Skip to main content

Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks

  • Conference paper
Network and System Security (NSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7873))

Included in the following conference series:

Abstract

In Vehicular Ad-Hoc Networks (VANETs), applications are typically realized by forwarding and exchanging messages among vehicles. The integrity and trustworthiness of messages directly impacts the quality of the applications. Though there have been extensive works on authentication protocols in VANETs, authentication can only certify message origin but cannot guarantee that the identity holders will send truthful and accurate messages. Therefore, in this paper, we propose a novel trust model to directly evaluate the trustworthiness of the content of a message received from other vehicles. The model is built based on various factors such as content similarity, content conflict and route similarity. Trustworthiness of message content will be evaluated at the individual vehicle level and will not introduce any additional architectural assumptions. We have conducted extensive experiments and the results indicate both efficiency and effectiveness of the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for peer-to-peer and mobile ad-hoc networks. In: Workshop on the Economics of Peer-to-Peer Systems (2004)

    Google Scholar 

  2. Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: ACM World Wide Web Conference, pp. 675–684 (2011)

    Google Scholar 

  3. Chen, C., Zhang, J., Cohen, R., Ho, P.: A trust-based message propagation and evaluation framework in vanets. In: Proceedings of the Int. Conf. on Information Technology Convergence and Services (2010)

    Google Scholar 

  4. Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  5. Dotzer, F., Fischer, L., Magiera, P.: Vars: A vehicle ad-hoc network reputation system. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM 2005, pp. 454–456. IEEE (2005)

    Google Scholar 

  6. Eschenauer, L., Gligor, V.D., Baras, J.: On Trust Establishment in Mobile Ad-Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 47–66. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  7. Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77 (2004)

    Google Scholar 

  8. Gerla, M., Gruteser, M.: Vehicular networks: Applications, protocols, and testbeds. In: Emerging Wireless Technologies and the Future Mobile Internet, pp. 201–241 (2011)

    Google Scholar 

  9. Gerlach, M.: Trust for vehicular applications. In: Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems, pp. 295–304. IEEE Computer Society, Washington, DC (2007)

    Chapter  Google Scholar 

  10. Mathur, S., Jin, T., Kasturirangan, N., Chandrasekaran, J., Xue, W., Gruteser, M., Trappe, W.: Parknet: drive-by sensing of road-side parking statistics. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), pp. 123–136 (2010)

    Google Scholar 

  11. Minhas, U., Zhang, J., Tran, T., Cohen, R.: Towards expanded trust management for agents in vehicular ad-hoc networks. International Journal of Computational Intelligence Theory and Practice (IJCITP) 5(1) (2010)

    Google Scholar 

  12. Mundinger, J., Boudec, J.-Y.L.: Reputation in self-organized communication systems and beyond. In: Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer & Communications Systems, p. 3 (2006)

    Google Scholar 

  13. Nakajima, Y., Watanabe, K., Hayashibara, N., Enokido, T., Takizawa, M., Deen, S.M.: Trustworthiness in peer-to-peer overlay networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, p. 8 (2006)

    Google Scholar 

  14. Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp. 1–8. IEEE (2006)

    Google Scholar 

  15. Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE Journal on Selected Areas in Communications 25(8), 1557–1568 (2007)

    Article  Google Scholar 

  16. Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.-P.: On datacentric trust establishment in ephemeral ad hoc networks. In: IEEE International Conference on Computer Communications, INFOCOM (2008)

    Google Scholar 

  17. Richter, J., Kuntze, N., Rudolph, C.: Security digital evidence. In: IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 119–130 (2010)

    Google Scholar 

  18. Tonguz, O.K., Boban, M.: Multiplayer games over vehicular ad hoc networks: A new application. Ad Hoc Networks 8(5), 531–543 (2010)

    Article  Google Scholar 

  19. Wagner, R.A., Fischer, M.J.: The string-to-string correction problem. J. ACM 21(1), 168–173 (1974)

    Article  MathSciNet  MATH  Google Scholar 

  20. WordNet, http://wordnet.princeton.edu/

  21. Yin, X., Han, J., Yu, P.S.: Truth Discovery with Multiple Conflicting Information Providers on the Web. In: Proc. of ACM SIGKDD, pp. 1048–1052 (2007)

    Google Scholar 

  22. Zhang, J.: A survey on trust management for vanets. In: 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 105–112 (March 2011)

    Google Scholar 

  23. Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust Cooperative Trust Establishment for MANETs. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gurung, S., Lin, D., Squicciarini, A., Bertino, E. (2013). Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-38631-2_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-38630-5

  • Online ISBN: 978-3-642-38631-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics