Research Article

Named Data Networking-Based On-Demand Secure Vehicle-To-Vehicle Communications

Figure 11

Region 1 and Region 2 malicious node detection.