Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2014

01.09.2014

A social network approach to trust management in VANETs

verfasst von: Zhen Huang, Sushmita Ruj, Marcos A. Cavenaghi, Milos Stojmenovic, Amiya Nayak

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Raya M (2009) Data-centric trust in ephemeral networks. PhD thesis. EPFL, Lausanne Raya M (2009) Data-centric trust in ephemeral networks. PhD thesis. EPFL, Lausanne
2.
Zurück zum Zitat Wasef A, Shen X (2009) Maac: message authentication acceleration protocol for vehicular ad hoc networks. In: IEEE GLOBECOM, pp 1–6 Wasef A, Shen X (2009) Maac: message authentication acceleration protocol for vehicular ad hoc networks. In: IEEE GLOBECOM, pp 1–6
3.
Zurück zum Zitat Zhu H, Lin X, Lu R, Ho P-H, Shen X (2008) Aema: an aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In: IEEE ICC, pp 1436–1440 Zhu H, Lin X, Lu R, Ho P-H, Shen X (2008) Aema: an aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In: IEEE ICC, pp 1436–1440
4.
Zurück zum Zitat Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: Proc. IEEE INFOCOM’10, San Diego, California, USA, 14–19 March 2010 Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: Proc. IEEE INFOCOM’10, San Diego, California, USA, 14–19 March 2010
5.
Zurück zum Zitat Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. IEEE INFOCOM’11, Shanghai, China, 10–15 April 2011 Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. IEEE INFOCOM’11, Shanghai, China, 10–15 April 2011
6.
Zurück zum Zitat Lu R, Lin X, Liang X, Shen X (2010) Sacrificing the plum tree for the peach tree: a socialspot tactic for protecting receiver-location privacy in VANET. In: Proc. IEEE Globecom’10, Miami, Florida, USA, 6–10 Dec 2010 Lu R, Lin X, Liang X, Shen X (2010) Sacrificing the plum tree for the peach tree: a socialspot tactic for protecting receiver-location privacy in VANET. In: Proc. IEEE Globecom’10, Miami, Florida, USA, 6–10 Dec 2010
7.
Zurück zum Zitat Ruj S, Cavenaghi MA, Huang Z, Nayak A, Stojmenovic I (2011) On data centric misbehavior detection in VANETs. In: IEEE 74th Vehicular Technology Conference, VTC-Fall, San Francisco, USA Ruj S, Cavenaghi MA, Huang Z, Nayak A, Stojmenovic I (2011) On data centric misbehavior detection in VANETs. In: IEEE 74th Vehicular Technology Conference, VTC-Fall, San Francisco, USA
8.
Zurück zum Zitat Papadimitratos P, Buttyan L, Holczer T, Schoch E, Freudiger J, Raya M, Ma Z, Kargl F, Kung A, Hubaux JP (2008) Secure vehicular communication systems: design and architecture. IEEE Wirel Commun Mag 46(11):100–109CrossRef Papadimitratos P, Buttyan L, Holczer T, Schoch E, Freudiger J, Raya M, Ma Z, Kargl F, Kung A, Hubaux JP (2008) Secure vehicular communication systems: design and architecture. IEEE Wirel Commun Mag 46(11):100–109CrossRef
9.
Zurück zum Zitat Papadimitratos P, Buttyan L, Hubaux J-P, Kargl F, Kung A, Raya M (2007) Architecture for secure and private vehicular communications. In: IEEE ITST, pp 1–6 Papadimitratos P, Buttyan L, Hubaux J-P, Kargl F, Kung A, Raya M (2007) Architecture for secure and private vehicular communications. In: IEEE ITST, pp 1–6
10.
Zurück zum Zitat Buttyán L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: ESAS. Lecture notes in computer science, vol 4572, pp 129–141 Buttyán L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: ESAS. Lecture notes in computer science, vol 4572, pp 129–141
11.
Zurück zum Zitat Freudiger J, Manshaei MH, Le Boudec J-Y, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. In: IEEE INFOCOM, pp 1577–1585 Freudiger J, Manshaei MH, Le Boudec J-Y, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. In: IEEE INFOCOM, pp 1577–1585
12.
Zurück zum Zitat Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A (2007) Efficient and robust pseudonymous authentication in vanet. In: Holfelder W, Santi P, Hu Y-C, Hubaux J-P (eds) Vehicular ad hoc networks, pp 19–28 Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A (2007) Efficient and robust pseudonymous authentication in vanet. In: Holfelder W, Santi P, Hu Y-C, Hubaux J-P (eds) Vehicular ad hoc networks, pp 19–28
13.
Zurück zum Zitat Zhang J (2011) A survey on trust management for vanets. In: 25th IEEE international conference on advanced information networking and applications, pp 105–112 Zhang J (2011) A survey on trust management for vanets. In: 25th IEEE international conference on advanced information networking and applications, pp 105–112
14.
Zurück zum Zitat Easley D, Kleinberg J (2010). Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press Easley D, Kleinberg J (2010). Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press
16.
Zurück zum Zitat Huang Z, Ruj S, Cavenaghi MA, Nayak A (2011) Limitations of trust management schemes in VANET and countermeasures. In: IEEE PIMRC Huang Z, Ruj S, Cavenaghi MA, Nayak A (2011) Limitations of trust management schemes in VANET and countermeasures. In: IEEE PIMRC
17.
Zurück zum Zitat Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. In: Baye MR (ed) The economics of the internet and E-commerce. Advances in applied microeconomics. Elsevier Science, pp 127–157 Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. In: Baye MR (ed) The economics of the internet and E-commerce. Advances in applied microeconomics. Elsevier Science, pp 127–157
18.
Zurück zum Zitat Dotzer F, Fischer L, Magiera P (2005) Vars: a vehicle ad-hoc network reputation system. In: IEEE international symposium on a world of wireless mobile and multimedia networks, pp 454–456 Dotzer F, Fischer L, Magiera P (2005) Vars: a vehicle ad-hoc network reputation system. In: IEEE international symposium on a world of wireless mobile and multimedia networks, pp 454–456
19.
Zurück zum Zitat Lo N-W, Tsai H-C (2009) A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP - Journal on Wireless Communications and Networking. doi:10.1155/2009/125348 Lo N-W, Tsai H-C (2009) A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP - Journal on Wireless Communications and Networking. doi:10.​1155/​2009/​125348
20.
Zurück zum Zitat Minhas UF, Zhang J, Tran T, Cohen R (2010) Towards expanded trust management for agents in vehicular ad-hoc networks. IJCITP 5(1):3–15 Minhas UF, Zhang J, Tran T, Cohen R (2010) Towards expanded trust management for agents in vehicular ad-hoc networks. IJCITP 5(1):3–15
21.
Zurück zum Zitat Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology, pp 243–247 Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology, pp 243–247
22.
Zurück zum Zitat Raya M, Shokri R, Hubaux J-P (2010) On the tradeoff between trust and privacy in wireless ad hoc networks. In: ACM WISEC, pp 75–80 Raya M, Shokri R, Hubaux J-P (2010) On the tradeoff between trust and privacy in wireless ad hoc networks. In: ACM WISEC, pp 75–80
23.
Zurück zum Zitat Schmidt RK, Leinmuller T, Schoch E, Held A, Schafer G (2008) Vehicle behavior analysis to enhance security in vanets. In: Workshop on vehicle to vehicle communications Schmidt RK, Leinmuller T, Schoch E, Held A, Schafer G (2008) Vehicle behavior analysis to enhance security in vanets. In: Workshop on vehicle to vehicle communications
24.
Zurück zum Zitat Zhang J, Chen C, Cohen R (2010) A scalable and effective trust-based framework for vehicular ad-hoc networks. JoWUA 1(4):3–15 Zhang J, Chen C, Cohen R (2010) A scalable and effective trust-based framework for vehicular ad-hoc networks. JoWUA 1(4):3–15
25.
Zurück zum Zitat Adams WJ, Davis NJ (2005) Toward a decentralized trust-based access control system for dynamic collaboration. In: IEEE workshop on information assurance, pp 317–324 Adams WJ, Davis NJ (2005) Toward a decentralized trust-based access control system for dynamic collaboration. In: IEEE workshop on information assurance, pp 317–324
26.
Zurück zum Zitat Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In: Proceedings of the security protocols workshop, pp 47–66 Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In: Proceedings of the security protocols workshop, pp 47–66
27.
Zurück zum Zitat Sun YL, Han Z, Ray Liu KJ (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Areas Commun 24(2):305–317CrossRefMATH Sun YL, Han Z, Ray Liu KJ (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Areas Commun 24(2):305–317CrossRefMATH
28.
Zurück zum Zitat Lu R, Li X, Liang X, Lin X, Shen X (2011) GRS: The green, reliability, and security of emergingmachine to machine communications. IEEE Commun Mag (Feature topic on recent progress in machine to machine communications) 49(4):28–35 Lu R, Li X, Liang X, Lin X, Shen X (2011) GRS: The green, reliability, and security of emergingmachine to machine communications. IEEE Commun Mag (Feature topic on recent progress in machine to machine communications) 49(4):28–35
29.
Zurück zum Zitat Li X, Li Z, Stojmenovic M, Narasimhan V, Nayak A (2012) Autoregressive trust management in wireless Ad Hoc networks. In: Ad Hoc sensor wireless networks, (to appear) Li X, Li Z, Stojmenovic M, Narasimhan V, Nayak A (2012) Autoregressive trust management in wireless Ad Hoc networks. In: Ad Hoc sensor wireless networks, (to appear)
30.
Zurück zum Zitat Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: MOBICOM, pp 255–265 Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: MOBICOM, pp 255–265
31.
Zurück zum Zitat Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Mobile ad hoc networks. communication and multimedia security Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Mobile ad hoc networks. communication and multimedia security
32.
Zurück zum Zitat Fahnrich S, Obreiter P (2004) The buddy system—a distributed reputation system based on social structure. Technical report, Universitat Karlsruhe, Faculty of Informatics Fahnrich S, Obreiter P (2004) The buddy system—a distributed reputation system based on social structure. Technical report, Universitat Karlsruhe, Faculty of Informatics
33.
Zurück zum Zitat Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: IEEE international conference on parallel and distributed systems, pp 665–672 Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: IEEE international conference on parallel and distributed systems, pp 665–672
34.
Zurück zum Zitat Zhang J, Cohen R (2006) Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings. In: 8th international conference on electronic commerce: the new e-commerce—innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, pp 225–234 Zhang J, Cohen R (2006) Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings. In: 8th international conference on electronic commerce: the new e-commerce—innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, pp 225–234
35.
Zurück zum Zitat Gerlach M (2007) Trust for vehicular applications. In: International symposium on autonomous decentralized systems, pp 295–304 Gerlach M (2007) Trust for vehicular applications. In: International symposium on autonomous decentralized systems, pp 295–304
36.
Zurück zum Zitat Minhas U, Zhang J, Tran T, Cohen R (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty, pp 243–247 Minhas U, Zhang J, Tran T, Cohen R (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty, pp 243–247
Metadaten
Titel
A social network approach to trust management in VANETs
verfasst von
Zhen Huang
Sushmita Ruj
Marcos A. Cavenaghi
Milos Stojmenovic
Amiya Nayak
Publikationsdatum
01.09.2014
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2014
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-012-0136-8

Weitere Artikel der Ausgabe 3/2014

Peer-to-Peer Networking and Applications 3/2014 Zur Ausgabe

Premium Partner