W4402134527","https://openalex.org/W4407637189","https://openalex.org/W4407787914","https://openalex.org/W4407787920","https://openalex.org/W4408361205","https://openalex.org/W4410087875","https://openalex.org/W4411267583","https://openalex.org/W6785411514","https://openalex.org/W6801047732"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0,122,148],"Internet":[1],"of":[2,22,30,47,70,81,92,207,215],"Vehicles":[3],"(IoV)":[4],"presents":[5],"a":[6,54,153],"vast":[7],"opportunity":[8],"for":[9,59,191],"optimised":[10],"traffic":[11],"flow,":[12],"road":[13],"safety,":[14],"and":[15,44,84,116,130,143,175,195],"enhanced":[16],"usage":[17],"experience":[18],"with":[19,99,158,204],"the":[20,27,45,68,74,90,93,105,111,118,137,205,212],"influence":[21],"Federated":[23],"Learning":[24],"(FL).":[25],"However,":[26],"distributed":[28],"nature":[29],"IoV":[31],"networks":[32],"creates":[33],"certain":[34],"inherent":[35],"problems":[36],"regarding":[37,136],"data":[38,128],"privacy,":[39],"security":[40,216],"from":[41],"adversarial":[42],"attacks,":[43],"handling":[46],"available":[48],"resources.":[49],"This":[50,186],"paper":[51],"introduces":[52],"Fed-DTB,":[53],"new":[55],"dynamic":[56],"trust-based":[57],"framework":[58],"FL":[60],"that":[61,78,166,182],"aims":[62],"to":[63,88,126],"overcome":[64],"these":[65],"challenges":[66],"in":[67,110,199],"context":[69],"IoV.":[71],"Fed-DTB":[72,106,123],"integrates":[73],"adaptive":[75,164],"trust":[76,155,169],"evaluation":[77,156],"is":[79,102,124],"capable":[80],"quickly":[82],"identifying":[83],"excluding":[85],"malicious":[86],"clients":[87],"maintain":[89],"authenticity":[91],"learning":[94,198,209],"process.":[95],"A":[96],"performance":[97],"comparison":[98],"previous":[100],"approaches":[101,135],"shown,":[103],"where":[104],"method":[107],"improves":[108],"accuracy":[109,139],"first":[112],"two":[113],"training":[114,120],"rounds":[115],"decreases":[117],"per-round":[119],"time.":[121],"robust":[125],"non-IID":[127],"distributions":[129],"outperforms":[131],"all":[132],"other":[133],"state-of-the-art":[134],"final":[138],"(87\u201388%),":[140],"convergence":[141],"rate,":[142],"adversary":[144],"detection":[145],"(99.86%":[146],"accuracy).":[147],"key":[149],"contributions":[150],"include":[151],"(1)":[152],"multi-factor":[154],"mechanism":[157],"seven":[159],"contextual":[160],"factors,":[161],"(2)":[162],"correlation-based":[163],"weighting":[165],"dynamically":[167],"prioritises":[168],"factors":[170],"based":[171],"on":[172],"vehicular":[173],"conditions,":[174],"(3)":[176],"an":[177],"optimisation-based":[178],"client":[179],"selection":[180],"strategy":[181],"maximises":[183],"collaborative":[184,197],"reliability.":[185],"work":[187],"opens":[188],"up":[189],"opportunities":[190],"more":[192],"accurate,":[193],"secure,":[194],"private":[196],"future":[200],"intelligent":[201],"transportation":[202],"systems":[203],"help":[206],"federated":[208],"while":[210],"overcoming":[211],"conventional":[213],"trade-off":[214],"vs.":[217],"efficiency.":[218]},"counts_by_year":[{"year":2026,"cited_by_count":4}],"updated_date":"2026-04-04T08:04:53.788161","created_date":"2025-10-10T00:00:00"}
