References
- World Health Organization. https://www.who.int/news-room/fact-sheets/detail/road-traffic-injuries; 2020
- Dandala TT, Krishnamurthy V, Alwan R. Internet of vehicles (IoV) for traffic management. In: 2017 International conference on computer, communication and signal processing (IC-CCSP). IEEE; 2017. p. 1–4.
- Chatrati SP, Hossain G, Goyal A, et al. Smart home health monitoring system for predicting type 2 diabetes and hypertension. J King Saud Univ Comput Inform Sci. 2020.
- Gómez Mármol F, Mart´ınez Pérez G. TRIP, a rust and reputation infrastructure-based proposal for vehicular ad hoc networks. J Netw Comput Appl. 2012;35(3):934–941. doi: https://doi.org/10.1016/j.jnca.2011.03.028
- Ostermaier B, Dotzer F, Strassberger M. Enhancing the security of local danger warnings in vanets-a simulative analysis of voting schemes. In: The second international conference on availability, reliability and security (ARES’07). IEEE; 2007. p. 422–431.
- Mishra S, Jain S, Rai C, et al. Security challenges in semantic web of things. In: International conference on innovations in bio-inspired computing and applications. Cham: Springer; 2018. p. 162–169.
- Yan Z, Zhang P, Virtanen T. Trust evaluation based security solution in Adhoc networks. In: Proceedings of the Seventh Nordic workshop on secure IT systems, volume 14. Citeseer; 2003.
- Soleymani SA, Abdullah AH, Zareei M, et al. A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access. 2017;5:15619–15629. doi: https://doi.org/10.1109/ACCESS.2017.2733225
- Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings 1996 IEEE symposium on security and privacy. IEEE; 1996. p. 164–173.
- Ajzen I. The theory of planned behavior. Organ Behav Hum Decis Process. 1991;50(2):179–211. doi: https://doi.org/10.1016/0749-5978(91)90020-T
- Dotzer F, Fischer L, Magiera P. VARS: A vehicle ad-hoc network reputation system. In: Sixth IEEE international symposium on a world of wireless mobile and multimedia networks. IEEE; 2005. p. 454–456.
- Ltifi A, Zouinkhi A, Bouhlel MS. Trust-based scheme for alert spreading in vanet. Procedia Comput Sci. 2015;73:282–289. doi: https://doi.org/10.1016/j.procs.2015.12.031
- Minhas UF, Zhang J, Tran T, et al. A multifaceted approach to modeling agent trust for effective communi- cation in the application of mobile ad hoc vehicular networks. IEEE Trans Syst Man Cybernet C Appl Rev. 2010;41(3):407–420. doi: https://doi.org/10.1109/TSMCC.2010.2084571
- Haddadou N, Rachedi A, Ghamri-Doudane Y. A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Trans Veh Technol. 2014;64(8):3657–3674. doi: https://doi.org/10.1109/TVT.2014.2360883
- Gurung S, Lin D, Squicciarini A, et al. Information-oriented trustworthiness evaluation in vehicular ad-hoc net- works. In: International conference on network and system security. Springer; 2013. p. 94–108.
- Ahmad F, Franqueira VN, Adnane A. TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks. IEEE Access. 2018;6:28643–28660. doi: https://doi.org/10.1109/ACCESS.2018.2837887
- Guleng S, Wu C, Chen X, et al. Decentralized trust evaluation in vehicular internet of things. IEEE Access. 2019;7:15980–15988. doi: https://doi.org/10.1109/ACCESS.2019.2893262
- Chen R, Bao F, Chang MJ, et al. Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans Parallel Distrib Syst. 2013;25(5):1200–1210. doi: https://doi.org/10.1109/TPDS.2013.116
- Raya M, Papadimitratos P, Gligor VD, et al. On data-centric trust establishment in ephemeral ad hoc networks. In: IEEE INFOCOM 2008 – The 27th conference on computer communications. IEEE; 2008. p. 1238–1246.
- Huang Z, Ruj S, Cavenaghi MA, et al. A social network approach to trust management in vanets. Peer-to-Peer Netw Appl. 2014;7(3):229–242. doi: https://doi.org/10.1007/s12083-012-0136-8
- Venkateswaramma PV, Ravi Prakash Reddy I. Node pattern state and trust-rate base route selection for reliable data transmission in mobile ad hoc networks. Int J Comput Appl. 2019: 1–7.
- Lo N-W, Tsai H-C. A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP J Wirel Commun Netw. 2009;2009(1):125348. doi: https://doi.org/10.1155/2009/125348
- Ya W, Meng-Ran Z, Lei N, et al. Trust analysis of WSN nodes based on fuzzy theory. Int J Comput Appl. 2020;42(1):52–56.
- Liang W, Long J, Weng T-H, et al. TBRS: A trust based recommendation scheme for vehicular cps network. Future Gener Comput Syst. 2019;92:383–398. doi: https://doi.org/10.1016/j.future.2018.09.002
- Ahmed S, Tepe K. Recommendation trust for improved malicious node detection in ad hoc networks. In: 2017 IEEE 86th vehicular Technology Conference (VTC-Fall). IEEE; 2017. p. 1–5.
- Ullah N, Kong X, Ning Z, et al. Emergency warning messages dissemination in vehicular social networks: A trust based scheme. Vehicular Commun. 2020;22:100199. doi: https://doi.org/10.1016/j.vehcom.2019.100199
- Rawat DB, Yan G, Bista BB, et al. Trust on the security of wireless vehicular ad-hoc networking. AdHoc Sensor Wireless Netw. 2015;24(3–4):283–305.
- Li W, Song H. ART: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Trans Intell Transp Syst. 2015;17(4):960–969. doi: https://doi.org/10.1109/TITS.2015.2494017
- Becker GS. Crime and punishment: An economic approach’, journal of political economy. Int Libr Crit Writ Econ. 1999;111:141–189.
- Gibbs JP. Crime, punishment, and deterrence. Southwest Social Sci Quarter. 1968: 515–530.
- Lawler III EE, Lloyd Suttle J. Expectancy theory and job behavior. Organ Behav Hum Perform. 1973;9(3):482–503. doi: https://doi.org/10.1016/0030-5073(73)90066-4
- Bandura A. Self-efficacy: toward a unifying theory of behavioral change. Psychol Rev. 1977;84(2):191. doi: https://doi.org/10.1037/0033-295X.84.2.191
- Fishbein M, Ajzen I. Predicting and changing behavior: the reasoned action approach. Psychology Press; 2011.
- Ajzen I. Perceived behavioral control, self-efficacy, locus of control, and the theory of planned behavior 1. J Appl Soc Psychol. 2002;32(4):665–683. doi: https://doi.org/10.1111/j.1559-1816.2002.tb00236.x
- Watson JB. Classics in the history of psychology. Psychol Rev. 1913;20:158–177. doi: https://doi.org/10.1037/h0074428
- Friedkin NE. The attitude-behavior linkage in behavioral cascades. Soc Psychol Q. 2010;73(2):196–213. doi: https://doi.org/10.1177/0190272510369661
- Piao C, Zhao J, Feng J. Research on entropy-based collaborative filtering algorithm. In: IEEE International Conference on e-Business Engineering (ICEBE’07). IEEE; 2007. p. 213–220.
- Foa EB, Kozak MJ. Emotional processing of fear: exposure to corrective information. Psychol Bull. 1986;99(1):20. doi: https://doi.org/10.1037/0033-2909.99.1.20
- Josang A, Ismail R. The beta reputation system. Proceedings of the 15th Bled Electronic Commerce Conference. 2002;5:2502–2511.
- Haklay M, Weber P. Open street map: user-generated street maps. IEEE Pervasive Comput. 2008;7(4):12–18. doi: https://doi.org/10.1109/MPRV.2008.80
- Krajzewicz D, Bonert M, Wagner P. The open source traffic simulation package sumo. RoboCup. 2006;2006.