Research Article
An Efficient and Secure Malicious User Detection Scheme Based on Reputation Mechanism for Mobile Crowdsensing VANET
| Parameters | Description |
| | The number of subregions | | The number of PVs in the subregion | | The -th participating vehicle in the -th subregion | | The whole sensing region | | The -th sensing subregion | | The number of PVs in | | The subleader in | | The identity information of | | The package information uploaded by | | The public key of | | The secret key of | | The -th historical reputation value of | | The mean of -time historical reputation values of | | The latest reputation value of | | The raw sensing data of | | The valuable sensing data of | | The proportion of data uploading by | | The historical data quality evaluation result of | | The new data quality evaluation result of | | The reputation history of | | The data unbiasedness of | | The old data unbiasedness of | | The deviation between and the mean value of all data of | | The leadership of | | The old leadership of | | The number of times of as subleader | | The space force of | | The old space force of |
|
|