Trust Management for Vehicular Networks: An Adversary-Oriented Overview

Cooperative Intelligent Transportation Systems, mainly represented by vehicular ad hoc networks (VANETs), are among the key components contributing to the Smart City and Smart World paradigms. Based on the continuous exchange of both periodic and event triggered messages, smart vehicles can enhance road safety, while also providing support for comfort applications. In addition to the different communication protocols, securing such communications and establishing a certain trustiness among vehicles are among the main challenges to address, since the presence of dishonest peers can lead to unwanted situations. To this end, existing security solutions are typically divided into two main categories, cryptography and trust, where trust appeared as a complement to cryptography on some specific adversary models and environments where the latter was not enough to mitigate all possible attacks. In this paper, we provide an adversary-oriented survey of the existing trust models for VANETs. We also show when trust is preferable to cryptography, and the opposite. In addition, we show how trust models are usually evaluated in VANET contexts, and finally, we point out some critical scenarios that existing trust models cannot handle, together with some possible solutions.

[1]  Jean-Pierre Hubaux,et al.  Thwarting malicious behavior , 2007 .

[2]  Jaime Lloret Mauri,et al.  CODIE: Controlled Data and Interest Evaluation in Vehicular Named Data Networks , 2016, IEEE Transactions on Vehicular Technology.

[3]  Pin-Han Ho,et al.  RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[4]  Reinhard German,et al.  Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.

[5]  S. V. Kasmir Raja,et al.  Stimulating truth-telling and cooperation among nodes in VANETs through payment and punishment scheme , 2015, Ad Hoc Networks.

[6]  Wen-Long Jin,et al.  SPIVC: Smart-Phone-Based Intervehicle Communication System , 2012 .

[7]  Asma Adnane,et al.  Evaluation criterias for trust management in vehicular ad-hoc networks (VANETs) , 2014, 2014 International Conference on Connected Vehicles and Expo (ICCVE).

[8]  Juan-Carlos Cano,et al.  RITA: RIsk-aware Trust-based Architecture for collaborative multi-hop vehicular communications , 2016, Secur. Commun. Networks.

[9]  Jin Wang,et al.  RPRep: A Robust and Privacy-Preserving Reputation Management Scheme for Pseudonym-Enabled VANETs , 2016, Int. J. Distributed Sens. Networks.

[10]  Florian Dotzer,et al.  VARS: a vehicle ad-hoc network reputation system , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[11]  Fabián E. Bustamante,et al.  An integrated mobility and traffic model for vehicular wireless networks , 2005, VANET '05.

[12]  Naveen K. Chilamkurti,et al.  Collaborative trust aware intelligent intrusion detection in VANETs , 2014, Comput. Electr. Eng..

[13]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[14]  Riaz Ahmed Shaikh,et al.  Intrusion-aware trust model for vehicular ad hoc networks , 2014, Secur. Commun. Networks.

[15]  Richard J. Enbody,et al.  Targeted Cyberattacks: A Superset of Advanced Persistent Threats , 2013, IEEE Security & Privacy.

[16]  Syed Hassan Ahmed,et al.  Vehicular content centric network (VCCN): a survey and research challenges , 2015, SAC.

[17]  Christian Bonnet,et al.  Vehicular Mobility Simulation for VANETs , 2007, 40th Annual Simulation Symposium (ANSS'07).

[18]  Juan-Carlos Cano,et al.  Providing accident detection in vehicular networks through OBD-II devices and Android-based smartphones , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[19]  Colin Tankard,et al.  Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..

[20]  Chen Chen,et al.  Trust modeling for message relay control and local action decision making in VANETs , 2013, Secur. Commun. Networks.

[21]  Xi Li,et al.  Reputation Management in Vehicular Ad Hoc Networks , 2010, 2010 International Conference on Multimedia Technology.

[22]  C. P. Gupta,et al.  A Survey on VANETs Security Attacks and Sybil Attack Detection , 2016 .

[23]  F. G. Marmol,et al.  TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks , 2009, 2009 IEEE International Conference on Communications.

[24]  Yi-Ming Chen,et al.  A beacon-based trust management system for enhancing user centric location privacy in VANETs , 2013, Journal of Communications and Networks.

[25]  Christoph Meinel,et al.  Advanced persistent threats: Behind the scenes , 2016, 2016 Annual Conference on Information Science and Systems (CISS).

[26]  Victor C. M. Leung,et al.  A Context-Aware Trust-Based Information Dissemination Framework for Vehicular Networks , 2015, IEEE Internet of Things Journal.

[27]  Jie Zhang,et al.  A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[28]  Jessica Staddon,et al.  Detecting and correcting malicious data in VANETs , 2004, VANET '04.

[29]  Quang Nhat Nguyen,et al.  User Preferences Elicitation and Exploitation in a Push-Delivery Mobile Recommender System , 2012, ICCASA.

[30]  Syed Hassan Ahmed,et al.  RUFS: RobUst Forwarder Selection in Vehicular Content-Centric Networks , 2015, IEEE Communications Letters.

[31]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[32]  Siu-Ming Yiu,et al.  SPECS: Secure and privacy enhancing communications schemes for VANETs , 2011, Ad Hoc Networks.

[33]  Elisa Bertino,et al.  Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks , 2013, NSS.

[34]  Yue Wu,et al.  A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).

[35]  Sanjay Silakari,et al.  Detection of Malicious Nodes (DMN) in Vehicular Ad-Hoc Networks☆ , 2015 .

[36]  Irene Woon,et al.  A Protection Motivation Theory Approach to Home Wireless Security , 2005, ICIS.

[37]  N. Haddadou,et al.  Trust and exclusion in Vehicular Ad Hoc Networks: An economic incentive model based approach , 2013, 2013 Computing, Communications and IT Applications Conference (ComComAp).

[38]  S. Yousefi,et al.  Vehicular Ad Hoc Networks (VANETs): Challenges and Perspectives , 2006, 2006 6th International Conference on ITS Telecommunications.

[39]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[40]  Pin-Han Ho,et al.  An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[41]  Matthias Gerlach,et al.  Trust for Vehicular Applications , 2007, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07).

[42]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[43]  Ramjee Prasad,et al.  Effects of Rician faded and log-normal shadowed signals on spectrum efficiency in microcellular radio , 1993 .

[44]  Panagiotis Papadimitratos,et al.  TraNS: realistic joint traffic and network simulator for VANETs , 2008, MOCO.

[45]  Daniel Krajzewicz,et al.  SUMO (Simulation of Urban MObility) - an open-source traffic simulation , 2002 .

[46]  Xuejun Li,et al.  RGTE: A Reputation-Based Global Trust Establishment in VANETs , 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems.

[47]  Maxim Raya,et al.  Securing vehicular ad hoc networks , 2007, J. Comput. Secur..

[48]  Yacine Ghamri-Doudane,et al.  A Job Market Signaling Scheme for Incentive and Trust Management in Vehicular Ad Hoc Networks , 2015, IEEE Transactions on Vehicular Technology.

[49]  Carlos Miguel Tavares Calafate,et al.  TROUVE: A trusted routing protocol for urban vehicular environments , 2015, 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[50]  Daniel Krajzewicz,et al.  SUMO - Simulation of Urban MObility An Overview , 2011 .

[51]  Levente Buttyán,et al.  Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .

[52]  Abdelfettah Belghith,et al.  A distributed advanced analytical trust model for VANETs , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[53]  Kenneth P. Laberteaux,et al.  STRONG VANET SECURITY ON A BUDGET , 2006 .

[54]  Nianhua Yang,et al.  A Similarity based Trust and Reputation Management Framework for VANETs , 2013 .

[55]  Alejandro Quintero,et al.  VANET security surveys , 2014, Comput. Commun..

[56]  Félix Gómez Mármol,et al.  TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..

[57]  Juan-Carlos Cano,et al.  GRCBox: Extending Smartphone Connectivity in Vehicular Networks , 2015, Int. J. Distributed Sens. Networks.

[58]  Adil Mudasir Malla,et al.  Security Attacks with an Effective Solution for DOS Attacks in VANET , 2013 .

[59]  J. H. Davis,et al.  An Integrative Model Of Organizational Trust , 1995 .

[60]  Frank Kargl,et al.  PUCA: A pseudonym scheme with strong privacy guarantees for vehicular ad-hoc networks , 2016, Ad Hoc Networks.

[61]  Jalel Ben-Othman,et al.  Survey on VANET security challenges and possible cryptographic solutions , 2014, Veh. Commun..

[62]  Juan-Carlos Cano,et al.  Assessing the Impact of a Realistic Radio Propagation Model on VANET Scenarios Using Real Maps , 2010, 2010 Ninth IEEE International Symposium on Network Computing and Applications.

[63]  Xin-Ping Guan,et al.  Traffic big data analysis supporting vehicular network access recommendation , 2016, 2016 IEEE International Conference on Communications (ICC).

[64]  E. Byres,et al.  The Myths and Facts behind Cyber Security Risks for Industrial Control Systems , 2004 .

[65]  Abdul Hanan Abdullah,et al.  Trust management in vehicular ad hoc network: a systematic review , 2015, EURASIP J. Wirel. Commun. Netw..

[66]  J.-P. Hubaux,et al.  Architecture for Secure and Private Vehicular Communications , 2007, 2007 7th International Conference on ITS Telecommunications.

[67]  Juan-Carlos Cano,et al.  Realistic Radio Propagation Models (RPMs) for VANET Simulations , 2009, 2009 IEEE Wireless Communications and Networking Conference.

[68]  Marco Fiore,et al.  Mobility Models for Vehicular Communications , 2015, AdHocNets 2015.

[69]  Yih-Chun Hu,et al.  Security certificate revocation list distribution for vanet , 2008, VANET '08.

[70]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.

[71]  Abderrahmane Lakas,et al.  Trust model with delayed verification for message relay in VANETs , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).

[72]  Sandeep Kad,et al.  A Review on Security Related Aspects in Vehicular Adhoc Networks , 2016 .

[73]  Ross Brewer,et al.  Advanced persistent threats: minimising the damage , 2014, Netw. Secur..

[74]  Juan-Carlos Cano,et al.  T-VNets: A novel trust architecture for vehicular networks using the standardized messaging services of ETSI ITS , 2016, Comput. Commun..

[75]  Halabi Hasbullah,et al.  Using Trusted Platform Module (TPM) to Secure Business Communciation (SBC) in Vehicular Ad hoc Network (VANET) , 2016 .

[76]  John K. Butler Toward Understanding and Measuring Conditions of Trust: Evolution of a Conditions of Trust Inventory , 1991 .

[77]  Mingyan Liu,et al.  Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[78]  D. K. Behera,et al.  A trust based clustering with Ant Colony Routing in VANET , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).

[79]  Jinhua Guo,et al.  A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework , 2007, 2007 Mobile Networking for Vehicular Environments.

[80]  Jean-Yves Le Boudec,et al.  The Random Trip Model: Stability, Stationary Regime, and Perfect Simulation , 2006, IEEE/ACM Transactions on Networking.

[81]  Ayman I. Kayssi,et al.  A Privacy-Preserving Trust Model for VANETs , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[82]  Debasish Jena,et al.  Security in vehicular adhoc networks: a survey , 2011, ICCCS '11.

[83]  Xiaodong Lin,et al.  Complementing public key infrastructure to secure vehicular ad hoc networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.