Toward More Secure and Trustworthy Transportation Cyber-Physical Systems

  • Wenjia LiEmail author
  • Houbing Song
  • Yehua Wei
  • Feng Zeng
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)


Cyber-physical systems (CPS) and cyber infrastructure are key elements of the national infrastructure, and securing them is of critical importance to national security. There is ample evidence that these systems are vulnerable to disruption and damage due to natural disasters, social crises, and terrorism. CPS applications are becoming more widespread, ranging from healthcare with patient monitoring systems to autonomous vehicles to integrated electrical power grids. Within these various application domains, transportation cyber-physical systems (TCPS) have become a very important application of CPS, in which various sensing, computing, and control components, such as in-vehicle onboard sensors, traffic surveillance cameras, smartphones carried by pedestrians, and so on, are tightly coupled to enhance the safety and efficiency of the transportation system. There have been security and safety concerns for the deployment of TCPS, such as the Jeep hack in 2015 and Tesla accident in 2016, which clearly demonstrate the urgent need to secure TCPS better. This chapter discusses how to better safeguard TCPS by means of trust management. We first describe the basic concept of trust management, and summarize its application in generalized wireless networks. Then we discuss in detail how the trust management mechanism can benefit the TCPS in particular.


  1. 1.
    Lutsey, N. (2015, September). Global milestone: The first million electric vehicles.Google Scholar
  2. 2.
    Schrank, D., Eisele, B., Lomax, T., & Tti’s (2012). Urban mobility report (p. 2012). Texas A&M Transportation Institute: The Texas A&M University System.Google Scholar
  3. 3.
    W. H. Organization (2015). Global status report on road safety 2015.Google Scholar
  4. 4.
    Wang, C., & Thompson, J. (1997, March 18) Apparatus and method for motion detection and tracking of objects in a region for collision avoidance utilizing a real-time adaptive probabilistic neural network. US Patent 5,613,039.Google Scholar
  5. 5.
    Wang, E. K., Ye, Y., Xu, X., Yiu, S. M., Hui, L. C. K., & Chow, K. P. (2010). Security issues and challenges for cyber physical system. In Proceedings of the 2010 IEEE/ACM Int’L Conference on Green Computing and Communications & Int’L Conference on Cyber, Physical and Social Computing, GREENCOM-CPSCOM ’10, Washington, DC, USA, (pp. 733–738). IEEE Computer Society.Google Scholar
  6. 6.
    Fleming, B. (2015). Advances in automotive electronics [automotive electronics]. IEEE Vehicular Technology Magazine, 10, 4–11. Sept.CrossRefGoogle Scholar
  7. 7.
    Li, W., & Song, H. (2016). Art: An attack-resistant trust management scheme for securing vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 17, 960–969. April.CrossRefGoogle Scholar
  8. 8.
    Lu, R., Lin, X., Zhu, H., & Shen, X. (2009, April). Spark: A new vanet-based smart parking scheme for large parking lots. In INFOCOM 2009, IEEE (pp. 1413–1421).Google Scholar
  9. 9.
    Greenberg, A. (2015). Hackers remotely kill a jeep on the highway.Google Scholar
  10. 10.
    Greenberg, A. (2015) After jeep hack, chrysler recalls 1.4m vehicles for bug fix.Google Scholar
  11. 11.
    Raya, M., Papadimitratos, P., Gligor, V. D., & Hubaux, J. -P. (2008). On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE INFOCOM 2008 (pp. 1238–1246). IEEE.Google Scholar
  12. 12.
    Ren, Y., & Boukerche, A. (2009, June). Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks. In Proceedings of 2009 IEEE International Conference on Communications, ICC ’09. (pp. 1–5).Google Scholar
  13. 13.
    Li, W., Joshi, A., & Finin, T. (2010, May) Coping with node misbehaviors in ad hoc networks: A multi-dimensional trust management approach. In Proceedings of the 11th International Conference on Mobile Data Management. MDM ’10. (pp. 112–121). IEEE Computer Society.Google Scholar
  14. 14.
    Aberer, K., & Despotovic, Z. (2001) Managing trust in a peer-2-peer information system. In Proceedings of the Tenth International Conference on Information and Knowledge Management (pp. 310–317). ACM.Google Scholar
  15. 15.
    Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003) The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web, WWW ’03 (pp. 640–651). ACM.Google Scholar
  16. 16.
    Wang, Y., & Vassileva, J. (2003, September). Trust and reputation model in peer-to-peer networks. In Third International Conference on Peer-to-Peer Computing, 2003. (P2P 2003). Proceedings (pp. 150–157).Google Scholar
  17. 17.
    Boukerch, A., Xu, L., & El-Khatib, K. (2007). Trust-based security for wireless ad hoc and sensor networks. Computer Communications, 30(11), 2413–2427.CrossRefGoogle Scholar
  18. 18.
    Shaikh, R., Jameel, H., d’Auriol, B., Lee, H., Lee, S., & Song, Y.-J. (2009). Group-based trust management scheme for clustered wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems, 20, 1698–1712. Nov.CrossRefGoogle Scholar
  19. 19.
    Lopez, J., Roman, R., Agudo, I., & Fernandez-Gago, C. (2010). Trust management systems for wireless sensor networks: Best practices. Computer Communications, 33(9), 1086–1093.CrossRefGoogle Scholar
  20. 20.
    Buchegger, S., Boudec, J. -Y. L. (2003). A robust reputation system for mobile ad-hoc networks. In Proceedings of P2PEcon.Google Scholar
  21. 21.
    He, Q., Wu, D.,& Khosla, P. (2004, March). Sori: a secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of 2004 IEEE Wireless Communications and Networking Conference, WCNC ’04. (Vol. 2, pp. 825–830).Google Scholar
  22. 22.
    Buchegger, S., & Boudec, J. -Y. L. (2003). The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In Proceedings of WiOpt 2003: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks.Google Scholar
  23. 23.
    Buchegger, S., & Le Boudec, J. -Y. (2002). Performance analysis of the confidant protocol. In MobiHoc ’02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing, New York, NY, USA (pp. 226–236). ACM.Google Scholar
  24. 24.
    Buchegger, S., & Le Boudec, J. (2003). The effect of rumor spreading in reputation systems for mobile Ad-hoc Networks. In Proceedings of WiOpt’03: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. Sophia Antipolis, France.Google Scholar
  25. 25.
    Michiardi, P., & Molva, R. (2002). Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, Deventer, The Netherlands, The Netherlands (pp. 107–121). Kluwer, B.V.Google Scholar
  26. 26.
    Patwardhan, A., Joshi, A., Finin, T., & Yesha, Y. (2006, July). A data intensive reputation management scheme for vehicular ad hoc networks. In Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems—Workshops, Mobiquitous ’06. (pp. 1–8).Google Scholar
  27. 27.
    Bao, F., Chen, I. R., Chang, M., & Cho, J. H. (2012). Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Transactions on Network and Service Management, 9, 169–183. June.CrossRefGoogle Scholar
  28. 28.
    He, D., Chen, C., Chan, S., Bu, J., & Vasilakos, A. V. (2012). Retrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Transactions on Information Technology in Biomedicine, 16, 623–632. July.CrossRefGoogle Scholar
  29. 29.
    Chen, I. R., Bao, F., Chang, M., & Cho, J. H. (2014). Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Transactions on Parallel and Distributed Systems, 25, 1200–1210. May.CrossRefGoogle Scholar
  30. 30.
    Wei, Z., Tang, H., Yu, F. R., Wang, M., & Mason, P. (2014). Security enhancements for mobile ad hoc networks with trust management using uncertain reasoning. IEEE Transactions on Vehicular Technology, 63, 4647–4658. Nov.CrossRefGoogle Scholar
  31. 31.
    Ren, Y., Zadorozhny, V. I., Oleshchuk, V. A., & Li, F. Y. (2014). A novel approach to trust management in unattended wireless sensor networks. IEEE Transactions on Mobile Computing, 13, 1409–1423. July.CrossRefGoogle Scholar
  32. 32.
    Mousavifar, S. A., & Leung, C. (2015). Energy efficient collaborative spectrum sensing based on trust management in cognitive radio networks. IEEE Transactions on Wireless Communications, 14, 1927–1939. April.CrossRefGoogle Scholar
  33. 33.
    Papadimitratos, P., Buttyan, L., Holczer, T., Schoch, E., Freudiger, J., Raya, M., et al. (2008). Secure vehicular communication systems: Design and architecture. IEEE Communications Magazine, 46, 100–109. November.CrossRefGoogle Scholar
  34. 34.
    Haddadou, N.,& Rachedi, A. (2013, June). Dtm2: Adapting job market signaling for distributed trust management in vehicular ad hoc networks. In 2013 IEEE International Conference on Communications (ICC) (pp. 1827–1832).Google Scholar
  35. 35.
    Haddadou, N., Rachedi, A., & Ghamri-Doudane, Y. (2015). A job market signaling scheme for incentive and trust management in vehicular ad hoc networks. IEEE Transactions on Vehicular Technology, 64, 3657–3674. Aug.CrossRefGoogle Scholar
  36. 36.
    Liao, C., Chang, J., Lee, I., & Venkatasubramanian, K. K. (2013, June). A trust model for vehicular network-based incident reports. In 2013 IEEE 5th International Symposium on Wireless Vehicular Communications (WiVeC) (pp. 1–5).Google Scholar
  37. 37.
    Huang, Z., Ruj, S., Cavenaghi, M. A., Stojmenovic, M., & Nayak, A. (2014). A social network approach to trust management in vanets. Peer-to-Peer Networking and Applications, 7(3), 229–242.CrossRefGoogle Scholar
  38. 38.
    Rawat, D. B., Yan, G., Bista, B. B., & Weigle, M. C. (2015). Trust on the security of wireless vehicular ad-hoc networking. Ad Hoc & Sensor Wireless Networks, 24(3–4), 283–305.Google Scholar
  39. 39.
    Chen, X., & Wang, L. (2017). A cloud-based trust management framework for vehicular social networks. In IEEE Access, 5, 2967–2980.Google Scholar

Copyright information

© The Author(s) 2017

Authors and Affiliations

  1. 1.Department of Computer ScienceNew York Institute of TechnologyNew YorkUSA
  2. 2.Department of Electrical, Computer, Software, and Systems EngineeringEmbry-Riddle Aeronautical UniversityDaytona BeachUSA
  3. 3.School of Physics and Information ScienceHunan Normal UniversityHunanChina
  4. 4.School of SoftwareCentral South UniversityHunanChina

Personalised recommendations