{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T17:46:52Z","timestamp":1745430412804,"version":"3.37.3"},"reference-count":46,"publisher":"Wiley","issue":"17","license":[{"start":{"date-parts":[[2016,10,6]],"date-time":"2016-10-06T00:00:00Z","timestamp":1475712000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security Comm Networks"],"published-print":{"date-parts":[[2016,11,25]]},"abstract":"Abstract<\/jats:title>Trust establishment over vehicular networks can enhance the security against probable insider attackers. Regrettably, existing solutions assume that the attackers have always a dishonest behavior that remains stable over time. This assumption may be misleading, as the attacker can behave intelligently to avoid being detected. In this paper, we propose a novel solution that combines trust establishment and a risk estimation concerning behavior changes. Our proposal, called risk\u2010aware trust\u2010based architecture, evaluates the trust among vehicles for independent time periods, while the risk estimation computes the behavior variation between smaller, consecutive time periods in order to prevent risks like an intelligent attacker attempting to bypass the security measures deployed. In addition, our proposal works over a collaborative multi\u2010hop broadcast communication technique for both vehicle\u2010to\u2010vehicle and vehicle\u2010to\u2010roadside unit messages in order to ensure an efficient dissemination of both safety and infotainment messages. Simulation results evidence the high efficiency of risk\u2010aware trust\u2010based architecture at enhancing the detection ratios by more than 7% compared with existing solutions, such as T\u2010CLAIDS and AECFV, even in the presence of high ratios of attackers, while offering short end\u2010to\u2010end delays and low packet loss ratios. Copyright \u00a9 2016 John Wiley & Sons, Ltd.<\/jats:p>","DOI":"10.1002\/sec.1618","type":"journal-article","created":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T22:48:43Z","timestamp":1476312523000},"page":"4428-4442","source":"Crossref","is-referenced-by-count":24,"title":["RITA: RIsk\u2010aware Trust\u2010based Architecture for collaborative multi\u2010hop vehicular communications"],"prefix":"10.1002","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9990-519X","authenticated-orcid":false,"given":"Chaker Abdelaziz","family":"Kerrache","sequence":"first","affiliation":[{"name":"Laboratoire d'Informatique et de Math\u00e9matiques University of Laghouat BP 37G, route de Ghardaia Laghouat Algeria"}]},{"given":"Carlos T.","family":"Calafate","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering Universitat Polit\u00e8cnica de Val\u00e8ncia Camino de Vera, S\/N 46022 Val\u00e8ncia Spain"}]},{"given":"Nasreddine","family":"Lagraa","sequence":"additional","affiliation":[{"name":"Laboratoire d'Informatique et de Math\u00e9matiques University of Laghouat BP 37G, route de Ghardaia Laghouat Algeria"}]},{"given":"Juan\u2010Carlos","family":"Cano","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering Universitat Polit\u00e8cnica de Val\u00e8ncia Camino de Vera, S\/N 46022 Val\u00e8ncia Spain"}]},{"given":"Pietro","family":"Manzoni","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering Universitat Polit\u00e8cnica de Val\u00e8ncia Camino de Vera, S\/N 46022 Val\u00e8ncia Spain"}]}],"member":"311","published-online":{"date-parts":[[2016,10,6]]},"reference":[{"key":"e_1_2_9_2_1","doi-asserted-by":"crossref","unstructured":"SumraIA AhmadI HasbullahH MananJlBA.Classes of attacks in vanet.2011 Saudi International Electronics Communications and Photonics Conference (SIECPC) IEEE Riyadh Saudi Arabia 2011;1\u20135.","DOI":"10.1109\/SIECPC.2011.5876939"},{"key":"e_1_2_9_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/smj.4250160504"},{"key":"e_1_2_9_4_1","doi-asserted-by":"crossref","unstructured":"GerlachM.Trust for vehicular applications.Eighth International Symposium on Autonomous Decentralized Systems 2007. ISADS'07 IEEE Bangkok Thailand 2007;295\u2013304.","DOI":"10.1109\/ISADS.2007.76"},{"key":"e_1_2_9_5_1","doi-asserted-by":"crossref","unstructured":"PathanASK LeeHW HongCS.Security in wireless sensor networks: issues and challenges.The 8th International Conference Advanced Communication Technology 2006. ICACT 2006 vol. 2 IEEE Gangwon\u2010Do Korea (South) 2006;1043\u20131048.","DOI":"10.1109\/ICACT.2006.206151"},{"key":"e_1_2_9_6_1","doi-asserted-by":"crossref","unstructured":"RayaM HubauxJP.The security of vehicular ad hoc networks.Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks ACM Alexandria VA USA 2005;11\u201321.","DOI":"10.1145\/1102219.1102223"},{"key":"e_1_2_9_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2011.07.014"},{"key":"e_1_2_9_8_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2012.11.06"},{"key":"e_1_2_9_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2014.2364044"},{"key":"e_1_2_9_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2293020"},{"issue":"3","key":"e_1_2_9_11_1","first-page":"209","article-title":"Application\u2010based classification and comparison of secure routing protocols in wireless sensor networks: a survey","volume":"5","author":"Khan IA","year":"2015","journal-title":"Smart Computing Review"},{"key":"e_1_2_9_12_1","doi-asserted-by":"crossref","unstructured":"HaddadouN RachediA Ghamri\u2010DoudaneY.Trust and exclusion in vehicular ad hoc networks: an economic incentive model based approach.Computing Communications and it Applications Conference (COMCOMAP) 2013 IEEE Hong Kong China 2013;13\u201318.","DOI":"10.1109\/ComComAp.2013.6533601"},{"issue":"2","key":"e_1_2_9_13_1","first-page":"25","article-title":"A similarity based trust and reputation management framework for vanets","volume":"6","author":"Yang N","year":"2013","journal-title":"International Journal of Future Generation Communication and Networking"},{"key":"e_1_2_9_14_1","doi-asserted-by":"crossref","unstructured":"DingQ LiX JiangM ZhouX.Reputation management in vehicular ad hoc networks.2010 International Conference on Multimedia Technology (ICMT) IEEE Ningbo China 2010;1\u20135.","DOI":"10.1109\/ICMULT.2010.5632149"},{"key":"e_1_2_9_15_1","doi-asserted-by":"crossref","unstructured":"RayaM PapadimitratosP GligorVD HubauxJP.On data\u2010centric trust establishment in ephemeral ad hoc networks.IEEE INFOCOM 2008. The 27th Conference on Computer Communications IEEE Phoenix Arizona USA 2008;1912\u20131920.","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"e_1_2_9_16_1","doi-asserted-by":"crossref","unstructured":"GurungS LinD SquicciariniAC BertinoE.Information\u2010oriented trustworthiness evaluation in vehicular ad\u2010hoc networks.NSS Springer:Madrid Spain 2013;94\u2013108.","DOI":"10.1007\/978-3-642-38631-2_8"},{"key":"e_1_2_9_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.519"},{"key":"e_1_2_9_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2014.01.009"},{"key":"e_1_2_9_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.018"},{"key":"e_1_2_9_20_1","doi-asserted-by":"crossref","unstructured":"GolleP GreeneD StaddonJ.Detecting and correcting malicious data in vanets.Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks ACM Philadelphia PA USA 2004;29\u201337.","DOI":"10.1145\/1023875.1023881"},{"key":"e_1_2_9_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2011.03.028"},{"key":"e_1_2_9_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.01.006"},{"key":"e_1_2_9_23_1","doi-asserted-by":"crossref","unstructured":"KerracheCA LagraaN CalafateCT LakasA.Trouve: a trusted routing protocol for urban vehicular environments.2015 IEEE 11th International Conference on Wireless and Mobile Computing Networking and Communications (WiMob) IEEE Abu\u2010Dhabi United Arab Emirates (UAE) 2015;260\u2013267.","DOI":"10.1109\/WiMOB.2015.7347970"},{"key":"e_1_2_9_24_1","unstructured":"Etsi eurpean standard en 302 637\u20102 \u2010 v1.3.1 (2014\u201009) 2014."},{"key":"e_1_2_9_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2360883"},{"key":"e_1_2_9_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6523808"},{"key":"e_1_2_9_27_1","doi-asserted-by":"crossref","unstructured":"AbdelazizKC LagraaN LakasA.Trust model with delayed verification for message relay in vanets.2014 International Wireless Communications and Mobile Computing Conference (IWCMC) IEEE Nicosia Cyprus 2014;700\u2013705.","DOI":"10.1109\/IWCMC.2014.6906441"},{"key":"e_1_2_9_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2016.05.013"},{"key":"e_1_2_9_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.862"},{"key":"e_1_2_9_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2014.08.018"},{"key":"e_1_2_9_31_1","doi-asserted-by":"crossref","unstructured":"LiX LiuJ LiX SunW.Rgte: a reputation\u2010based global trust establishment in vanets.2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS) IEEE Xi\u2018an China 2013;210\u2013214.","DOI":"10.1109\/INCoS.2013.91"},{"key":"e_1_2_9_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2013.000028"},{"key":"e_1_2_9_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2388581"},{"key":"e_1_2_9_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36577-X_9"},{"key":"e_1_2_9_35_1","doi-asserted-by":"publisher","DOI":"10.1201\/9781420085891"},{"key":"e_1_2_9_36_1","doi-asserted-by":"crossref","unstructured":"LiD HuangH LiX LiM TangF.A distance\u2010based directional broadcast protocol for urban vehicular ad hoc network.International Conference on Wireless Communications Networking and Mobile Computing 2007. WiCom 2007 IEEE Shanghai China 2007;1520\u20131523.","DOI":"10.1109\/WICOM.2007.383"},{"key":"e_1_2_9_37_1","doi-asserted-by":"crossref","unstructured":"ViriyasitavatW BaiF TonguzOK.Uv\u2010cast: an urban vehicular broadcast protocol.2010 IEEE Vehicular Networking Conference (VNC) New Jersey USA 2010;25\u201332.","DOI":"10.1109\/VNC.2010.5698266"},{"key":"e_1_2_9_38_1","unstructured":"BejanA LawrenceR.Peer\u2010to\u2010peer cooperative driving.Proceedings of ISCIS Istanbul Turkey 2002;259\u2013264."},{"key":"e_1_2_9_39_1","unstructured":"BronstedJ KristensenLM.Specification and performance evaluation of two zone dissemination protocols for vehicular ad\u2010hoc networks.Proceedings of the 39th Annual Symposium on Simulation IEEE Huntsville Alabama USA 2006;68\u201379."},{"key":"e_1_2_9_40_1","doi-asserted-by":"crossref","unstructured":"DornbushS JoshiA.Streetsmart traffic: discovering and disseminating automobile congestion using vanet's.IEEE 65th Vehicular Technology Conference 2007. VTC2007\u2010Spring IEEE Dublin Ireland 2007;11\u201315.","DOI":"10.1109\/VETECS.2007.15"},{"volume-title":"Introduction to Network Simulator NS2","year":"2011","author":"Issariyakul T","key":"e_1_2_9_41_1"},{"key":"e_1_2_9_42_1","doi-asserted-by":"crossref","unstructured":"MartinezFJ FogueM CollM CanoJC CalafateCT ManzoniP.Assessing the impact of a realistic radio propagation model on vanet scenarios using real maps.2010 9th IEEE International Symposium on Network Computing and Applications (NCA) IEEE Cambridge MA USA 2010;132\u2013139.","DOI":"10.1109\/NCA.2010.24"},{"key":"e_1_2_9_43_1","unstructured":"FogueM GarridoP MartinezFJ CanoJC CalafateCT ManzoniP.A realistic simulation framework for vehicular networks.Proceedings of the 5th International ICST Conference on Simulation Tools and Techniques ICST (Institute for Computer Sciences Social\u2010Informatics and Telecommunications Engineering) Sirmione\u2010Desenzano Italy 2012;37\u201346."},{"key":"e_1_2_9_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0594-6"},{"key":"e_1_2_9_45_1","doi-asserted-by":"crossref","unstructured":"MartinezFJ CanoJC CalafateCT ManzoniP.Citymob: a mobility model pattern generator for vanets.IEEE International Conference on Communications workshops 2008. ICC Workshops' 08 IEEE Reno Nevada USA 2008;370\u2013374.","DOI":"10.1109\/ICCW.2008.76"},{"key":"e_1_2_9_46_1","unstructured":"BehrischM BiekerL ErdmannJ KrajzewiczD.SUMO\u2013simulation of urban mobility.The Third International Conference on Advances in System Simulation (SIMUL 2011) 63\u201368 2011;63\u07dd68."},{"key":"e_1_2_9_47_1","unstructured":"KrajzewiczD HertkornG R\u00f6sselC WagnerP.SUMO (simulation of urban mobility)\u2010an open\u2010source traffic simulation.Proceedings of the 4th Middle East Symposium on Simulation and Modelling (MESM20002) Sharjah UAE 2002;183\u2013187."}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1618","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fsec.1618","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/sec.1618","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,3]],"date-time":"2023-09-03T00:12:31Z","timestamp":1693699951000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/sec.1618"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,6]]},"references-count":46,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2016,11,25]]}},"alternative-id":["10.1002\/sec.1618"],"URL":"https:\/\/doi.org\/10.1002\/sec.1618","archive":["Portico"],"relation":{},"ISSN":["1939-0114","1939-0122"],"issn-type":[{"type":"print","value":"1939-0114"},{"type":"electronic","value":"1939-0122"}],"subject":[],"published":{"date-parts":[[2016,10,6]]}}}