REFERENCES
Al-Kahtani, M. S. (2012). Survey on security attacks in ve-
hicular ad hoc networks (vanets). In Signal Process-
ing and Communication Systems (ICSPCS), 2012 6th
International Conference on, pages 1–9. IEEE.
Alam, K. M., Saini, M., and El Saddik, A. (2015). Toward
social internet of vehicles: Concept, architecture, and
applications. IEEE Access, 3:343–357.
Badin, F., Le Berr, F., Briki, H., Dabadie, J., Petit, M., Ma-
gand, S., and Condemine, E. (2013). Evaluation of
evs energy consumption influencing factors, driving
conditions, auxiliaries use, driver’s aggressiveness. In
Electric Vehicle Symposium and Exhibition (EVS27),
2013 World, pages 1–12. IEEE.
Bayram, I. S. and Papapanagiotou, I. (2014). A survey on
communication technologies and requirements for in-
ternet of electric vehicles. EURASIP Journal on Wire-
less Communications and Networking, 2014(1):223.
Cadenas, J., Megson, G. M., Sherratt, R., and Huerta, P.
(2012). Fast median calculation method. Electronics
letters, 48(10):558–560.
Dahmane, S., Kerrache, C. A., Lagraa, N., and Lorenz, P.
(2017). Weistars: A weighted trust-aware relay se-
lection scheme for vanet. In Communications (ICC),
2017 IEEE International Conference on, pages 1–6.
IEEE.
Falk, R. and Fries, S. (2012). Electric vehicle charging
infrastructure security considerations and approaches.
Proc. of INTERNET, pages 58–64.
Hu, H., Lu, R., and Zhang, Z. (2015). Vtrust: a robust
trust framework for relay selection in hybrid vehicular
communications. In Global Communications Confer-
ence (GLOBECOM), 2015 IEEE, pages 1–6. IEEE.
Klir, G. and Yuan, B. (1995). Fuzzy sets and fuzzy logic,
volume 4. Prentice hall New Jersey.
Krajzewicz, D., Bonert, M., and Wagner, P. (2006).
The open source traffic simulation package sumo.
RoboCup 2006.
Li, W. and Song, H. (2016). Art: An attack-resistant trust
management scheme for securing vehicular ad hoc
networks. IEEE Transactions on Intelligent Trans-
portation Systems, 17(4):960–969.
M
´
armol, F. G. and P
´
erez, G. M. (2012). Trip, a trust and
reputation infrastructure-based proposal for vehicular
ad hoc networks. Journal of Network and Computer
Applications, 35(3):934–941.
Mazilu, S., Teler, M., and Dobre, C. (2011). Securing ve-
hicular networks based on data-trust computation. In
P2P, Parallel, Grid, Cloud and Internet Computing
(3PGCIC), 2011 International Conference on, pages
51–58. IEEE.
Oluoch, J. O. (2015). A unified framework for trust manage-
ment in Vehicular Ad Hoc Networks (VANET). PhD
thesis, Oakland University.
Raya, M., Papadimitratos, P., Gligor, V. D., and Hubaux,
J.-P. (2008). On data-centric trust establishment in
ephemeral ad hoc networks. In INFOCOM 2008.
The 27th Conference on Computer Communications.
IEEE, pages 1238–1246. IEEE.
Saade, J. J. and Diab, H. B. (2004). Defuzzification methods
and new techniques for fuzzy controllers.
Soleymani, S. A., Abdullah, A. H., Hassan, W. H., Anisi,
M. H., Goudarzi, S., Baee, M. A. R., and Man-
dala, S. (2015). Trust management in vehicular ad
hoc network: a systematic review. EURASIP Jour-
nal on Wireless Communications and Networking,
2015(1):146.
Soleymani, S. A., Abdullah, A. H., Zareei, M., Anisi, M. H.,
Vargas-Rosales, C., Khan, M. K., and Goudarzi, S.
(2017). A secure trust model based on fuzzy logic in
vehicular ad hoc networks with fog computing. IEEE
Access, 5:15619–15629.
Soni, S., Sharma, K., and Chaurasia, B. K. (2015). Trust
based scheme for location finding in vanets. In Ad-
vances in Optical Science and Engineering, pages
425–432. Springer.
Sumra, I. A., Hasbullah, H. B., and AbManan, J.-l. B.
(2015). Attacks on security goals (confidentiality, in-
tegrity, availability) in vanet: a survey. In Vehicu-
lar Ad-Hoc Networks for Smart Cities, pages 51–61.
Springer.
Sun, S.-h., Hu, J.-l., Peng, Y., Pan, X.-m., Zhao, L., and
Fang, J.-y. (2016). Support for vehicle-to-everything
services based on lte. IEEE Wireless Communications,
23(3):4–8.
Wang, C.-X., Haider, F., Gao, X., You, X.-H., Yang,
Y., Yuan, D., Aggoune, H., Haas, H., Fletcher, S.,
and Hepsaydir, E. (2014). Cellular architecture and
key technologies for 5g wireless communication net-
works. IEEE Communications Magazine, 52(2):122–
130.
Wei, Z., Yu, F. R., and Boukerche, A. (2014). Trust based
security enhancements for vehicular ad hocnetworks.
In Proceedings of the fourth ACM international sym-
posium on Development and analysis of intelligent ve-
hicular networks and applications, pages 103–109.
ACM.
Yang, N. (2013). A similarity based trust and reputa-
tion management framework for vanets. International
Journal of Future Generation Communication and
Networking, 6(2):25–34.
Yao, X., Zhang, X., Ning, H., and Li, P. (2017a). Using trust
model to ensure reliable data acquisition in vanets. Ad
Hoc Networks, 55:107–118.
Yao, Y., Xiao, B., Wu, G., Liu, X., Yu, Z., Zhang, K., and
Zhou, X. (2017b). Voiceprint: A novel sybil attack
detection method based on rssi for vanets. In Depend-
able Systems and Networks (DSN), 2017 47th Annual
IEEE/IFIP International Conference on, pages 591–
602. IEEE.
Zadeh, L. A. (2004). A note on web intelligence, world
knowledge and fuzzy logic. Data & Knowledge Engi-
neering, 50(3):291–304.
Zaidi, K., Milojevic, M., Rakocevic, V., and Rajarajan, M.
(2014). Data-centric rogue node detection in vanets.
In Trust, Security and Privacy in Computing and
Communications (TrustCom), 2014 IEEE 13th Inter-
national Conference on, pages 398–405. IEEE.
SECRYPT 2018 - International Conference on Security and Cryptography
232