A Trust-Based Reputation System for Security in the Internet of Vehicles (IoV)
DOI:
https://doi.org/10.15575/join.v10i2.1632Keywords:
Internet of Vehicles (IoV) Attack Security Trust ReputationAbstract
References
[1] Yang, C., Ma, Y., Xie, B. et al. Multi-user covert communication in power internet of things networks. Int. J. Inf. Secur. 24, 49 (2025). https://doi.org/10.1007/s10207-024-00960-7
[2] Zainab Saadoon Naser, Hend Marouane Belguith, Ahmed Fakhfakh, (2024), Traffic Management Based on Cloud and MEC Architecture with Evolutionary Approaches towards AI: A Review, "International Journal of Online and Biomedical Engineering", pp. 19-36, https://doi.org/10.3991/ijoe.v20i12.49787
[3] Iturbe-Araya, J.I., Rifà-Pous, H. Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization. Int. J. Inf. Secur. 24, 45 (2025). https://doi.org/10.1007/s10207-024-00961-6
[4] Dhibi, N., Makhlouf, A. M., & Zerai, F. (2025). Reputation-based Security for IoV Environment. IAENG International Journal of Computer Science, 52(4).
[5] Ouechtati, H., Nadia, B.A. and Lamjed, B.S. A fuzzy logic-based model for filtering dishonest recommendations in the Social Internet of Things. J Ambient Intell Human Comput 14, 6181–6200 (2023). https://doi.org/10.1007/s12652-021-03127-7
[6] N. Dhibi, A. M. Makhlouf and F. Zerai, , (2022), ” Reputation management for trusted VCC architecture,” 2022 International Wireless Communications and Mobile Computing (IWCMC), Dubrovnik, Croatiapp. 737-742, doi: 10.1109/IWCMC55113.2022.9824735.
[7] Chaogang Tang, Huaming Wu, (2022), Reputation-based service provisioning for vehicular fog computing, Journal of Systems Architecture, Volume 131, 102735, ISSN 1383-7621, https://doi.org/10.1016/j.sysarc.2022.102735.
[8] Anika Anwar, Talal Halabi, Mohammad Zulkernine, (2022), A coalitional security game against data integrity attacks in autonomous vehicle networks, Vehicular Communications, Volume 37, 100517, ISSN 2214-2096, https://doi.org/10.1016/j.vehcom.2022.100517
[9] Soumaya Bounaira, Ahmed Alioua, Ismahane Souici, Blockchain-enabled trust management for secure content caching in mobile edge computing using deep reinforcement learning, Internet of Things, Volume 25, 2024, 101081, ISSN 2542-6605, https://doi.org/10.1016/j.iot.2024.101081.
[10] Jegatheesan, D., Arumugam, C. SIoV-FTFSA-CAOA: a fuzzy trust-based approach for enhancing security and energy efficiency in social internet of vehicles. Wireless Netw (2024). https://doi.org/10.1007/s11276-023-03626-9
[11] Gaba, P.; Raw, R.S.; Kaiwartya, O.; Aljaidi, (2024), M. B-SAFE: Blockchain-Enabled Security Architecture for Connected Vehicle Fog Environment. Sensors 2024, 24, 1515. https://doi.org/10.3390/s24051515
[12] Z. Abou El Houda, H. Moudoud, B. Brik and L. Khoukhi, "Blockchain-Enabled Federated Learning for Enhanced Collaborative Intrusion Detection in Vehicular Edge Computing," in IEEE Transactions on Intelligent Transportation Systems, vol. 25, no. 7, pp. 7661-7672, July 2024, doi: 10.1109/TITS.2024.3351699.
[13] K. Gu, X. Ouyang and Y. Wang, (2024), "Malicious Vehicle Detection Scheme Based on Spatio-Temporal Features of Traffic Flow Under Cloud-Fog Computing-Based IoVs," in IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109/TITS.2024.3369974.
[14] Liu, Q.; Gong, J.; Liu, Q. Blockchain-Assisted Reputation Management Scheme for Internet of Vehicles. Sensors 2023, 23, 4624. https://doi.org/10.3390/s23104624
[15] Srivastava, S., Agarwal, D., Chaurasia, B.K. et al. Blockchain-based trust management for data exchange in internet of vehicle network. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-18874-w
[16] Li, H., Han, D. Blockchain-assisted secure message authentication with reputation management for VANETs. J Supercomput 79, 19903–19933 (2023). https://doi.org/10.1007/s11227-023-05394-x
[17] [17] R. Chen and Y. Guan, "Hierarchical Reputation Consensus Model for VANET," in IEEE Access, vol. 13, pp. 3521-3531, 2025, doi: 10.1109/ACCESS.2024.3525188.
[18] Shan, Y. (2025). AN EFFICIENT CROSS-DOMAIN AUTHENTICATION SCHEME FOR INTERNET OF VEHICLES (IOV) BASED ON REPUTATION. Journal of Computer Science and Electrical Engineering ISSN: 2663-1946 DOI: https://doi.org/10.61784/jcsee3040
[19] Su, Z.; Cheng, R.; Li, C.; Chen, M.; Zhu, J.; Long, Y. Federated Learning and Reputation-Based Node Selection Scheme for Internet of Vehicles. Electronics 2025, 14, 303. https://doi.org/10.3390/electronics14020303
[20] D. Mukathe, W. Di, W. Ahmed and T. Worku, "Blockchain-Powered Authenticated Key Agreement Scheme with Reputation-Incentive Mechanism for Vehicle-to-Vehicle Communication in IoV," in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2025.3558278
[21] Jain, A., Kumar, A., Mahadev, Chaudhary, J. K., & Singh, S. (2025). Trust‐Based Reliability Scheme for Secure Data Sharing with Internet of Vehicles Networks. Internet Technology Letters, 8(2), e70000. https://doi.org/10.1002/itl2.70000
[22] Hussain, M.; Mehmood, A.; Khan, M.A.; Khan, R.; Lloret, J. Reputation-Based Leader Selection Consensus Algorithm with Rewards for Blockchain Technology. Computers 2025, 14, 20. https://doi.org/10.3390/computers14010020.
[23] Siddiqui, S.A.; Mahmood, A.; Sheng, Q.Z.; Suzuki, H.; Ni, W. A Survey of Trust Management in the Internet of Vehicles. Electronics 2021, 10, 2223. https://doi.org/10.3390/electronics10182223
[24] Muhammad Sameer Sheikh, Jun Liang, Wensong Wang, “Security and Privacy in Vehicular Ad Hoc Network and Vehicle Cloud Computing: A Survey,”, Wireless Communications and Mobile Edge 2020. https://doi.org/10.1155/2020/5129620
[25] Jin, H., Khodaei, M., & Papadimitratos, P. (2017). Security and privacy in vehicular social networks. In Vehicular Social Networks (pp. 155-169). CRC Press.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2025 Dhibi Nozha, Amel Meddeb Makhlouf, Faouzi Zerai

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License







