A distributed advanced analytical trust model for VANETs

In this paper we propose a trust model based on a Markov chain in order to formalize the trust metric variation and its stability in the context of Vehicular Ad hoc Networks (VANETs). The proposed model takes into account not only the dynamic trust metric variation according to the vehicles behaviors, but also the constraints related to the monitoring process. In our model each vehicle can act as monitor and update the trust metric of its neighbors according to their behavior in the network. In addition, our model can be customized through different parameters like the trust interval and the number of transitions needed to reach the highest trust level. This flexibility enables to adapt the model according to the application context. The performance evaluation of the proposed model is presented with different parameters and two types of disruptive vehicles are taken into account: malicious and selfish. The obtained results show the resistance, the robustness and the incentive of the proposed model against the fluctuations of the vehicles behaviors.

[1]  Félix Gómez Mármol,et al.  LFTM, linguistic fuzzy trust mechanism for distributed networks , 2012, Concurr. Comput. Pract. Exp..

[2]  Reinhard German,et al.  Bidirectionally Coupled Network and Road Traffic Simulation for Improved IVC Analysis , 2011, IEEE Transactions on Mobile Computing.

[3]  Ayman I. Kayssi,et al.  A Privacy-Preserving Trust Model for VANETs , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.

[4]  Félix Gómez Mármol,et al.  TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..

[5]  Enrico Macii,et al.  Markovian analysis of large finite state machines , 1996, IEEE Trans. Comput. Aided Des. Integr. Circuits Syst..

[6]  Florian Dotzer,et al.  VARS: a vehicle ad-hoc network reputation system , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[7]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[8]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[9]  Panagiotis Papadimitratos,et al.  Eviction of Misbehaving and Faulty Nodes in Vehicular Networks , 2007, IEEE Journal on Selected Areas in Communications.

[10]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[11]  Xiaoyan Hong,et al.  Situation-aware trust architecture for vehicular networks , 2010, IEEE Communications Magazine.

[12]  A. Iyer,et al.  Secure V2V communications: Performance impact of computational overheads , 2008, IEEE INFOCOM Workshops 2008.

[13]  Timothy W. Finin,et al.  A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[14]  Abderrahim Benslimane,et al.  Toward a cross-layer monitoring process for mobile ad hoc networks , 2009, Secur. Commun. Networks.

[15]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.