A Trust-based Message Evaluation and Propagation Framework in Vehicular Ad-Hoc Networks

In this paper, we propose a trust-based message propagation and evaluation framework to support the effective evaluation of information sent by peers and the immediate control of false information in a VANET. More specifically, our trust-based message propagation collects peers trust opinions about a message sent by a peer (message sender) during the propagation of the message. We improve on an existing cluster-based data routing mechanism by employing a secure and efficient identity-based aggregation scheme for the aggregation and propagation of the senders message and the trust opinions. These trust opinions weighted by the trustworthiness of the peers modeled using a combination of role-based and experience-based trust metrics are used by cluster leaders to compute a ma jority opinion about the senders message, in order to proactively detect false information. Malicious messages are dropped and controlled to a local minimum without further affecting other peers. Our trust-based message evaluation allows each peer to evaluate the trustworthiness of the message by also taking into account other peers trust opinions about the message and the peer-to-peer trust of these peers. The result of the evaluation derives an effective action decision for the peer. We evaluate our framework in simulations of real life traffic scenarios by employing real maps with vehicle entities following traffic rules and road limits. Some entities involved in the simulations are possibly malicious and may send false information to mislead others or spread spam messages to jam the network. Experimental results demonstrate that our framework signicantly improves network scalability by reducing the utilization of wireless bandwidth caused by a large number of malicious messages. Our system is also demonstrated to be effective in mitigating against malicious messages and protecting peers from being affected. Thus, our framework is particularly valuable in the deployment of VANETs by achieving a high level of scalability and effectiveness.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Yih-Chun Hu,et al.  Design and analysis of a lightweight certificate revocation mechanism for VANET , 2009, VANET '09.

[3]  Yang Zhang,et al.  CarTel: a distributed mobile sensor computing system , 2006, SenSys '06.

[4]  Maxim Raya,et al.  Certificate Revocation in Vehicular Networks , 2006 .

[5]  Yu Wang,et al.  Routing in vehicular ad hoc networks: A survey , 2007, IEEE Vehicular Technology Magazine.

[6]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[7]  Vishnu Navda,et al.  A measurement study of inter-vehicular communication using steerable beam directional antenna , 2008, VANET '08.

[8]  Pin-Han Ho,et al.  AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[9]  Hermann Rohling,et al.  SOTIS - a self-organizing traffic information system , 2003, The 57th IEEE Semiannual Vehicular Technology Conference, 2003. VTC 2003-Spring..

[10]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[11]  Kang-Won Lee,et al.  Content Distribution in VANETs Using Network Coding: The Effect of Disk I/O and Processing O/H , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[12]  Liviu Iftode,et al.  TrafficView: traffic data dissemination using car-to-car communication , 2004, MOCO.

[13]  Lingxuan Hu,et al.  Secure aggregation for wireless networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[14]  Raja Sengupta,et al.  Vehicle-to-vehicle safety messaging in DSRC , 2004, VANET '04.

[15]  Giovanni Pau,et al.  Co-operative downloading in vehicular ad-hoc wireless networks , 2005, Second Annual Conference on Wireless On-demand Network Systems and Services.

[16]  Mario Gerla,et al.  Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..

[17]  R. Cohen,et al.  Reputation-oriented reinforcement learning strategies for economically-motivated agents in electronic market environments , 2004 .

[18]  Vijay Varadharajan,et al.  Subjective logic based trust model for mobile ad hoc networks , 2008, SecureComm.

[19]  Ashish Agarwal,et al.  An Information Propagation Scheme for VANETs , 2005 .

[20]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[21]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[22]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[23]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[24]  Luo Jia-hu,et al.  MAC for Dedicated Short Range Communications in Intelligent Transport System , 2005 .

[25]  Brian L. Mark,et al.  Robust cooperative trust establishment for MANETs , 2006, SASN '06.

[26]  Martin Mauve,et al.  Multiple simulator interlinking environment for IVC , 2005, VANET '05.

[27]  Dawn Song,et al.  SIA: Secure information aggregation in sensor networks , 2007, J. Comput. Secur..

[28]  Pin-Han Ho,et al.  ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[29]  Dawn Xiaodong Song,et al.  SIA: secure information aggregation in sensor networks , 2003, SenSys '03.

[30]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[31]  Jie Wu,et al.  Dominating-set-based routing in ad hoc wireless networks , 2002 .

[32]  Fabián E. Bustamante,et al.  An integrated mobility and traffic model for vehicular wireless networks , 2005, VANET '05.

[33]  Sencun Zhu,et al.  Aggregation Protocol for Sensor Networks 2 , 2008 .

[34]  Christian Wewetzer,et al.  Data aggregation and roadside unit placement for a vanet traffic information system , 2008, VANET '08.

[35]  Craig Gentry,et al.  Identity-Based Aggregate Signatures , 2006, Public Key Cryptography.

[36]  MengChu Zhou,et al.  A Position-Based Clustering Technique for Ad Hoc Intervehicle Communication , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[37]  Sencun Zhu,et al.  SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks , 2008 .

[38]  Lars Wischhof,et al.  Information dissemination in self-organizing intervehicle networks , 2005, IEEE Transactions on Intelligent Transportation Systems.

[39]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[40]  Vaduvur Bharghavan,et al.  Routing in ad-hoc networks using minimum connected dominating sets , 1997, Proceedings of ICC'97 - International Conference on Communications.

[41]  Martin Mauve,et al.  Probabilistic aggregation for data dissemination in VANETs , 2007, VANET '07.

[42]  Mary Baker,et al.  Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.

[43]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[44]  Raúl Aquino-Santos,et al.  Performance evaluation of routing protocols in vehicular ad-hoc networks , 2005, Int. J. Ad Hoc Ubiquitous Comput..

[45]  Maxim Raya,et al.  Efficient secure aggregation in VANETs , 2006, VANET '06.

[46]  Ragunathan Rajkumar,et al.  GrooveSim: a topography-accurate simulator for geographic routing in vehicular networks , 2005, VANET '05.

[47]  Jian Li,et al.  Group communications in mobile ad hoc networks , 2004, Computer.

[48]  Sumair Ur Rahman,et al.  Secure crash reporting in vehicular Ad hoc networks , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[49]  Tamer A. ElBatt,et al.  Cooperative collision warning using dedicated short range wireless communications , 2006, VANET '06.

[50]  Amit Kumar Saha,et al.  Modeling mobility for vehicular ad-hoc networks , 2004, VANET '04.

[51]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[52]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[53]  Zhu Han,et al.  Trust modeling and evaluation in ad hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[54]  B. Hofmann-Wellenhof,et al.  Global Positioning System , 1992 .

[55]  Azim Eskandarian,et al.  Mobility management in IVC networks , 2003, IEEE IV2003 Intelligent Vehicles Symposium. Proceedings (Cat. No.03TH8683).