Trust Based Scheme for Location Finding in VANETs

  • Sonam Soni
  • Kapil Sharma
  • Brijesh Kumar Chaurasia
Conference paper
Part of the Springer Proceedings in Physics book series (SPPHY, volume 166)


VANET aims to improve road safety and reducing traffic accidents. However, false messages can result in serious conditions like collision. In this paper, trust based scheme for location finding in VANET is proposed. In the proposed trust based scheme has two phases computation of direct and indirect trust. However, evaluation of direct trust system using infrastructure (RSU) and trusted authority (TA) and evaluation of indirect trust uses watchdog approach. Results show that the proposed scheme suitable for the actual situation of VANET.


Intrusion Detection Packet Delivery Ratio Intrusion Detection System Malicious Node Location Finding 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Toor Y, Muhlethaler P, Laouti A (2008) Vehicle ad hoc networks: applications and related technical issues. IEEE Commun Surv Tutorials 10(3):74–88CrossRefGoogle Scholar
  2. 2.
    Sharma K, Soni S, Chaurasia BK (2014) Reputation and trust computation in VANETs. In: Proceedings of the IEMCON-14 conference on electronics engineering and computer science, pp 118–122Google Scholar
  3. 3.
    Ding Q, Jiang M, Li X, Zhou XH (2010) Reputation based trust model in vehicular ad hoc networks. International Conference on Wireless Communications and Signal Processing (WCSP), pp 1–6Google Scholar
  4. 4.
    Sumra IA, Hasbullah H, Lail J, Rehman M (2011) Trust and trusted computing in VANET. Comput Sci J 1(1):29–51Google Scholar
  5. 5.
    Chaurasia BK, Verma S, Tomar GS (2013) Trust computation in VANETs. In: Proceedings of the international conference on communication systems and network technologies (CSNT), pp 468–471Google Scholar
  6. 6.
    Saraswat D, Chaurasia BK (2013) AHP based trust model in VANETs. In: Proceedings of the IEEE 5th international conference on computational intelligence and communication networks (CICN), pp 391–393Google Scholar
  7. 7.
    Marmol FG, Perez GM (2012) TRIP, a trust and reputation infrastructure based proposal for vehicular ad hoc networks. J Netw Comp Appl 35(9):34–941Google Scholar
  8. 8.
    Obimbo C, Arboleda LM, Chen Y (2006) A watchdog enhancement to IDS in MANET. In: Proceedings of the IASTED conference on wireless networks, pp 510–515Google Scholar
  9. 9.
    Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: Proceeding of the 6th ACM annual international conference on mobile computing and networking, pp 255–265Google Scholar
  10. 10.
    Hasswa A, Zulkernine M, Hassanein H (2005) Routeguard: an intrusion detection and response system for mobile ad hoc networks. In: Proceedings of the IEEE international conference on wireless and mobile computing, networking and communications, vol 3. pp 336–343Google Scholar
  11. 11.
    Chaurasia BK, Verma S (2011) Infrastructure based authentication in VANETs. Int J Multimedia Ubiquit Eng 6(2):41–54Google Scholar

Copyright information

© Springer India 2015

Authors and Affiliations

  • Sonam Soni
    • 1
  • Kapil Sharma
    • 1
  • Brijesh Kumar Chaurasia
    • 1
  1. 1.Department of CSEITM University GwaliorGwaliorIndia

Personalised recommendations