Trust based security enhancements for vehicular ad hocnetworks

Vehicular Ad hoc Networks (VANETs) have been becoming a popular research topic in both academia and industry due to the demanding requirements of safe and efficient transportation systems. The security of VANETs is a significant issue for the implementation of most types of useful applications based on VANETs. In this paper, a trust-based framework is proposed to solve the security issue in VANETs. The trus-based mechanism can provide a second protection for VANETs to defense the inside attackers, which are hard to be thwarted by cryptographic techniques. The proposed scheme establishes trust with direct interactions and recommendations. The DempsterShafer Theory is used to tackle the uncertainty of thirdparty recommendations in order to obtain accurate trust values. The effectiveness of the proposed scheme is validated by simulations.

[1]  M.S. Kakkasageri,et al.  Message Authentication in Vehicular Ad Hoc Networks: ECDSA Based Approach , 2009, 2009 International Conference on Future Computer and Communication.

[2]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[3]  Brian L. Mark,et al.  A quantitative trust establishment framework for reliable data packet delivery in MANETs , 2005, SASN '05.

[4]  Bertrand Ducourthial,et al.  On the Sybil attack detection in VANET , 2007, 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems.

[5]  Athanasios V. Vasilakos,et al.  A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.

[6]  F. Richard Yu,et al.  Green Cognitive Mobile Networks With Small Cells for Multimedia Communications in the Smart Grid Environment , 2014, IEEE Transactions on Vehicular Technology.

[7]  Victor C. M. Leung,et al.  Joint Topology Control and Authentication Design in Mobile Ad Hoc Networks With Cooperative Communications , 2012, IEEE Transactions on Vehicular Technology.

[8]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[9]  Victor C. M. Leung,et al.  Topology control in mobile Ad Hoc networks with cooperative communications , 2012, IEEE Wireless Communications.

[10]  Pin-Han Ho,et al.  RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[11]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[12]  F. Richard Yu,et al.  Stochastic unit commitment in smart grid communications , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[13]  Zhiyi Fang,et al.  Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.

[14]  Weidong Xiao,et al.  Communication systems for grid integration of renewable energy resources , 2011, IEEE Network.

[15]  F. Richard Yu,et al.  Energy-Efficient Resource Allocation for Heterogeneous Cognitive Radio Networks with Femtocells , 2012, IEEE Transactions on Wireless Communications.

[16]  Peter Xiaoping Liu,et al.  Structural Results for Combined Continuous User Authentication and Intrusion Detection in High Security Mobile Ad-Hoc Networks , 2011, IEEE Transactions on Wireless Communications.

[17]  Glenn Shafer,et al.  Readings in Uncertain Reasoning , 1990 .

[18]  Peter Xiaoping Liu,et al.  When the Smart Grid Meets Energy-Efficient Communications: Green Wireless Cellular Networks Powered by the Smart Grid , 2012, IEEE Transactions on Wireless Communications.

[19]  Victor C. M. Leung,et al.  Distributed Cooperative Topology Control for WANETs With Opportunistic Interference Cancelation , 2014, IEEE Transactions on Vehicular Technology.

[20]  Raja Datta,et al.  Light-weight trust-based routing protocol for mobile ad hoc networks , 2012, IET Inf. Secur..

[21]  Yuguang Fang,et al.  A defense technique against misbehavior in VANETs based on threshold authentication , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[22]  Irene Macaluso,et al.  Cognitive Radio Mobile Ad Hoc Networks , 2010 .

[23]  G. Pulla,et al.  A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .

[24]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[25]  F. Richard Yu,et al.  A Mean Field Game Theoretic Approach for Security Enhancements in Mobile Ad hoc Networks , 2014, IEEE Transactions on Wireless Communications.

[26]  Peter Xiaoping Liu,et al.  Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.

[27]  Maxim Raya,et al.  The security of vehicular ad hoc networks , 2005, SASN '05.