A game theory based trust model for Vehicular Ad hoc Networks (VANETs)

Vehicular Ad hoc Networks (VANETs) facilitate road safety, transportation security, reliability and management. This paper presents a game theory based trust model for VANETs. The proposed model is based on an attacker and defender security game to identify and counter the attacker/malicious nodes. The parameters considered for attackers and defenders strategy are majority opinion, betweenness centrality, and node density. The outcome of the specific game is determined by the game matrix which contains the cost (payoff) values for possible action-reaction combination. Nash equilibrium when applied to calculate the best strategy for attacker and defender vehicles. The model is simulated in Network Simulator (ns2), and results show that the proposed model performs better than the schemes with random malicious nodes and existing game theory based approach in terms of throughput, retransmission attempts and data drop rate for different attacker and defender scenarios.

[1]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[2]  Keshav P. Dahal,et al.  Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.

[3]  Yih-Chun Hu,et al.  SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[4]  Jian Shen,et al.  A Novel Routing Protocol Providing Good Transmission Reliability in Underwater Sensor Networks , 2015 .

[5]  Elizabeth M. Belding-Royer,et al.  A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..

[6]  Athanasios V. Vasilakos,et al.  Routing for disruption tolerant networks: taxonomy and design , 2010, Wirel. Networks.

[7]  F. Harary,et al.  Eccentricity and centrality in networks , 1995 .

[8]  Panagiotis Papadimitratos,et al.  Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..

[9]  Yue Wu,et al.  A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks , 2015, 2015 International Conference on Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC).

[10]  Rutvij H. Jhaveri,et al.  Trust Based Approaches for Secure Routing in VANET: A Survey , 2015 .

[11]  Jianfeng Ma,et al.  LCT: A Lightweight Cross-domain Trust Model for the Mobile Distributed Environment , 2016, KSII Trans. Internet Inf. Syst..

[12]  Robert E. Tarjan,et al.  Fibonacci heaps and their uses in improved network optimization algorithms , 1987, JACM.

[13]  Félix Gómez Mármol,et al.  TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..

[14]  Martin Everett,et al.  Ego network betweenness , 2005, Soc. Networks.

[15]  Fei-Yue Wang,et al.  A Security and Privacy Review of VANETs , 2015, IEEE Transactions on Intelligent Transportation Systems.

[16]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[17]  Jianfeng Ma,et al.  LSOT: A Lightweight Self-Organized Trust Model in VANETs , 2016, Mob. Inf. Syst..

[18]  Rajeev Motwani,et al.  What can you do with a Web in your Pocket? , 1998, IEEE Data Eng. Bull..

[19]  Tansu Alpcan,et al.  Security games for vehicular networks , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[20]  Jianfeng Ma,et al.  IRLT: Integrating Reputation and Local Trust for Trustworthy Service Recommendation in Service-Oriented Social Networks , 2016, PloS one.

[21]  Mohsen Guizani,et al.  An Efficient Distributed Trust Model for Wireless Sensor Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[22]  Abbas Jamalipour,et al.  An Evolutionary Game Theory-Based Approach to Cooperation in VANETs Under Different Network Conditions , 2015, IEEE Transactions on Vehicular Technology.

[23]  Ni Yan Trust Model based on Graded Evaluation in VANET , 2012 .

[24]  Noah E. Friedkin,et al.  Theoretical Foundations for Centrality Measures , 1991, American Journal of Sociology.

[25]  Ronald L. Rivest,et al.  Introduction to Algorithms , 1990 .

[26]  F. Richard Yu,et al.  Trust Establishment Based on Bayesian Networks for Threat Mitigation in Mobile Ad Hoc Networks , 2014, 2014 IEEE Military Communications Conference.

[27]  Xiaoyan Hong,et al.  Situation-aware trust architecture for vehicular networks , 2010, IEEE Communications Magazine.

[28]  Kirti A. Yadav,et al.  VANET and its Security Aspects: A Review , 2016 .

[29]  Félix Gómez Mármol,et al.  LFTM, linguistic fuzzy trust mechanism for distributed networks , 2012, Concurr. Comput. Pract. Exp..

[30]  Vrinda Tokekar,et al.  Bayesian network based trust model with time window for Pure P2P computing systems , 2014, 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN).

[31]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[32]  Linton C. Freeman,et al.  The gatekeeper, pair-dependency and structural centrality , 1980 .

[33]  Naixue Xiong,et al.  A Game Theory Algorithm for Intra-Cluster Data Aggregation in a Vehicular Ad Hoc Network , 2016, Sensors.