T-VNets: A novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS

Efficient trust establishment architecture based on the European ETSI ITS standard.Fast and distributed revocation of dishonest vehicles through the continuous trust and traffic estimation within roads' segments using CAM messages.Trusted events' alerts dissemination using DENM messages.Secure path selection for unicast data messages.Unlike existing solutions, T-VNets guarantees a scalable and independent trust establishment applicable to both urban and highway scenarios. In this paper we propose a novel trust establishment architecture fully compliant with the ETSI ITS standard which takes advantage of the periodically exchanged beacons (i.e. CAM) and event triggered messages (i.e. DENM). Our solution, called T-VNets, allows estimating the traffic density, the trust among entities, as well as the dishonest nodes distribution within the network. In addition, by combining different trust metrics such as direct, indirect, event-based and RSU-based trust, T-VNets is able to eliminate dishonest nodes from all network operations while selecting the best paths to deliver legal data messages by taking advantage of the link duration concept. Since our solution is able to adapt to environments with or without roadside units (RSUs), it can perform adequately both in urban and highway scenarios. Simulation results evidence that our proposal is more efficient than other existing solutions, being able to sustain performance levels even in worst-case scenarios.

[1]  Nianhua Yang,et al.  A Similarity based Trust and Reputation Management Framework for VANETs , 2013 .

[2]  Jonathan Loo,et al.  Real-Time Detection of Denial-of-Service Attacks in IEEE 802.11p Vehicular Networks , 2014, IEEE Communications Letters.

[3]  S. V. Kasmir Raja,et al.  Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme , 2015, Ad Hoc Networks.

[4]  Sidi-Mohammed Senouci,et al.  > Replace This Line with Your Paper Identification Number (double-click Here to Edit) < , 2022 .

[5]  Riaz Ahmed Shaikh,et al.  Intrusion-aware trust model for vehicular ad hoc networks , 2014, Secur. Commun. Networks.

[6]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[7]  Teerawat Issariyakul,et al.  Introduction to Network Simulator NS2 , 2008 .

[8]  Sanjay Silakari,et al.  Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks☆ , 2015 .

[9]  Abderrahmane Lakas,et al.  Trust model with delayed verification for message relay in VANETs , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[10]  Elisa Bertino,et al.  Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks , 2013, NSS.

[11]  P. Manzoni,et al.  CityMob: A Mobility Model Pattern Generator for VANETs , 2008, ICC Workshops - 2008 IEEE International Conference on Communications Workshops.

[12]  N. Haddadou,et al.  Trust and exclusion in Vehicular Ad Hoc Networks: An economic incentive model based approach , 2013, 2013 Computing, Communications and IT Applications Conference (ComComAp).

[13]  Daniel Krajzewicz,et al.  SUMO - Simulation of Urban MObility An Overview , 2011 .

[14]  Chen Chen,et al.  Trust modeling for message relay control and local action decision making in VANETs , 2013, Secur. Commun. Networks.

[15]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[16]  Alexey V. Vinel,et al.  Vehicle-to-vehicle communication in C-ACC/platooning scenarios , 2015, IEEE Communications Magazine.

[17]  Hai-gang Gong,et al.  Social Contribution-Based Routing Protocol for Vehicular Network with Selfish Nodes , 2014, Int. J. Distributed Sens. Networks.

[18]  Félix Gómez Mármol,et al.  TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..

[19]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[20]  Xi Li,et al.  Reputation Management in Vehicular Ad Hoc Networks , 2010, 2010 International Conference on Multimedia Technology.

[21]  Yi-Ming Chen,et al.  A beacon-based trust management system for enhancing user centric location privacy in VANETs , 2013, Journal of Communications and Networks.

[22]  Jie Zhang,et al.  A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[23]  S. Senthilkumar,et al.  A Survey on Trust Management for Mobile Ad Hoc Networks , 2018 .

[24]  Victor C. M. Leung,et al.  A Context-Aware Trust-Based Information Dissemination Framework for Vehicular Networks , 2015, IEEE Internet of Things Journal.

[25]  Klaus Wehrle,et al.  Machine learning-based jamming detection for IEEE 802.11: Design and experimental evaluation , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[26]  Xuejun Li,et al.  RGTE: A Reputation-Based Global Trust Establishment in VANETs , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[27]  Yacine Ghamri-Doudane,et al.  A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.

[28]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[29]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.

[30]  James Gross,et al.  Experimental Characterization and Modeling of RF Jamming Attacks on VANETs , 2015, IEEE Transactions on Vehicular Technology.

[31]  Neeraj Kumar,et al.  Secure clustering for efficient data dissemination in vehicular cyber-physical systems , 2016, Future Gener. Comput. Syst..

[32]  A Cooperation Based Scheme for Managing Alert Propagation in VANET , 2015, Wirel. Pers. Commun..

[33]  Panagiotis Papadimitratos,et al.  Fast Exclusion of Errant Devices from Vehicular Networks , 2008, 2008 5th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[34]  Tim Leinmüller,et al.  Trust Issues for Vehicular Ad Hoc Networks , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[35]  Matthias Gerlach,et al.  Trust for Vehicular Applications , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).

[36]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[37]  Sidi-Mohammed Senouci,et al.  A secure intersection-based routing protocol for data collection in urban vehicular networks , 2014, 2014 IEEE Global Communications Conference.

[38]  Lars C. Wolf,et al.  Using Cluster Analysis to Detect Attackers in Vehicular Delay Tolerant Networks , 2013, ADHOCNETS.

[39]  A. Zaheer,et al.  Relational governance as an interorganizational strategy: An empirical test of the role of trust in economic exchange , 1995 .

[40]  Naveen K. Chilamkurti,et al.  Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..