Skip to main content

Design Specification of Context Cognitive Trust Evaluation Model for V2V Communication in IoV

  • Conference paper
  • First Online:
  • 1578 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1073))

Abstract

VANET (Vehicle Ad Hoc Network) is now making its shift towards IoV (Internet of Vehicle). On road smart vehicles are expected to be the part of vehicle network in near future. Information integrity during V2V (Vehicle to Vehicle) communication is one of the key barriers in the implementation of vehicle networks. Vehicle networks face many drastic changes in the network topology during a short period of time. Absolute central network availability is difficult in vehicular networks that makes V2V communication significantly important. Trustworthiness plays a very important role to ensure integrity. Many models of trust evaluation have been proposed with a common trait of fixed nature. As possibility of scenario change is high for every other event so the fixed nature of previous models seems impractical. Our work aims to solve the problem by introducing context awareness between the available information and trust evaluation. It is expected that the proposed solution will overcome the limitations of current models and provide a hybrid adaptive model. Our model is based on context scenario adaptation rather than depending on a limited set of situations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alam, K.M., Saini, M., El Saddik, A.: Toward social internet of vehicles: concept, architecture, and applications. IEEE access 3, 343–357 (2015)

    Article  Google Scholar 

  2. Xie, Y., Su, X., He, Y., Chen, X., Cai, G., Xu, B., et al.: Stm32-based vehicle data acquisition system for internet-of-vehicles. In: 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS), pp. 895–898 (2017)

    Google Scholar 

  3. Yang, F., Wang, S., Li, J., Liu, Z., Sun, Q.: An overview of internet of vehicles. China Commun. 11, 1–15 (2014)

    Article  Google Scholar 

  4. Sheet, D.K., Kaiwartya, O., Abdullah, A.H., Cao, Y., Hassan, A.N., Kumar, S.: Location information verification using transferable belief model for geographic routing in VANETs. IET Intell. Transp. Syst. 11, 53–60 (2017)

    Article  Google Scholar 

  5. Butt, T.A., Iqbal, R., Shah, S.C., Umar, T.: Social internet of vehicles: architecture and enabling technologies. Comput. Electr. Eng. 69, 68–84 (2018)

    Article  Google Scholar 

  6. Contreras-Castillo, J., Zeadally, S., Guerrero-Ibañez, J.A.: Internet of vehicles: architecture, protocols, and security. IEEE Int. Things J. 5, 3701–3709 (2018)

    Article  Google Scholar 

  7. Wei, Z., Yu, F.R., Boukerche, A.: Trust based security enhancements for vehicular ad hocnetworks. In: Proceedings of the fourth ACM international symposium on Development and analysis of intelligent vehicular networks and applications, pp. 103–109 (2014)

    Google Scholar 

  8. Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017)

    Google Scholar 

  9. Saini, M., Alelaiwi, A., Saddik, A.E.: How close are we to realizing a pragmatic VANET solution? a meta-survey. ACM Comput. Surv. (CSUR) 48, 29 (2015)

    Google Scholar 

  10. Yao, X., Zhang, X., Ning, H., Li, P.: Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Netw. 55, 107–118 (2017)

    Article  Google Scholar 

  11. Gazdar, T., Belghith, A., Abutair, H.: An enhanced distributed trust computing protocol for VANETs. IEEE Access 6, 380–392 (2018)

    Article  Google Scholar 

  12. Bujari, A., Palazzi, C.E., Vitella, A.: Broadcasting messages in the internet of vehicles. In: 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 58–62. IEEE (2018)

    Google Scholar 

  13. Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15, 39–68 (2007)

    Article  Google Scholar 

  14. Soleymani, S.A., Abdullah, A.H., Zareei, M., Anisi, M.H., Vargas-Rosales, C., Khan, M.K., et al.: A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5, 15619–15629 (2017)

    Article  Google Scholar 

  15. Sumithra, S., Vadivel, R.: An overview of various trust models for vanet security establishment. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7. IEEE (2018)

    Google Scholar 

  16. Mármol, F.G., Pérez, G.M.: TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J. Netw. Comput. Appl. 35, 934–941 (2012)

    Article  Google Scholar 

  17. Li, X., Liu, J., Li, X., Sun, W.: RGTE: a reputation-based global trust establishment in VANETs. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 210–214. IEEE (2013)

    Google Scholar 

  18. Cui, J., Wu, D., Zhang, J., Xu, Y., Zhong, H.: An efficient authentication scheme based on semi-trusted authority in VANETs. IEEE Trans. Veh. Technol. 68(3), 2972–2986 (2019)

    Article  Google Scholar 

  19. Chen, C., Zhang, J., Cohen, R., Ho, P.H.: A trust-based message propagation and evaluation framework in vanets. In: Proceedings of the International Conference on Information Technology Convergence and Services (2010)

    Google Scholar 

  20. Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell. Theory Prac. (IJCITP) 5, 03–15 (2010)

    Google Scholar 

  21. Want, R., Schilit, B.N., Jenson, S.: Enabling the internet of things. Computer, 28–35 (2015)

    Google Scholar 

  22. Schmidt, A., Beigl, M., Gellersen, H.-W.: There is more to context than location. Comput. Graph. 23, 893–901 (1999)

    Article  Google Scholar 

  23. Pathan, A.S.K.: Security of Self-organizing Networks: MANET, WSN, WMN, VANET. CRC Press, Boca Raton (2016)

    Book  Google Scholar 

  24. Kofod-Petersen, A., Cassens, J.: Using activity theory to model context awareness. In: International Workshop on Modeling and Retrieval of Context, pp. 1–17 (2005)

    Google Scholar 

  25. Schmidt, A.: Ubiquitous computing-computing in context (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdul Rehman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Rehman, A., Hassan, M.F.B. (2020). Design Specification of Context Cognitive Trust Evaluation Model for V2V Communication in IoV. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_60

Download citation

Publish with us

Policies and ethics