Research Article

A Privacy-Preserving Attack-Resistant Trust Model for Internet of Vehicles Ad Hoc Networks

Figure 3

Data integrity hashing algorithm.