{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:10:28Z","timestamp":1774541428197,"version":"3.50.1"},"reference-count":40,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2025,3,18]],"date-time":"2025-03-18T00:00:00Z","timestamp":1742256000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2025,4]]},"abstract":"<jats:title>ABSTRACT<\/jats:title><jats:p>With the rapid development of intelligent transportation systems presents significant opportunities for vehicular ad hoc networks (VANETs) present themselves; yet, these networks also encounter numerous security challenges. In order to maintain road safety and traffic efficiency, information is usually shared through communication between vehicle nodes or between vehicle nodes and roadside units (RSUs). Vehicle nodes, RSUs, and trusted authorities (TAs) constitute the majority of VANETs. An approach to hybrid trust management that is distributed, HTMS\u2010V, is presented to mitigate potential internal attackers and misleading messages in VANETs. This framework considers the attributes of VANETs and employs an enhanced subjective logic model to assess the trustworthiness of vehicle nodes through both direct and indirect trust metrics. Trust links among nodes are formed by information about interactions, and the trustworthiness of messages is determined by the degree of trust between nodes and the distance between them. The assessment outcomes are utilized to detect erroneous communications and malevolent nodes within the network. To assess the efficacy of the proposed approach, four distinct assault scenarios were devised for comparative experiments on the Veins vehicular network simulation platform. The experimental findings indicate that HTMS\u2010V proficiently withstands diverse attacks in VANETs, successfully detecting many false messages and malevolent nodes, even at a malicious node rate of 40%. The percentage of malicious nodes is 3%, 5%, 7%, and 9%, meaning that the overall rates of malicious nodes are 9%, 15%, 21%, and 27%. The malicious node anomaly detection accuracy of the HTMS\u2010V scheme was over 96%, the message judgment accuracy was over 95%, and the false positive rate was less than 4%.<\/jats:p>","DOI":"10.1002\/ett.70110","type":"journal-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T03:33:41Z","timestamp":1742355221000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly"],"prefix":"10.1002","volume":"36","author":[{"given":"Haewon","family":"Byeon","sequence":"first","affiliation":[{"name":"Convergence Department Korea University of Technology and Education  Cheonan Republic of Korea"}]},{"given":"Mohammed E.","family":"Seno","sequence":"additional","affiliation":[{"name":"Department of Computer Sciences, College of Sciences University of Al Maarif  Al Anbar Iraq"}]},{"given":"Ajeet Kumar","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Department of Ece, School of Engineering and Technology Chhatrapati Shahu Ji Maharaj University  Kanpur UP India"}]},{"given":"Azzah","family":"AlGhamdi","sequence":"additional","affiliation":[{"name":"Computer Information Systems Department, College of Computer Science and Information Technology Imam Abdalrhman Bin Faisal University  Khobar Saudi Arabia"}]},{"given":"Ismail","family":"Keshta","sequence":"additional","affiliation":[{"name":"Computer Science and Information Systems Department, College of Applied Sciences AlMaarefa University  Riyadh Saudi Arabia"}]},{"given":"Mukesh","family":"Soni","sequence":"additional","affiliation":[{"name":"Division of Research and Development Lovely Professional University  Phagwara India"},{"name":"Dr. D. Y. Patil Vidyapeeth Dr. D. Y. Patil School of Science &amp; Technology  Tathawade Pune India"}]},{"given":"K. D. V.","family":"Prasad","sequence":"additional","affiliation":[{"name":"Symbiosis Institute of Business Management  Hyderabad India"},{"name":"Symbiosis International (Deemed University)  Pune India"}]},{"given":"Dilora","family":"Abdurakhimova","sequence":"additional","affiliation":[{"name":"Department of Corporate Finance and Securities Tashkent State University of Economics  Tashkent Uzbekistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0542-2790","authenticated-orcid":false,"given":"Mohammed Wasim","family":"Bhatt","sequence":"additional","affiliation":[{"name":"Model Institute of Engineering and Technology  Jammu J&amp;K India"}]}],"member":"311","published-online":{"date-parts":[[2025,3,18]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2619"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2024.05.001"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3865"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2020.100284"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4158"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2022.102894"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2022.108460"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.05.001"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.02.003"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110641"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.06.030"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105760"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2024.103023"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.03.004"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107390"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2016.11.010"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100796"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.12.099"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.prime.2024.100831"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102426"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2023.100127"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asej.2024.103094"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.aej.2023.09.064"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110768"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101945"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104018"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2022.100458"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103672"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2023.100833"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2015.02.018"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2022.04.024"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101115"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.icte.2024.05.008"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2024.100784"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104145"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109401"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2019.100199"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100663"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2024.103677"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108715"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.70110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T07:16:37Z","timestamp":1745478997000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.70110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,18]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,4]]}},"alternative-id":["10.1002\/ett.70110"],"URL":"https:\/\/doi.org\/10.1002\/ett.70110","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"value":"2161-3915","type":"print"},{"value":"2161-3915","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,3,18]]},"assertion":[{"value":"2024-12-02","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70110"}}