Advertisement

Design Specification of Context Cognitive Trust Evaluation Model for V2V Communication in IoV

  • Abdul RehmanEmail author
  • Mohd Fadzil Bin Hassan
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1073)

Abstract

VANET (Vehicle Ad Hoc Network) is now making its shift towards IoV (Internet of Vehicle). On road smart vehicles are expected to be the part of vehicle network in near future. Information integrity during V2V (Vehicle to Vehicle) communication is one of the key barriers in the implementation of vehicle networks. Vehicle networks face many drastic changes in the network topology during a short period of time. Absolute central network availability is difficult in vehicular networks that makes V2V communication significantly important. Trustworthiness plays a very important role to ensure integrity. Many models of trust evaluation have been proposed with a common trait of fixed nature. As possibility of scenario change is high for every other event so the fixed nature of previous models seems impractical. Our work aims to solve the problem by introducing context awareness between the available information and trust evaluation. It is expected that the proposed solution will overcome the limitations of current models and provide a hybrid adaptive model. Our model is based on context scenario adaptation rather than depending on a limited set of situations.

Keywords

VANET Trust evaluation IoV 

References

  1. 1.
    Alam, K.M., Saini, M., El Saddik, A.: Toward social internet of vehicles: concept, architecture, and applications. IEEE access 3, 343–357 (2015)CrossRefGoogle Scholar
  2. 2.
    Xie, Y., Su, X., He, Y., Chen, X., Cai, G., Xu, B., et al.: Stm32-based vehicle data acquisition system for internet-of-vehicles. In: 2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS), pp. 895–898 (2017)Google Scholar
  3. 3.
    Yang, F., Wang, S., Li, J., Liu, Z., Sun, Q.: An overview of internet of vehicles. China Commun. 11, 1–15 (2014)CrossRefGoogle Scholar
  4. 4.
    Sheet, D.K., Kaiwartya, O., Abdullah, A.H., Cao, Y., Hassan, A.N., Kumar, S.: Location information verification using transferable belief model for geographic routing in VANETs. IET Intell. Transp. Syst. 11, 53–60 (2017)CrossRefGoogle Scholar
  5. 5.
    Butt, T.A., Iqbal, R., Shah, S.C., Umar, T.: Social internet of vehicles: architecture and enabling technologies. Comput. Electr. Eng. 69, 68–84 (2018)CrossRefGoogle Scholar
  6. 6.
    Contreras-Castillo, J., Zeadally, S., Guerrero-Ibañez, J.A.: Internet of vehicles: architecture, protocols, and security. IEEE Int. Things J. 5, 3701–3709 (2018)CrossRefGoogle Scholar
  7. 7.
    Wei, Z., Yu, F.R., Boukerche, A.: Trust based security enhancements for vehicular ad hocnetworks. In: Proceedings of the fourth ACM international symposium on Development and analysis of intelligent vehicular networks and applications, pp. 103–109 (2014)Google Scholar
  8. 8.
    Hasrouny, H., Samhat, A.E., Bassil, C., Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017)Google Scholar
  9. 9.
    Saini, M., Alelaiwi, A., Saddik, A.E.: How close are we to realizing a pragmatic VANET solution? a meta-survey. ACM Comput. Surv. (CSUR) 48, 29 (2015)Google Scholar
  10. 10.
    Yao, X., Zhang, X., Ning, H., Li, P.: Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Netw. 55, 107–118 (2017)CrossRefGoogle Scholar
  11. 11.
    Gazdar, T., Belghith, A., Abutair, H.: An enhanced distributed trust computing protocol for VANETs. IEEE Access 6, 380–392 (2018)CrossRefGoogle Scholar
  12. 12.
    Bujari, A., Palazzi, C.E., Vitella, A.: Broadcasting messages in the internet of vehicles. In: 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 58–62. IEEE (2018)Google Scholar
  13. 13.
    Raya, M., Hubaux, J.-P.: Securing vehicular ad hoc networks. J. Comput. Secur. 15, 39–68 (2007)CrossRefGoogle Scholar
  14. 14.
    Soleymani, S.A., Abdullah, A.H., Zareei, M., Anisi, M.H., Vargas-Rosales, C., Khan, M.K., et al.: A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5, 15619–15629 (2017)CrossRefGoogle Scholar
  15. 15.
    Sumithra, S., Vadivel, R.: An overview of various trust models for vanet security establishment. In: 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7. IEEE (2018)Google Scholar
  16. 16.
    Mármol, F.G., Pérez, G.M.: TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks. J. Netw. Comput. Appl. 35, 934–941 (2012)CrossRefGoogle Scholar
  17. 17.
    Li, X., Liu, J., Li, X., Sun, W.: RGTE: a reputation-based global trust establishment in VANETs. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 210–214. IEEE (2013)Google Scholar
  18. 18.
    Cui, J., Wu, D., Zhang, J., Xu, Y., Zhong, H.: An efficient authentication scheme based on semi-trusted authority in VANETs. IEEE Trans. Veh. Technol. 68(3), 2972–2986 (2019)CrossRefGoogle Scholar
  19. 19.
    Chen, C., Zhang, J., Cohen, R., Ho, P.H.: A trust-based message propagation and evaluation framework in vanets. In: Proceedings of the International Conference on Information Technology Convergence and Services (2010)Google Scholar
  20. 20.
    Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Towards expanded trust management for agents in vehicular ad-hoc networks. Int. J. Comput. Intell. Theory Prac. (IJCITP) 5, 03–15 (2010)Google Scholar
  21. 21.
    Want, R., Schilit, B.N., Jenson, S.: Enabling the internet of things. Computer, 28–35 (2015)Google Scholar
  22. 22.
    Schmidt, A., Beigl, M., Gellersen, H.-W.: There is more to context than location. Comput. Graph. 23, 893–901 (1999)CrossRefGoogle Scholar
  23. 23.
    Pathan, A.S.K.: Security of Self-organizing Networks: MANET, WSN, WMN, VANET. CRC Press, Boca Raton (2016)CrossRefGoogle Scholar
  24. 24.
    Kofod-Petersen, A., Cassens, J.: Using activity theory to model context awareness. In: International Workshop on Modeling and Retrieval of Context, pp. 1–17 (2005)Google Scholar
  25. 25.
    Schmidt, A.: Ubiquitous computing-computing in context (2003)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Centre for Research and Data Science (CeRDaS), Computer and Information Science DepartmentUniversiti Teknologi PETRONASSeri IskandarMalaysia

Personalised recommendations