
of detection mechanisms to the potential value of col-
laboration can deter cooperation, hampering efforts to
enhance security and performance(Ben Elallid et al.,
2023). Various strategies have been proposed to de-
tect and mitigate misbehavior in such networks. Com-
prehensive reviews, such as those in (van der Heij-
den et al., 2019) and (Loukas et al., 2019), highlight
diverse solutions for cyber-physical systems (CPSs)
and intelligent transportation systems, particularly
for transient networks with unique node constraints.
For example, (Liu et al., 2006) examined attacker-
defender interactions in ad hoc networks, modeling
scenarios where malicious nodes could attack or not
while defenders alternated between monitoring and
non-monitoring states. Their game-theoretic analy-
sis provided valuable insights into optimizing inde-
pendent decision-making strategies (Manshaei et al.,
2013). However, this approach focused on individ-
ual agent interactions and did not address the broader
challenge of identifying misbehaving nodes across an
entire network.
Reputation-based systems rely on building a
credit history for nodes based on their past be-
havior(Hendrikx et al., 2015). While effective in
some contexts, they require continuous monitoring
and long-term data storage, making them less suit-
able for ephemeral networks where connections are
brief(Hendrikx et al., 2015). To address trust and
reliability in vehicular networks, (Attiaoui et al.,
2024) propose a reputation-based game-theoretic trust
mechanism that dynamically adjusts trust matrices
based on past interactions. Unlike traditional ap-
proaches, their framework penalizes malicious behav-
ior while rewarding true contributions without requir-
ing persistent data storage.
In other research, a local revocation process has
been proposed to account for the dynamic nature of
ephemeral networks (Raya et al., 2008) (Arshad et al.,
2018). In this process, a benign node, acting as an
initiator, is assumed to detect or suspect a malicious
node. It then broadcasts the identification (ID) of the
target node, marking it as an accused node. Sub-
sequently, neighboring benign nodes participate in a
local voting-based mechanism to determine whether
the target node should be discredited. The authors of
(Raya et al., 2008) and (Liu et al., 2010) analyzed
this local revocation process as a sequential voting
game, wherein a benign node can adopt one of three
strategies regarding the target node: voting, abstain-
ing, or self-sacrificing. A benign node’s decision to
vote or abstain is guided by economic considerations
within the game. Alternatively, it may employ a self-
sacrificing strategy, invalidating both its identity and
that of the target node.
The author in (Liu et al., 2010) have indicated two
major limitations of revocation processes in VANETs:
first, assuming complete information among nodes,
and second, the problem of false-positive and false-
negative rates in misbehavior detection. To address
these issues, (Alabdel Abass et al., 2017) introduced
an evolutionary game model where benign nodes co-
operate in a voting game in order to refine revocation
decisions and reduce unnecessary or overly aggres-
sive actions. Various other studies proposed weighted
voting schemes in clustering architectures (Raja et al.,
2015) and (Kim, 2016), and collaborative false accu-
sation prevention(Masdari, 2016). (Naja et al., 2020)
tackled the decision-making problems of VANETs by
proposing a GMDP model in order to find the opti-
mal dissemination of alert messages. Their approach
minimizes redundancy and delay while maximizing
message reachability, leveraging Mean Field Approx-
imation (MFA) to take up inter-vehicle dependencies
in decision making.
In (Diakonikolas and Pavlou, 2019) the authors
investigated the inverse power index issue in design-
ing weighted voting games, concluding that the prob-
lem is computationally complex for a wide range of
semi-value families. In another study, (Subba et al.,
2016) proposed an intrusion detection system (IDS)
utilizing election leader concepts and a hybrid IDS
model to reduce continuous node monitoring in mo-
bile ad hoc networks (MANETs). They later ex-
panded on this work in (Subba et al., 2018), incor-
porating a multi-layer game-theoretic approach to ad-
dress challenges related to dynamic network topolo-
gies in VANETs. While these methodologies effec-
tively reduce IDS traffic, they fail to consider the un-
certainties of node behavior and the role of incentives
in local voting games. Other researchers (Kerrache
et al., 2018) explored the impact of incentives on
misbehavior detection within UAV-assisted VANETs.
The authors in (Silva et al., 2019) introduced a voting
mechanism designed to generate new strategies based
on existing expert-derived ones, selecting the most ef-
fective strategies while accounting for opponent mod-
els. However, this framework does not specifically
address the challenge of identifying malicious nodes
in ephemeral networks.
In the absence of centralized oversight, ensuring
trust and cooperation among neighboring nodes in
ephemeral networks becomes critical. However, in-
dividual nodes often act selfishly due to resource con-
straints and uncertainties about the reliability and in-
tentions of others. Addressing these challenges re-
quires incentive mechanisms that encourage collabo-
ration and adapt to varying behaviors under uncertain
conditions. Such mechanisms are essential to detect
VEHITS 2025 - 11th International Conference on Vehicle Technology and Intelligent Transport Systems
530