{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:49:28Z","timestamp":1743266968287},"reference-count":43,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Ad Hoc Networks"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1016\/j.adhoc.2022.103045","type":"journal-article","created":{"date-parts":[[2022,11,16]],"date-time":"2022-11-16T06:50:20Z","timestamp":1668581420000},"page":"103045","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":13,"special_numbering":"C","title":["Reliable task offloading mechanism based on trusted roadside unit service for internet of vehicles"],"prefix":"10.1016","volume":"139","author":[{"given":"Ming","family":"Mao","sequence":"first","affiliation":[]},{"given":"Tao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.adhoc.2022.103045_bib0001","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1109\/JIOT.2017.2750180","article-title":"Mobile edge computing: a survey","volume":"5","author":"Abbas","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2022.103045_bib0002","article-title":"A comprehensive survey on vehicular networking for safe and efficient driving in smart transportation: a focus on systems, protocols, and applications","volume":"31","author":"Jeong","year":"2021","journal-title":"Veh. Commun."},{"issue":"5","key":"10.1016\/j.adhoc.2022.103045_bib0003","doi-asserted-by":"crossref","first-page":"2795","DOI":"10.1109\/TNET.2015.2487344","article-title":"Efficient Multi-User computation offloading for Mobile-Edge cloud computing","volume":"24","author":"Chen","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"5","key":"10.1016\/j.adhoc.2022.103045_bib0004","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1109\/JIOT.2016.2579198","article-title":"Edge computing: vision and challenges","volume":"3","author":"Shi","year":"2016","journal-title":"IEEE Internet Things J."},{"issue":"10","key":"10.1016\/j.adhoc.2022.103045_bib0005","doi-asserted-by":"crossref","first-page":"10200","DOI":"10.1109\/JIOT.2020.2987070","article-title":"Edge-computing-enabled smart cities: a comprehensive survey","volume":"7","author":"Khan","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"3","key":"10.1016\/j.adhoc.2022.103045_bib0006","doi-asserted-by":"crossref","first-page":"1628","DOI":"10.1109\/COMST.2017.2682318","article-title":"Mobile edge computing: a survey on architecture and computation offloading","volume":"19","author":"Mach","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"9","key":"10.1016\/j.adhoc.2022.103045_bib0007","doi-asserted-by":"crossref","first-page":"2490","DOI":"10.1109\/TITS.2017.2655498","article-title":"Parked cars are excellent roadside units","volume":"18","author":"Reis","year":"2017","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"6","key":"10.1016\/j.adhoc.2022.103045_bib0008","doi-asserted-by":"crossref","first-page":"4961","DOI":"10.1109\/JIOT.2020.2972041","article-title":"Dependency-aware task scheduling in vehicular edge computing","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.adhoc.2022.103045_bib0009","doi-asserted-by":"crossref","first-page":"1319","DOI":"10.1109\/TMC.2020.3025116","article-title":"Partial computation offloading and adaptive task scheduling for 5G-enabled vehicular networks","volume":"21","author":"Ning","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.adhoc.2022.103045_bib0010","doi-asserted-by":"crossref","first-page":"56214","DOI":"10.1109\/ACCESS.2018.2872767","article-title":"Which targets to protect in critical infrastructures - a game-theoretic solution from a network science perspective","volume":"6","author":"Li","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2022.103045_bib0011","doi-asserted-by":"crossref","first-page":"121522","DOI":"10.1109\/ACCESS.2021.3109264","article-title":"Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: a survey","volume":"9","author":"Al-Shareeda","year":"2021","journal-title":"IEEE Access"},{"issue":"2","key":"10.1016\/j.adhoc.2022.103045_bib0012","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/MITS.2020.2985024","article-title":"A survey of authentication techniques in vehicular Ad-Hoc networks","volume":"13","author":"Farooq","year":"2021","journal-title":"IEEE Intell. Transp. Syst. Mag."},{"key":"10.1016\/j.adhoc.2022.103045_bib0013","series-title":"Proc. in International Conference on Trust Management","first-page":"77","article-title":"\u2018Trust management survey","volume":"3477","author":"Ruohomaa","year":"2005"},{"issue":"2","key":"10.1016\/j.adhoc.2022.103045_bib0014","doi-asserted-by":"crossref","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","article-title":"A survey on recent advances in vehicular network security, trust, and privacy","volume":"20","author":"Lu","year":"2019","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"16","key":"10.1016\/j.adhoc.2022.103045_bib0015","first-page":"3594","article-title":"The social internet of things (siot)\u2013when social networks meet the internet of things: concept, architecture and network characterization","volume":"56","author":"tzori","year":"2012","journal-title":"Comput. Netw. Chem. Lab., Symp."},{"issue":"5","key":"10.1016\/j.adhoc.2022.103045_bib0016","doi-asserted-by":"crossref","first-page":"2553","DOI":"10.1109\/TITS.2020.2973715","article-title":"Trust in VANET: a survey of current solutions and future research opportunities","volume":"22","author":"Hussain","year":"2021","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"10.1016\/j.adhoc.2022.103045_bib0017","doi-asserted-by":"crossref","first-page":"117772","DOI":"10.1109\/ACCESS.2021.3107467","article-title":"RTEAM: risk-based trust evaluation advanced model for VANETs","volume":"9","author":"Atwa","year":"2021","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2022.103045_bib0018","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1186\/s13638-015-0353-y","article-title":"\u2018Trust management in vehicular ad hoc network: a systematic review","volume":"1","author":"Soleymani","year":"2015","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"10.1016\/j.adhoc.2022.103045_bib0019","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.adhoc.2016.10.011","article-title":"Using trust model to ensure reliable data acquisition in VANETs","volume":"5","author":"Yao","year":"2017","journal-title":"Ad Hoc Networks"},{"issue":"12","key":"10.1016\/j.adhoc.2022.103045_bib0020","doi-asserted-by":"crossref","first-page":"7929","DOI":"10.1109\/TIE.2015.2425357","article-title":"A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks","volume":"62","author":"Dias","year":"2015","journal-title":"IEEE Trans. Ind. Electron."},{"key":"10.1016\/j.adhoc.2022.103045_bib0021","series-title":"Proceedings of the 1st Wksp. Social Network Systems (SocialNets '08)","first-page":"43","article-title":"Roadspeak: enabling voice chat on roadways using vehicular social networks","author":"Smaldone","year":"2008"},{"key":"10.1016\/j.adhoc.2022.103045_bib0022","doi-asserted-by":"crossref","first-page":"2967","DOI":"10.1109\/ACCESS.2017.2670024","article-title":"A cloud-based trust management framework for vehicular social networks","volume":"5","author":"Chen","year":"2017","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2022.103045_bib0023","series-title":"IEEE INFOCOM 2020-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","first-page":"793","article-title":"QuickWalk: quick trust assessment for vehicular social networks","author":"Shen","year":"2020"},{"key":"10.1016\/j.adhoc.2022.103045_bib0024","series-title":"2017 IEEE 85th Vehicular Technology Conference (VTC Spring)","first-page":"1","article-title":"Social-aware bootstrapping and trust establishing mechanism for vehicular social networks","author":"Alishev","year":"2017"},{"key":"10.1016\/j.adhoc.2022.103045_bib0025","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1137\/1035004","article-title":"The perron-frobenius theorem and the ranking of football teams","volume":"35","author":"Keener","year":"1993","journal-title":"SIAM Rev."},{"key":"10.1016\/j.adhoc.2022.103045_bib0026","doi-asserted-by":"crossref","first-page":"62371","DOI":"10.1109\/ACCESS.2018.2868002","article-title":"Secure roadside unit hotspot against eavesdropping based traffic analysis in edge computing based internet of vehicles","volume":"6","author":"Huang","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2022.103045_bib0027","doi-asserted-by":"crossref","first-page":"23626","DOI":"10.1109\/ACCESS.2018.2831898","article-title":"A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion","volume":"6","author":"Yuan","year":"2018","journal-title":"IEEE Access"},{"key":"10.1016\/j.adhoc.2022.103045_bib0028","doi-asserted-by":"crossref","unstructured":"N. V. Abhishek, M. N. Aman, T. J. Lim and B. Sikdar, \u201cDRiVe: detecting malicious roadside units in the internet of vehicles with low latency data integrity,\u201d IEEE Internet Things J., doi: 10.1109\/JIOT.2021.3097809.","DOI":"10.1109\/JIOT.2021.3097809"},{"issue":"5","key":"10.1016\/j.adhoc.2022.103045_bib0029","doi-asserted-by":"crossref","first-page":"3157","DOI":"10.1109\/JIOT.2020.3044296","article-title":"AIT: an AI-enabled trust management system for vehicular networks using blockchain technology","volume":"8","author":"Zhang","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2022.103045_bib0030","series-title":"2019 IEEE\/CIC International Conference on Communications in China (ICCC)","first-page":"42","article-title":"Detecting RSU misbehavior in vehicular edge computing","author":"Abhishek","year":"2019"},{"issue":"5","key":"10.1016\/j.adhoc.2022.103045_bib0031","doi-asserted-by":"crossref","first-page":"3910","DOI":"10.1109\/JIOT.2019.2951619","article-title":"A decentralized and trusted edge computing platform for internet of things","volume":"7","author":"Cui","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.adhoc.2022.103045_bib0032","doi-asserted-by":"crossref","unstructured":"W. Kong, X. Li, L. Hou, J. Yuan, Y. Gao and S. Yu, \u201cA reliable and efficient task offloading strategy based on multi-feedback trust mechanism for IoT edge computing,\u201d IEEE Internet Things J., doi: 10.1109\/JIOT.2022.3143572.","DOI":"10.1109\/JIOT.2022.3143572"},{"issue":"12","key":"10.1016\/j.adhoc.2022.103045_bib0033","doi-asserted-by":"crossref","first-page":"2734","DOI":"10.1109\/JSAC.2020.3005468","article-title":"Reservation service: trusted relay selection for edge computing services in vehicular networks","volume":"38","author":"Hui","year":"2020","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.adhoc.2022.103045_bib0034","doi-asserted-by":"crossref","first-page":"147313","DOI":"10.1109\/ACCESS.2020.3015550","article-title":"Trustful resource management for service allocation in fog-enabled intelligent transportation systems","volume":"8","author":"Lee","year":"2020","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.adhoc.2022.103045_bib0035","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1109\/TSMCC.2010.2084571","article-title":"A multifaceted approach to modeling agent trust for effective communication in the application of mobile Ad Hoc vehicular networks","volume":"41","author":"Minhas","year":"2011","journal-title":"IEEE Trans. Syst. Man Cybernetic. Part C (Appl. Rev.)"},{"key":"10.1016\/j.adhoc.2022.103045_bib0036","series-title":"Data Networks","author":"Bertsekas","year":"1992"},{"key":"10.1016\/j.adhoc.2022.103045_bib0037","series-title":"Fundamentals of Queueing Theory","author":"Gross","year":"2008"},{"issue":"3","key":"10.1016\/j.adhoc.2022.103045_bib0038","doi-asserted-by":"crossref","first-page":"587","DOI":"10.1109\/JSAC.2018.2815360","article-title":"Task offloading for mobile edge computing in software defined ultra-dense network","volume":"36","author":"Chen","year":"2018","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"4","key":"10.1016\/j.adhoc.2022.103045_bib0039","doi-asserted-by":"crossref","first-page":"974","DOI":"10.1109\/TPDS.2014.2316834","article-title":"Decentralized computation offloading game for mobile cloud computing","volume":"26","author":"Chen","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"10","key":"10.1016\/j.adhoc.2022.103045_bib0040","doi-asserted-by":"crossref","first-page":"2101","DOI":"10.1109\/TMC.2014.2374154","article-title":"Recommendation based trust model with an effective defence scheme for MANETs","volume":"14","author":"Shabut","year":"2015","journal-title":"IEEE Trans. Mob. Comput."},{"key":"10.1016\/j.adhoc.2022.103045_bib0041","doi-asserted-by":"crossref","DOI":"10.1016\/j.engappai.2020.103756","article-title":"Trust management and evaluation for edge intelligence in the Internet of Things","volume":"94","author":"Qureshi","year":"2020","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"3","key":"10.1016\/j.adhoc.2022.103045_bib0042","doi-asserted-by":"crossref","first-page":"4377","DOI":"10.1109\/JIOT.2018.2876298","article-title":"Joint load balancing and offloading in vehicular edge computing and networks","volume":"6","author":"Dai","year":"2019","journal-title":"IEEE Internet Things J."},{"issue":"6","key":"10.1016\/j.adhoc.2022.103045_bib0043","doi-asserted-by":"crossref","first-page":"4987","DOI":"10.1109\/JIOT.2020.2972061","article-title":"A game-based computation offloading method in vehicular multiaccess edge computing networks","volume":"7","author":"Wang","year":"2020","journal-title":"IEEE Internet Things J."}],"container-title":["Ad Hoc Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870522002177?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1570870522002177?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,25]],"date-time":"2024-05-25T05:30:56Z","timestamp":1716615056000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870522002177"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":43,"alternative-id":["S1570870522002177"],"URL":"https:\/\/doi.org\/10.1016\/j.adhoc.2022.103045","relation":{},"ISSN":["1570-8705"],"issn-type":[{"value":"1570-8705","type":"print"}],"subject":[],"published":{"date-parts":[[2023,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Reliable task offloading mechanism based on trusted roadside unit service for internet of vehicles","name":"articletitle","label":"Article Title"},{"value":"Ad Hoc Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.adhoc.2022.103045","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"103045"}}