Novel Trust Framework for Vehicular Networks

Dedicated short range communication is proposed for vehicle to vehicle communications to learn about significant events in the network from neighboring vehicles. However, these neighbors may be malicious and report incorrect events in order to take advantage of the system. The malicious nodes may also provide incorrect recommendations about their peers in order to exert a stronger influence on the receiver's decision. Incorrect information and malicious nodes render the system unreliable for safety and emergency applications. In order to correctly identify the events as well as malicious nodes, a novel trust framework is proposed in this paper that studies all aspects of the trust in connected vehicle (CV) to CV communications. The nodes iteratively learn about the environment from received messages and then update the trust values of their neighbors. Nodes are classified on the basis of their trust values and reported events are also classified as true and false. Nodes advertise their recommendation about trusted and malicious neighbors. The proposed framework allows nodes to identify and filter recommendations from malicious nodes, and to discern true events. The performance of the proposed framework is evaluated experimentally using false and true positive rates, event detection probability and trust computation error. The proposed framework identifies malicious nodes and true events with high probability of more than 0.92 while keeping the trust computation error below 0.03.

[1]  Ananthram Swami,et al.  LogitTrust : A Logit Regression-based Trust Model for Mobile Ad Hoc Networks , 2014 .

[2]  Rudolf Hornig,et al.  An overview of the OMNeT++ simulation environment , 2008, Simutools 2008.

[3]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[4]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[5]  Sneha Kumar Kasera,et al.  Statistical trust establishment in wireless sensor networks , 2007, 2007 International Conference on Parallel and Distributed Systems.

[6]  Anupam Das,et al.  SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems , 2012, IEEE Transactions on Dependable and Secure Computing.

[7]  Yogesh Malhotra,et al.  Quantitative Modeling of Trust and Trust Management Protocols in Next-Generation Social Networks-Based Wireless Mobile AD HOC Networks , 2014 .

[8]  Weisong Shi,et al.  $RD^{4}$: Role-Differentiated Cooperative Deceptive Data Detection and Filtering in VANETs , 2010, IEEE Transactions on Vehicular Technology.

[9]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[10]  Ananthram Swami,et al.  Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..

[11]  Mario Gerla,et al.  Mobile social network based trust authentication , 2012, 2012 The 11th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[12]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[13]  Kenneth P. Laberteaux,et al.  Efficient coordination and transmission of data for cooperative vehicular safety applications , 2006, VANET '06.

[14]  Victor C. M. Leung,et al.  A Context-Aware Trust-Based Information Dissemination Framework for Vehicular Networks , 2015, IEEE Internet of Things Journal.

[15]  Amit P. Sheth,et al.  Comparative trust management with applications: Bayesian approaches emphasis , 2014, Future Gener. Comput. Syst..

[16]  Ee-Peng Lim,et al.  Computational Trust Models and Machine Learning , 2014 .

[17]  R. Poovendran,et al.  CARAVAN: Providing Location Privacy for VANET , 2005 .

[18]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[19]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[20]  Azzedine Boukerche,et al.  Trust based security enhancements for vehicular ad hocnetworks , 2014, DIVANet '14.

[21]  Klaus Diepold,et al.  A Trust Model for Intervehicular Communication Based on Belief Theory , 2010, 2010 IEEE Second International Conference on Social Computing.

[22]  David Antolino Rivas,et al.  Security on VANETs: Privacy, misbehaving nodes, false information and secure data aggregation , 2011, J. Netw. Comput. Appl..

[23]  S. Buchegger,et al.  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .

[24]  M. A. Razzaque,et al.  Security and Privacy in Vehicular Ad-Hoc Networks: Survey and the Road Ahead , 2013, Wireless Networks and Security.

[25]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[26]  Xuemin Shen,et al.  Trust-based anomaly detection in wireless sensor networks , 2012, 2012 1st IEEE International Conference on Communications in China (ICCC).

[27]  Yi Zhang,et al.  Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).

[28]  Athanasios V. Vasilakos,et al.  ReTrust: Attack-Resistant and Lightweight Trust Management for Medical Sensor Networks , 2012, IEEE Transactions on Information Technology in Biomedicine.

[29]  Muhammad Aurangzeb Ahmad,et al.  Trust, distrust and lack of confidence of users in online social media-sharing communities , 2013, Knowl. Based Syst..

[30]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[31]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[32]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[33]  Ivan Stojmenovic,et al.  Data-centric Misbehavior Detection in VANETs , 2011, ArXiv.

[34]  Saneeha Ahmed,et al.  Misbehaviour detection in vehicular networks using logistic trust , 2016, 2016 IEEE Wireless Communications and Networking Conference.

[35]  András Varga,et al.  An overview of the OMNeT++ simulation environment , 2008, SimuTools.

[36]  Peng Liu,et al.  An Objective Trust Management Framework for Mobile Ad Hoc Networks , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[37]  Maxim Raya,et al.  On the tradeoff between trust and privacy in wireless ad hoc networks , 2010, WiSec '10.

[38]  Kalyani Handal,et al.  Security Enhancements for Mobile Ad Hoc Networks with Trust Management Using Uncertain Reasoning , 2018 .

[39]  Xiaomei Zhang,et al.  Efficient, fast and scalable authentication for VANETs , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[40]  Ciprian Dobre,et al.  Securing Vehicular Networks Based on Data-Trust Computation , 2011, 2011 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[41]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[42]  Siva R K Narla,et al.  The Evolution of Connected Vehicle Technology: From Smart Drivers to Smart Cars to....Self-Driving Cars. , 2013 .

[43]  Chen Chen,et al.  A Scalable and Effective Trust-Based Framework for Vehicular Ad-Hoc Networks , 2010, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[44]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[45]  Azzedine Boukerche,et al.  A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks , 2008, PE-WASUN '08.

[46]  Sidi-Mohammed Senouci,et al.  A new Intrusion Detection Framework for Vehicular Networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[47]  Nai-Wei Lo,et al.  A Reputation System for Traffic Safety Event on Vehicular Ad Hoc Networks , 2009, EURASIP J. Wirel. Commun. Netw..