Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks

  • Sashi Gurung
  • Dan Lin
  • Anna Squicciarini
  • Elisa Bertino
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7873)


In Vehicular Ad-Hoc Networks (VANETs), applications are typically realized by forwarding and exchanging messages among vehicles. The integrity and trustworthiness of messages directly impacts the quality of the applications. Though there have been extensive works on authentication protocols in VANETs, authentication can only certify message origin but cannot guarantee that the identity holders will send truthful and accurate messages. Therefore, in this paper, we propose a novel trust model to directly evaluate the trustworthiness of the content of a message received from other vehicles. The model is built based on various factors such as content similarity, content conflict and route similarity. Trustworthiness of message content will be evaluated at the individual vehicle level and will not introduce any additional architectural assumptions. We have conducted extensive experiments and the results indicate both efficiency and effectiveness of the proposed approach.


Trust Model Malicious Node Authentication Protocol Trust Score Message Content 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for peer-to-peer and mobile ad-hoc networks. In: Workshop on the Economics of Peer-to-Peer Systems (2004)Google Scholar
  2. 2.
    Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: ACM World Wide Web Conference, pp. 675–684 (2011)Google Scholar
  3. 3.
    Chen, C., Zhang, J., Cohen, R., Ho, P.: A trust-based message propagation and evaluation framework in vanets. In: Proceedings of the Int. Conf. on Information Technology Convergence and Services (2010)Google Scholar
  4. 4.
    Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  5. 5.
    Dotzer, F., Fischer, L., Magiera, P.: Vars: A vehicle ad-hoc network reputation system. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM 2005, pp. 454–456. IEEE (2005)Google Scholar
  6. 6.
    Eschenauer, L., Gligor, V.D., Baras, J.: On Trust Establishment in Mobile Ad-Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 47–66. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  7. 7.
    Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77 (2004)Google Scholar
  8. 8.
    Gerla, M., Gruteser, M.: Vehicular networks: Applications, protocols, and testbeds. In: Emerging Wireless Technologies and the Future Mobile Internet, pp. 201–241 (2011)Google Scholar
  9. 9.
    Gerlach, M.: Trust for vehicular applications. In: Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems, pp. 295–304. IEEE Computer Society, Washington, DC (2007)CrossRefGoogle Scholar
  10. 10.
    Mathur, S., Jin, T., Kasturirangan, N., Chandrasekaran, J., Xue, W., Gruteser, M., Trappe, W.: Parknet: drive-by sensing of road-side parking statistics. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), pp. 123–136 (2010)Google Scholar
  11. 11.
    Minhas, U., Zhang, J., Tran, T., Cohen, R.: Towards expanded trust management for agents in vehicular ad-hoc networks. International Journal of Computational Intelligence Theory and Practice (IJCITP) 5(1) (2010)Google Scholar
  12. 12.
    Mundinger, J., Boudec, J.-Y.L.: Reputation in self-organized communication systems and beyond. In: Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer & Communications Systems, p. 3 (2006)Google Scholar
  13. 13.
    Nakajima, Y., Watanabe, K., Hayashibara, N., Enokido, T., Takizawa, M., Deen, S.M.: Trustworthiness in peer-to-peer overlay networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, p. 8 (2006)Google Scholar
  14. 14.
    Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp. 1–8. IEEE (2006)Google Scholar
  15. 15.
    Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE Journal on Selected Areas in Communications 25(8), 1557–1568 (2007)CrossRefGoogle Scholar
  16. 16.
    Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.-P.: On datacentric trust establishment in ephemeral ad hoc networks. In: IEEE International Conference on Computer Communications, INFOCOM (2008)Google Scholar
  17. 17.
    Richter, J., Kuntze, N., Rudolph, C.: Security digital evidence. In: IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 119–130 (2010)Google Scholar
  18. 18.
    Tonguz, O.K., Boban, M.: Multiplayer games over vehicular ad hoc networks: A new application. Ad Hoc Networks 8(5), 531–543 (2010)CrossRefGoogle Scholar
  19. 19.
    Wagner, R.A., Fischer, M.J.: The string-to-string correction problem. J. ACM 21(1), 168–173 (1974)MathSciNetzbMATHCrossRefGoogle Scholar
  20. 20.
  21. 21.
    Yin, X., Han, J., Yu, P.S.: Truth Discovery with Multiple Conflicting Information Providers on the Web. In: Proc. of ACM SIGKDD, pp. 1048–1052 (2007)Google Scholar
  22. 22.
    Zhang, J.: A survey on trust management for vanets. In: 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 105–112 (March 2011)Google Scholar
  23. 23.
    Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust Cooperative Trust Establishment for MANETs. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34 (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Sashi Gurung
    • 1
  • Dan Lin
    • 1
  • Anna Squicciarini
    • 2
  • Elisa Bertino
    • 3
  1. 1.Department of Computer ScienceMissouri University of Science and TechnologyUSA
  2. 2.College of Information Sciences & TechnologyPennsylvania State UniversityUSA
  3. 3.Department of Computer SciencePurdue UniversityUSA

Personalised recommendations