Advertisement

A Categorized Trust-Based Message Reporting Scheme for VANETs

  • Merrihan Monir
  • Ayman Abdel-Hamid
  • Mohammed Abd El Aziz
Part of the Communications in Computer and Information Science book series (CCIS, volume 381)

Abstract

In Vehicular Ad Hoc Networks (VANETs), trust establishment among communicating vehicles is important to be established to secure messages’ exchange and reliability. In this paper, a categorized decentralized trust management and evaluation scheme for nodes in VANETs is presented. Role-based trust and experience-based trust is integrated, while using an opinion piggybacking process when needed. Each node is evaluated individually according to its interactions during event reporting. Based on this evaluation, a node is assigned a category level (according to its trust value) and a confidence measure that determine the degree of trustworthiness of a node’s generated reports. The scheme integrates role-based trust with experience-based trust, to form a combined trust scheme, taking into account the history of the driver’s interactions with other vehicles. Case studies, scheme analysis and validation, demonstrate early malicious node detection, which leads to an efficient reporting scheme.

Keywords

Advisory network efficient reporting system malicious node detection message verification and broadcasting penalty system trust management in VANET 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Qian, Y., Lu, K., Moayeri, N.: A Secure VANET MAC Protocol for DSRC Applications. In: Gobal Telecommunications Conference, LA, USA, pp. 1–5. IEEE (2008)Google Scholar
  2. 2.
    Huang, Z., Ruj, S., Cavenaghi, M., Nayak, N.: Limitations of Trust Management Schemes in VANET and Countermeasures. In: International Symposium on Personal, Indoor and Mobile Radio Communications, Toronto, Canada, pp. 1228–1232. IEEE (2011)Google Scholar
  3. 3.
    Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Towards Expanded Trust Management for Agents in Vehicular Ad-hoc Networks. International Journal of Computational Intelligence: Theory and Practice (IJCITP) 5(1) (2010)Google Scholar
  4. 4.
    Minhas, U.F., Zhang, J., Tran, T., Cohen, R.: Intelligent Agents in Mobile Vehicuar Ad-hoc Networks: Leveraging Trust Modeling Based on Direct Experience with Incentives for Honesty. In: Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology, Toronto, Canada, vol. 2, pp. 243–247 (2010)Google Scholar
  5. 5.
    Rahman, S.U., Hengartner, U.: Secure Crash Reporting in Vehicular Ad hoc Networks. In: Proceedings of 3rd International Conference on Security and Privacy in Communications Networks, pp. 443–452. IEEE Computer Society (2007)Google Scholar
  6. 6.
    Ma, S., Wolfson, O., Lin, J.: A Survey on Trust Management for Intelligent Transportation System. In: Proceedings of the 4th ACM SIGSPATIAL International Workshop on Computational Transportation Science, IWCTS 2011, pp. 18–23 (2011)Google Scholar
  7. 7.
    Zhang, J.: Trust Management for Vanets: Challenges,Desired Properties and Future Directions. International Journal of Distributed Systems and Technologies, 48–62 (2011)Google Scholar
  8. 8.
    Sumra, I.A., Hasbullah, H., Lail, J., Rehman, M.: Trust and Trusted Computing in Vanet. Computer Science Journal 1(1) (2011)Google Scholar
  9. 9.
    Gerlach, M.: Trust for Vehicular Applications. In: International Symposium on Autonomous Decentralized Systems Proceedings, AZ, USA, pp. 295–304 (2007)Google Scholar
  10. 10.
    Chen, C., Zhang, J., Cohen, R., Ho, P.: A Trust-based Message Propagation and Evaluation Framwork in VANETs. In: Proceedings of the 2nd International Conference on Information Technology Convergence and Services (ITCS), Cebu, Philippines, pp. 62–69. IEEE (2010)Google Scholar
  11. 11.
    Chuang, M., Lee, J.: TEAM:Trust Extended Authentication Mechanism for Vehicular Ad-hoc Netowrks. In: Consumer Electronics, IEEE International Conference on Communications and Networks (CECNet), Yichang, China, pp. 1758–1761 (2011)Google Scholar
  12. 12.
    Sumra, I.A., Hasbullah, H., Ahmad, I., Manan, J.B.: Forming Vehicular Web of Trust in VANET. In: Electronics, Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia, pp. 1–6. IEEE (2011)Google Scholar
  13. 13.
    Sumra, I.A., Hasbullah, H., Ahmad, I., Manan, J.B.: New Card Based Scheme to Ensure Security and Trust in Vehicular Communications. In: Electronics, Communications and Photonics Conference (SIECPC), Riyadh, Saudi Arabia, pp. 1–6. IEEE (2011)Google Scholar
  14. 14.
    Biswas, S., Misic, J., Misic, V.: ID-based safety message authentication for security and trust in vehicular networks. In: Proceeding in International Conference on Distributed Computing Systems Workshops, Minnesota, USA, pp. 323–331. IEEE (2011)Google Scholar
  15. 15.
    Zhang, J.: A Survey on Trust Management for VANETs. In: International Conference on Advanced Information Networking and Applications, Biopolis, Singapore, pp. 105–112. IEEE (2011)Google Scholar
  16. 16.
    Abumansoor, O., Boukerche, A.: Towards a Secure Model for Vehicular Ad-hoc Networks Services. In: Global Telecommunications Conference (GLOBECOM), pp. 1–5. IEEE (2011)Google Scholar
  17. 17.
    Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. In: The 27th Conference in Computer Communications, INFOCOM, USA, pp. 1238–1246. IEEE (2008)Google Scholar
  18. 18.
    Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A Data Intensive Reputation Management Scheme for Vehicular Ad hoc Networks. In: International Conference on Mobile and Ubiquitos Systems-Workshop, California, USA, pp. 1–8 (2006)Google Scholar
  19. 19.
    Golle, P., Greene, D., Staddon, J.: Detecting and Correcting Malicious Data in VANETs. In: Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, Philadelphia, PA, USA, pp. 29–37 (2004)Google Scholar
  20. 20.
    Dotzer, F., Fischer, L., Magiera, P.: A Vehicle Ad-hoc Network Reputation System. In: Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, Giardini Naxos, Italy, pp. 454–456 (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Merrihan Monir
    • 1
  • Ayman Abdel-Hamid
    • 1
  • Mohammed Abd El Aziz
    • 2
  1. 1.College of Computing and Information TechnologyArab Academy for Science, Technology, and Maritime TransportAlexandriaEgypt
  2. 2.Information Systems Department, Faculty of Computers and Information SciencesAin Shams UniversityCairoEgypt

Personalised recommendations