Efficient Self-organized Trust Management in Location Privacy Enhanced VANETs

Improving the safety of transportation system is the main purpose of vehicle ad-hoc networks (VANETs). In order to improve traffic safety and ensure the event messages reliability, more and more researches have been focused on trust management to resolve the problems. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial requirement in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a self-organized trust management system that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETS. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under collusion and non-collusion attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, no matter whether it is under a fixed silent period (FSP) or random silent period (RSP) location privacy-enhanced scheme.

[1]  Pin-Han Ho,et al.  A Trust Modeling Framework for Message Propagation and Evaluation in VANETs , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.

[2]  Raja Sengupta,et al.  Proceedings of the 1st ACM international workshop on Vehicular ad hoc networks , 2004 .

[3]  Gongjun Yan,et al.  Providing VANET security through active position detection , 2008, Comput. Commun..

[4]  Tim Leinmüller,et al.  Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[5]  K. J. Ray Liu,et al.  Attack-resistant cooperation stimulation in autonomous ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.

[6]  Josep Domingo-Ferrer,et al.  Balanced Trustworthiness, Safety, and Privacy in Vehicle-to-Vehicle Communications , 2010, IEEE Transactions on Vehicular Technology.

[7]  Tim Leinmüller,et al.  Improved security in geographic ad hoc routing through autonomous position verification , 2006, VANET '06.

[8]  Xue Liu,et al.  A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.

[9]  Tim Leinmüller,et al.  POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.

[10]  Tim Leinmüller,et al.  Exploration of adaptive beaconing for efficient intervehicle safety communication , 2010, IEEE Network.

[11]  Yiming Yang,et al.  A re-examination of text categorization methods , 1999, SIGIR '99.

[12]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  Jie Zhang,et al.  A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[14]  Damla Turgut,et al.  Secure traffic data propagation in Vehicular Ad Hoc Networks , 2010, Int. J. Ad Hoc Ubiquitous Comput..

[15]  Jie Lin,et al.  A survey on trust management for intelligent transportation system , 2011, CTS '11.

[16]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[17]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[18]  Pin-Han Ho,et al.  AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[19]  Florian Dotzer,et al.  Enhancing the Security of Local DangerWarnings in VANETs - A Simulative Analysis of Voting Schemes , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[20]  Florian Dotzer,et al.  VARS: a vehicle ad-hoc network reputation system , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[21]  Glenn Geers,et al.  CTS 2011 Workshop Report: the Fourth International Workshop on Computational Transportation Science: (Chicago, Illinois - November 1, 2011) , 2012, SIGSPACIAL.

[22]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[23]  Nai-Wei Lo,et al.  A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..

[24]  Arobinda Gupta,et al.  Detecting misbehaviors in VANET with integrated root-cause analysis , 2010, Ad Hoc Networks.

[25]  Yue Ivan Wu,et al.  Beacon-Aided Adaptive Localization of Noise Sources Aboard a Pass-By Railcar Using a Trackside Microphone Array , 2010, IEEE Transactions on Vehicular Technology.

[26]  Hannes Hartenstein,et al.  Proceedings of the 3rd international workshop on Vehicular ad hoc networks , 2006, MobiCom 2006.

[27]  Sung-Hyuk Cha Comprehensive Survey on Distance/Similarity Measures between Probability Density Functions , 2007 .

[28]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[29]  Nei Kato,et al.  NIS01-2: A Collusion Attack Against OLSR-based Mobile Ad Hoc Networks , 2006, IEEE Globecom 2006.

[30]  Anupam Joshi,et al.  Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory , 2009, 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware.

[31]  Pin-Han Ho,et al.  Security in vehicular ad hoc networks , 2008, IEEE Commun. Mag..

[32]  Hamada M. Zahera,et al.  Query Recommendation for Improving Search Engine Results , 2011, Int. J. Inf. Retr. Res..