Intrusion-aware trust model for vehicular ad hoc networks

In vehicular ad hoc networks, peers make decisions on the basis of the information provided by the other peers. If the received information is fake, then the result could be catastrophic, such as road accidents. Therefore, many researchers use the concept of trust to evaluate the trustworthiness of the received data. However, existing trust management schemes proposed so far for the vehicular networks are suffered from various limitations. For example, some schemes measure trust on the basis of the history of interactions, which is infeasible for vehicular networks due to its ephemeral nature. Also, none of the existing schemes operate in an identity anonymous environment. In order to overcome these limitations, we propose a novel trust management scheme for identity anonymous vehicular ad hoc networks. The proposed method is simple and completely decentralized that makes it easy to implement in the vehicular networks. Also, we prove that the proposed method is not only robust, but it also detects false location and time information. Furthermore, it introduces linear time complexity, which makes it suitable to use in real time. Copyright © 2013 John Wiley & Sons, Ltd.

[1]  Matti H. A. J. Herben,et al.  High-resolution angle-of-arrival measurement of the mobile radio channel , 1999 .

[2]  Theodore S. Rappaport,et al.  Millimeter-Wave 60 GHz Outdoor and Vehicle AOA Propagation Measurements Using a Broadband Channel Sounder , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.

[3]  Zhenfu Cao,et al.  A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .

[4]  Heejo Lee,et al.  Group-Based Trust Management Scheme for Clustered Wireless Sensor Networks , 2009, IEEE Transactions on Parallel and Distributed Systems.

[5]  Paolo Bellavista,et al.  Mobeyes: smart mobs for urban monitoring with a vehicular sensor network , 2006, IEEE Wireless Communications.

[6]  Matthias Gerlach,et al.  Privacy in VANETs using Changing Pseudonyms - Ideal and Real , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.

[7]  Timothy W. Finin,et al.  A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks , 2006, 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.

[8]  Liviu Iftode,et al.  TrafficView: traffic data dissemination using car-to-car communication , 2004, MOCO.

[9]  Yi-Ming Chen,et al.  A beacon-based trust management system for enhancing user centric location privacy in VANETs , 2013, Journal of Communications and Networks.

[10]  Luca Delgrossi,et al.  IEEE 802.11p: Towards an International Standard for Wireless Access in Vehicular Environments , 2008, VTC Spring 2008 - IEEE Vehicular Technology Conference.

[11]  Jie Zhang,et al.  A Survey on Trust Management for VANETs , 2011, 2011 IEEE International Conference on Advanced Information Networking and Applications.

[12]  Pin-Han Ho,et al.  A Trust Modeling Framework for Message Propagation and Evaluation in VANETs , 2010, 2010 2nd International Conference on Information Technology Convergence and Services.

[13]  J Kyle Garrett,et al.  AASHTO Connected Vehicle Infrastructure Deployment Analysis , 2011 .

[14]  Zhen Huang,et al.  On Reputation and Data-centric Misbehavior Detection Mechanisms for VANET , 2011 .

[15]  Chen Chen,et al.  Trust modeling for message relay control and local action decision making in VANETs , 2013, Secur. Commun. Networks.

[16]  Yih-Chun Hu,et al.  Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[17]  M. Gerlach Full Paper : Assessing and Improving Privacy in VANETs , 2006 .

[18]  Sushmita Ruj,et al.  Limitations of trust management schemes in VANET and countermeasures , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[19]  David K. Chiabi European Telecommunications Standards Institute , 2015 .

[20]  Shari Lawrence Pfleeger,et al.  Analyzing Computer Security - A Threat / Vulnerability / Countermeasure Approach , 2012 .

[21]  Adrian Perrig,et al.  Efficient mechanisms to provide convoy member and vehicle sequence authentication in VANETs , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.

[22]  Athanasios V. Vasilakos,et al.  Vehicular Communications and Networks-Part II , 2011 .

[23]  Elmar Schoch,et al.  Communication patterns in VANETs , 2008, IEEE Communications Magazine.

[24]  Gang Yang,et al.  An energy‐efficient localization algorithm for mobile vehicles in vehicle to vehicle network , 2012, Concurr. Comput. Pract. Exp..

[25]  Félix Gómez Mármol,et al.  TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks , 2012, J. Netw. Comput. Appl..

[26]  Fabián E. Bustamante,et al.  An integrated mobility and traffic model for vehicular wireless networks , 2005, VANET '05.

[27]  Xiaoyan Hong,et al.  Situation-aware trust architecture for vehicular networks , 2010, IEEE Communications Magazine.

[28]  Robbert van Renesse,et al.  Scalable Wireless Ad Hoc Network Simulation , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.

[29]  Vijay Laxmi,et al.  Trust Establishment Techniques in VANET , 2013, Wireless Networks and Security.

[30]  M Chevreuil,et al.  IVHW: an inter-vehicle hazard warning system concept within the DEUFRAKO program , 2002 .

[31]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.