Skip to main content
Erschienen in: Arabian Journal for Science and Engineering 8/2022

21.03.2022 | Research Article-Computer Engineering and Computer Science

TREE: Trust-Based Authenticated and Secure Dissemination of Emergency Event Information for the Network of Connected Vehicles

verfasst von: Kuldeep Narayan Tripathi, Ashish Mohan Yadav, S. C. Sharma

Erschienen in: Arabian Journal for Science and Engineering | Ausgabe 8/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The Vehicular communication network (VCN) becomes vulnerable to many kinds of security threats due to wireless communication and the unavailability of fixed infrastructure for communication. Plenty of emergency alert messages dissemination schemes has been proposed in VCN to provide safety to the users on the road. However, the problem of false alarm generated by malicious nodes still poses severe challenges. A false warning or alert information leads to serious consequences like road accidents, wastage of time and fuel, and compromised the security of users. To address the aforementioned issue, we have proposed a trust-based scheme (TREE) to check the authenticity of the vehicle and alert messages in VCN. The proposed scheme provides authenticated alert messages to the vehicles while mitigating false information attacks. In this work, a dynamic reputation estimation scheme is presented to determine the trustworthiness of the moving relay vehicles in the network. Furthermore, the TREE method uses the aggregated trust-based method to check the authenticity of event information. The proposed method is analyzed through extensive simulation under varying malicious nodes ratios in VCN. We have compared the performance of the proposed scheme with state-of-the-art schemes in VCN for the delivery ratio, transmission delay, and control overhead. The simulation results validate that the proposed scheme has a low false decision ratio (< 10%), high detection rate (> 97%), and efficiently disseminates the event information to surrounding vehicles. The proposed scheme is useful for a wide range of applications and improves traffic efficiency, road safety, and user convenience.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017) Hasrouny, H.; Samhat, A.E.; Bassil, C.; Laouiti, A.: VANet security challenges and solutions: a survey. Veh. Commun. 7, 7–20 (2017)
2.
Zurück zum Zitat Ghazi, M.U.; Khattak, M.A.K.; Shabir, B.; Malik, A.W.; Ramzan, M.S.: Emergency message dissemination in vehicular networks: a review. IEEE Access 8, 38606–38621 (2020)CrossRef Ghazi, M.U.; Khattak, M.A.K.; Shabir, B.; Malik, A.W.; Ramzan, M.S.: Emergency message dissemination in vehicular networks: a review. IEEE Access 8, 38606–38621 (2020)CrossRef
3.
Zurück zum Zitat Ali, I.; Hassan, A.; Li, F.: Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey. Veh. Commun. 16, 45–61 (2019) Ali, I.; Hassan, A.; Li, F.: Authentication and privacy schemes for vehicular ad hoc networks (VANETs): a survey. Veh. Commun. 16, 45–61 (2019)
4.
Zurück zum Zitat Ucar, S.; Ergen, S.C.; Ozkasap, O.: Multihop-cluster-based IEEE 802.11 p and LTE hybrid architecture for VANET safety message dissemination. IEEE Trans. Veh. Technol. 65(4), 2621–2636 (2015)CrossRef Ucar, S.; Ergen, S.C.; Ozkasap, O.: Multihop-cluster-based IEEE 802.11 p and LTE hybrid architecture for VANET safety message dissemination. IEEE Trans. Veh. Technol. 65(4), 2621–2636 (2015)CrossRef
5.
Zurück zum Zitat Tian, D.; Liu, C.; Duan, X.; Sheng, Z.; Ni, Q.; Chen, M.; Leung, V.C.: A distributed position-based protocol for emergency messages broadcasting in vehicular ad hoc networks. IEEE Internet Things J. 5(2), 1218–1227 (2018)CrossRef Tian, D.; Liu, C.; Duan, X.; Sheng, Z.; Ni, Q.; Chen, M.; Leung, V.C.: A distributed position-based protocol for emergency messages broadcasting in vehicular ad hoc networks. IEEE Internet Things J. 5(2), 1218–1227 (2018)CrossRef
6.
Zurück zum Zitat Tripathi, K.N.; Sharma, S.C.: A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS). Int. J. Syst. Assur. Eng. Manag. 11, 1–15 (2019) Tripathi, K.N.; Sharma, S.C.: A trust based model (TBM) to detect rogue nodes in vehicular ad-hoc networks (VANETS). Int. J. Syst. Assur. Eng. Manag. 11, 1–15 (2019)
7.
Zurück zum Zitat Mchergui, A.; Moulahi, T.; Alaya, B.; Nasri, S.: A survey and comparative study of QoS aware broadcasting techniques in VANET. Telecommun. Syst. 66(2), 253–281 (2017)CrossRef Mchergui, A.; Moulahi, T.; Alaya, B.; Nasri, S.: A survey and comparative study of QoS aware broadcasting techniques in VANET. Telecommun. Syst. 66(2), 253–281 (2017)CrossRef
8.
Zurück zum Zitat Xu, Q.; Su, Z.; Zhang, K.; Ren, P.; Shen, X.S.: Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans. Emerg. Top. Comput. 3(3), 399–409 (2015)CrossRef Xu, Q.; Su, Z.; Zhang, K.; Ren, P.; Shen, X.S.: Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans. Emerg. Top. Comput. 3(3), 399–409 (2015)CrossRef
9.
Zurück zum Zitat Alam, K.M.; Saini, M.; El Saddik, A.: Toward social internet of vehicles: concept, architecture, and applications. IEEE Access 3, 343–357 (2015)CrossRef Alam, K.M.; Saini, M.; El Saddik, A.: Toward social internet of vehicles: concept, architecture, and applications. IEEE Access 3, 343–357 (2015)CrossRef
10.
Zurück zum Zitat Wang, X.; Ning, Z.; Wang, L.: Offloading in Internet of vehicles: a fog-enabled real-time traffic management system. IEEE Trans. Industr. Inf. 14(10), 4568–4578 (2018)CrossRef Wang, X.; Ning, Z.; Wang, L.: Offloading in Internet of vehicles: a fog-enabled real-time traffic management system. IEEE Trans. Industr. Inf. 14(10), 4568–4578 (2018)CrossRef
11.
Zurück zum Zitat Arya, K.V.; Tripathi, K.N.: Power aware and secure routing in mobile and ad-hoc networks. In 2013 IEEE 8th International Conference on Industrial and Information Systems, IEEE (pp. 477–482). (2013) Arya, K.V.; Tripathi, K.N.: Power aware and secure routing in mobile and ad-hoc networks. In 2013 IEEE 8th International Conference on Industrial and Information Systems, IEEE (pp. 477–482). (2013)
12.
Zurück zum Zitat Farnoud, F.; Valaee, S.: Reliable broadcast of safety messages in vehicular ad hoc networks, IEEE (pp. 226–234). (2009) Farnoud, F.; Valaee, S.: Reliable broadcast of safety messages in vehicular ad hoc networks, IEEE (pp. 226–234). (2009)
13.
Zurück zum Zitat Hafeez, K.A.; Zhao, L.; Liao, Z.; Ma, B.N.W.: A new broadcast protocol for vehicular ad hoc networks safety applications. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, IEEE (pp. 1–5). (2010) Hafeez, K.A.; Zhao, L.; Liao, Z.; Ma, B.N.W.: A new broadcast protocol for vehicular ad hoc networks safety applications. In 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, IEEE (pp. 1–5). (2010)
14.
Zurück zum Zitat Feukeu, E.A.; Zuva, T.: Dynamic broadcast storm mitigation approach for VANETs. Futur. Gener. Comput. Syst. 107, 1097–1104 (2020)CrossRef Feukeu, E.A.; Zuva, T.: Dynamic broadcast storm mitigation approach for VANETs. Futur. Gener. Comput. Syst. 107, 1097–1104 (2020)CrossRef
15.
Zurück zum Zitat Cunha, F.; Villas, L.; Boukerche, A.; Maia, G.; Viana, A.; Mini, R.A.; Loureiro, A.A.: Data communication in VANETs: protocols, applications and challenges. Ad Hoc Netw. 44, 90–103 (2016)CrossRef Cunha, F.; Villas, L.; Boukerche, A.; Maia, G.; Viana, A.; Mini, R.A.; Loureiro, A.A.: Data communication in VANETs: protocols, applications and challenges. Ad Hoc Netw. 44, 90–103 (2016)CrossRef
16.
Zurück zum Zitat Chen, R.; Jin, W.L.; Regan, A.: Broadcasting safety information in vehicular networks: issues and approaches. IEEE Netw. 24(1), 20–25 (2010)CrossRef Chen, R.; Jin, W.L.; Regan, A.: Broadcasting safety information in vehicular networks: issues and approaches. IEEE Netw. 24(1), 20–25 (2010)CrossRef
17.
Zurück zum Zitat Sahoo, J.; Wu, E.H.K.; Sahu, P.K.; Gerla, M.: Binary-partition-assisted MAC-layer broadcast for emergency message dissemination in VANETs. IEEE Trans. Intell. Transp. Syst. 12(3), 757–770 (2011)CrossRef Sahoo, J.; Wu, E.H.K.; Sahu, P.K.; Gerla, M.: Binary-partition-assisted MAC-layer broadcast for emergency message dissemination in VANETs. IEEE Trans. Intell. Transp. Syst. 12(3), 757–770 (2011)CrossRef
18.
Zurück zum Zitat Tripathi, K.N.; Jain, G.; Yadav, A.M.; Sharma, S.C.: Entity-Centric Combined Trust (ECT) Algorithm to Detect Packet Dropping Attack in Vehicular Ad Hoc Networks (VANETs). In Next Generation Information Processing System (pp. 23–33). Springer, Singapore. (2021) Tripathi, K.N.; Jain, G.; Yadav, A.M.; Sharma, S.C.: Entity-Centric Combined Trust (ECT) Algorithm to Detect Packet Dropping Attack in Vehicular Ad Hoc Networks (VANETs). In Next Generation Information Processing System (pp. 23–33). Springer, Singapore. (2021)
19.
Zurück zum Zitat Shabut, A.M.; Dahal, K.P.; Bista, S.K.; Awan, I.U.: Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans. Mob. Comput. 14(10), 2101–2115 (2014)CrossRef Shabut, A.M.; Dahal, K.P.; Bista, S.K.; Awan, I.U.: Recommendation based trust model with an effective defence scheme for MANETs. IEEE Trans. Mob. Comput. 14(10), 2101–2115 (2014)CrossRef
20.
Zurück zum Zitat Qu, F.; Wu, Z.; Wang, F.Y.; Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)CrossRef Qu, F.; Wu, Z.; Wang, F.Y.; Cho, W.: A security and privacy review of VANETs. IEEE Trans. Intell. Transp. Syst. 16(6), 2985–2996 (2015)CrossRef
21.
Zurück zum Zitat Tangade, S.; Manvi, S.S.; Lorenz, P.: Decentralized and scalable privacy-preserving authentication scheme in VANETs. IEEE Trans. Veh. Technol. 67(9), 8647–8655 (2018)CrossRef Tangade, S.; Manvi, S.S.; Lorenz, P.: Decentralized and scalable privacy-preserving authentication scheme in VANETs. IEEE Trans. Veh. Technol. 67(9), 8647–8655 (2018)CrossRef
22.
Zurück zum Zitat Zhang, L.; Wu, Q.; Domingo-Ferrer, J.; Qin, B.; Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 18(3), 516–526 (2016)CrossRef Zhang, L.; Wu, Q.; Domingo-Ferrer, J.; Qin, B.; Hu, C.: Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans. Intell. Transp. Syst. 18(3), 516–526 (2016)CrossRef
23.
Zurück zum Zitat Chen, C.; Zhang, J.; Cohen, R.; Ho, P.H.: A trust modeling framework for message propagation and evaluation in VANETs. In 2010 2nd International Conference on Information Technology Convergence and Services, IEEE (pp. 1–8). (2010) Chen, C.; Zhang, J.; Cohen, R.; Ho, P.H.: A trust modeling framework for message propagation and evaluation in VANETs. In 2010 2nd International Conference on Information Technology Convergence and Services, IEEE (pp. 1–8). (2010)
24.
Zurück zum Zitat Wang, D.; Muller, T.; Liu, Y.; Zhang, J.: Towards robust and effective trust management for security: a survey. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE (pp. 511–518). (2014) Wang, D.; Muller, T.; Liu, Y.; Zhang, J.: Towards robust and effective trust management for security: a survey. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, IEEE (pp. 511–518). (2014)
25.
Zurück zum Zitat Yadav, A.M.; Tripathi, K.N.; Sharma, S.C.: A bi-objective task scheduling approach in fog computing using hybrid fireworks algorithm. J. Supercomput. 78, 1–25 (2021) Yadav, A.M.; Tripathi, K.N.; Sharma, S.C.: A bi-objective task scheduling approach in fog computing using hybrid fireworks algorithm. J. Supercomput. 78, 1–25 (2021)
26.
Zurück zum Zitat Li, Q.; Malip, A.; Martin, K.M.; Ng, S.L.; Zhang, J.: A reputation-based announcement scheme for VANETs. IEEE Trans. Veh. Technol. 61(9), 4095–4108 (2012)CrossRef Li, Q.; Malip, A.; Martin, K.M.; Ng, S.L.; Zhang, J.: A reputation-based announcement scheme for VANETs. IEEE Trans. Veh. Technol. 61(9), 4095–4108 (2012)CrossRef
27.
Zurück zum Zitat Raya, M.; Papadimitratos, P.; Gligor, V.D.; Hubaux, J.P.: On data-centric trust establishment in ephemeral ad hoc networks. In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, IEEE (pp. 1238–1246). (2008) Raya, M.; Papadimitratos, P.; Gligor, V.D.; Hubaux, J.P.: On data-centric trust establishment in ephemeral ad hoc networks. In IEEE INFOCOM 2008-The 27th Conference on Computer Communications, IEEE (pp. 1238–1246). (2008)
28.
Zurück zum Zitat Ostermaier, B.; Dotzer, F.; Strassberger, M.: Enhancing the security of local dangerwarnings in vanets-a simulative analysis of voting schemes. In The Second International Conference on Availability, Reliability and Security (ARES'07), IEEE. (pp. 422–431). (2007) Ostermaier, B.; Dotzer, F.; Strassberger, M.: Enhancing the security of local dangerwarnings in vanets-a simulative analysis of voting schemes. In The Second International Conference on Availability, Reliability and Security (ARES'07), IEEE. (pp. 422–431). (2007)
29.
Zurück zum Zitat Yao, X.; Zhang, X.; Ning, H.; Li, P.: Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Netw. 55, 107–118 (2017)CrossRef Yao, X.; Zhang, X.; Ning, H.; Li, P.: Using trust model to ensure reliable data acquisition in VANETs. Ad Hoc Netw. 55, 107–118 (2017)CrossRef
30.
Zurück zum Zitat Lyu, F.; Zhu, H.; Zhou, H.; Xu, W.; Zhang, N.; Li, M.; Shen, X.: SS-MAC: a novel time slot-sharing MAC for safety messages broadcasting in VANETs. IEEE Trans. Veh. Technol. 67(4), 3586–3597 (2017)CrossRef Lyu, F.; Zhu, H.; Zhou, H.; Xu, W.; Zhang, N.; Li, M.; Shen, X.: SS-MAC: a novel time slot-sharing MAC for safety messages broadcasting in VANETs. IEEE Trans. Veh. Technol. 67(4), 3586–3597 (2017)CrossRef
31.
Zurück zum Zitat Rostamzadeh, K.; Nicanfar, H.; Torabi, N.; Gopalakrishnan, S.; Leung, V.C.: A context-aware trust-based information dissemination framework for vehicular networks. IEEE Internet Things J. 2(2), 121–132 (2015)CrossRef Rostamzadeh, K.; Nicanfar, H.; Torabi, N.; Gopalakrishnan, S.; Leung, V.C.: A context-aware trust-based information dissemination framework for vehicular networks. IEEE Internet Things J. 2(2), 121–132 (2015)CrossRef
32.
Zurück zum Zitat Jiang, S.; Zhu, X.; Wang, L.: An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)CrossRef Jiang, S.; Zhu, X.; Wang, L.: An efficient anonymous batch authentication scheme based on HMAC for VANETs. IEEE Trans. Intell. Transp. Syst. 17(8), 2193–2204 (2016)CrossRef
33.
Zurück zum Zitat Lu, R.; Lin, X.; Liang, X.; Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2011)CrossRef Lu, R.; Lin, X.; Liang, X.; Shen, X.: A dynamic privacy-preserving key management scheme for location-based services in VANETs. IEEE Trans. Intell. Transp. Syst. 13(1), 127–139 (2011)CrossRef
34.
Zurück zum Zitat Li, X.; Liu, J.; Li, X.; Sun, W.: RGTE: A reputation-based global trust establishment in VANETs. In 2013 5th International Conference on Intelligent Networking and Collaborative Systems, IEEE. (pp. 210–214). (2013) Li, X.; Liu, J.; Li, X.; Sun, W.: RGTE: A reputation-based global trust establishment in VANETs. In 2013 5th International Conference on Intelligent Networking and Collaborative Systems, IEEE. (pp. 210–214). (2013)
35.
Zurück zum Zitat Ltifi, A.; Zouinkhi, A.; Bouhlel, M.S.: Trust-based scheme for alert spreading in VANET. Procedia Comput. Sci. 73, 282–289 (2015)CrossRef Ltifi, A.; Zouinkhi, A.; Bouhlel, M.S.: Trust-based scheme for alert spreading in VANET. Procedia Comput. Sci. 73, 282–289 (2015)CrossRef
36.
Zurück zum Zitat Bamberger, W.; Schlittenlacher, J.; Diepold, K.: A trust model for intervehicular communication based on belief theory. In 2010 IEEE Second International Conference on Social Computing, IEEE. (pp. 73–80). (2010) Bamberger, W.; Schlittenlacher, J.; Diepold, K.: A trust model for intervehicular communication based on belief theory. In 2010 IEEE Second International Conference on Social Computing, IEEE. (pp. 73–80). (2010)
37.
Zurück zum Zitat Wang, J.; Liu, Y.; Liu, X.; Zhang, J.: A trust propagation scheme in VANETs. In 2009 IEEE Intelligent Vehicles Symposium, IEEE. (pp. 1067–1071). (2009) Wang, J.; Liu, Y.; Liu, X.; Zhang, J.: A trust propagation scheme in VANETs. In 2009 IEEE Intelligent Vehicles Symposium, IEEE. (pp. 1067–1071). (2009)
38.
Zurück zum Zitat Gazdar, T.; Rachedi, A.; Benslimane, A.; Belghith, A.: A distributed advanced analytical trust model for VANETs. In 2012 IEEE Global Communications Conference (GLOBECOM), IEEE. (pp. 201–206). (2012) Gazdar, T.; Rachedi, A.; Benslimane, A.; Belghith, A.: A distributed advanced analytical trust model for VANETs. In 2012 IEEE Global Communications Conference (GLOBECOM), IEEE. (pp. 201–206). (2012)
39.
Zurück zum Zitat Liu, Z.; Ma, J.; Jiang, Z.; Zhu, H.; Miao, Y.: LSOT: a lightweight self-organized trust model in VANETs. Mobile Information Systems, 2016 Liu, Z.; Ma, J.; Jiang, Z.; Zhu, H.; Miao, Y.: LSOT: a lightweight self-organized trust model in VANETs. Mobile Information Systems, 2016
40.
Zurück zum Zitat El-Sayed, H.; Ignatious, H.A.; Kulkarni, P.; Bouktif, S.: Machine learning based trust management framework for vehicular networks. Veh. Commun. 25, 100256 (2020) El-Sayed, H.; Ignatious, H.A.; Kulkarni, P.; Bouktif, S.: Machine learning based trust management framework for vehicular networks. Veh. Commun. 25, 100256 (2020)
41.
Zurück zum Zitat Yadav, A.M.; Sharma, S.C.; Tripathi, K.N.: A Two-Step Technique for Effective Scheduling in Cloud–Fog Computing Paradigm. In Advances in Computational Intelligence and Communication Technology (pp. 367–379). Springer, Singapore. (2021) Yadav, A.M.; Sharma, S.C.; Tripathi, K.N.: A Two-Step Technique for Effective Scheduling in Cloud–Fog Computing Paradigm. In Advances in Computational Intelligence and Communication Technology (pp. 367–379). Springer, Singapore. (2021)
42.
Zurück zum Zitat Jain, G.; Mahara, T.; Tripathi, K.N.: A survey of similarity measures for collaborative filtering-based recommender system. Soft computing: theories and applications, 343–352. (2020) Jain, G.; Mahara, T.; Tripathi, K.N.: A survey of similarity measures for collaborative filtering-based recommender system. Soft computing: theories and applications, 343–352. (2020)
43.
Zurück zum Zitat Huang, Z.; Ruj, S.; Cavenaghi, M.A.; Stojmenovic, M.; Nayak, A.: A social network approach to trust management in VANETs. Peer-to-Peer Netw. Appl. 7(3), 229–242 (2014)CrossRef Huang, Z.; Ruj, S.; Cavenaghi, M.A.; Stojmenovic, M.; Nayak, A.: A social network approach to trust management in VANETs. Peer-to-Peer Netw. Appl. 7(3), 229–242 (2014)CrossRef
44.
Zurück zum Zitat Liu, J.; Yang, W.; Zhang, J.; Yang, C.: Detecting false messages in vehicular ad hoc networks based on a traffic flow model. Int. J. Distrib. Sens. Netw. 16(2), 1550147720906390 (2020)CrossRef Liu, J.; Yang, W.; Zhang, J.; Yang, C.: Detecting false messages in vehicular ad hoc networks based on a traffic flow model. Int. J. Distrib. Sens. Netw. 16(2), 1550147720906390 (2020)CrossRef
45.
Zurück zum Zitat Mihelj, J.; Kos, A.; Sedlar, U.: Source reputation assessment in an IoT-based vehicular traffic monitoring system. Procedia Comput. Sci. 147, 295–299 (2019)CrossRef Mihelj, J.; Kos, A.; Sedlar, U.: Source reputation assessment in an IoT-based vehicular traffic monitoring system. Procedia Comput. Sci. 147, 295–299 (2019)CrossRef
46.
Zurück zum Zitat Lo, N.W.; Tsai, H.C.: A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2009, 1–10 (2009)CrossRef Lo, N.W.; Tsai, H.C.: A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2009, 1–10 (2009)CrossRef
47.
Zurück zum Zitat Arshad, M.; Ullah, Z.; Khalid, M.; Ahmad, N.; Khalid, W.; Shahwar, D.; Cao, Y.: Beacon trust management system and fake data detection in vehicular ad-hoc networks. IET Intel. Transp. Syst. 13(5), 780–788 (2019)CrossRef Arshad, M.; Ullah, Z.; Khalid, M.; Ahmad, N.; Khalid, W.; Shahwar, D.; Cao, Y.: Beacon trust management system and fake data detection in vehicular ad-hoc networks. IET Intel. Transp. Syst. 13(5), 780–788 (2019)CrossRef
48.
Zurück zum Zitat Paranjothi, A.; Khan, M.S.; Zeadally, S.; Pawar, A.; Hicks, D.: GSTR: SECURE multi-hop message dissemination in connected vehicles using social trust model. Internet Things 7, 100071 (2019)CrossRef Paranjothi, A.; Khan, M.S.; Zeadally, S.; Pawar, A.; Hicks, D.: GSTR: SECURE multi-hop message dissemination in connected vehicles using social trust model. Internet Things 7, 100071 (2019)CrossRef
49.
Zurück zum Zitat Cao, D.; Zheng, B.; Ji, B.; Lei, Z.; Feng, C.: A robust distance-based relay selection for message dissemination in vehicular network. Wireless Netw. 26(3), 1755–1771 (2020)CrossRef Cao, D.; Zheng, B.; Ji, B.; Lei, Z.; Feng, C.: A robust distance-based relay selection for message dissemination in vehicular network. Wireless Netw. 26(3), 1755–1771 (2020)CrossRef
50.
Zurück zum Zitat Lin, X.; Li, X.: Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 62(7), 3339–3348 (2013)CrossRef Lin, X.; Li, X.: Achieving efficient cooperative message authentication in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 62(7), 3339–3348 (2013)CrossRef
51.
Zurück zum Zitat Ramakrishnan, B.; Nishanth, R.B.; Joe, M.M.; Selvi, M.: Cluster based emergency message broadcasting technique for vehicular ad hoc network. Wireless Netw. 23(1), 233–248 (2017)CrossRef Ramakrishnan, B.; Nishanth, R.B.; Joe, M.M.; Selvi, M.: Cluster based emergency message broadcasting technique for vehicular ad hoc network. Wireless Netw. 23(1), 233–248 (2017)CrossRef
52.
Zurück zum Zitat Vijayakumar, V.; Joseph, K.S.: Adaptive load balancing schema for efficient data dissemination in Vehicular Ad-Hoc Network VANET. Alex. Eng. J. 58(4), 1157–1166 (2019)CrossRef Vijayakumar, V.; Joseph, K.S.: Adaptive load balancing schema for efficient data dissemination in Vehicular Ad-Hoc Network VANET. Alex. Eng. J. 58(4), 1157–1166 (2019)CrossRef
53.
Zurück zum Zitat Lim, K.; Manivannan, D.: An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Veh. Commun. 4, 30–37 (2016) Lim, K.; Manivannan, D.: An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks. Veh. Commun. 4, 30–37 (2016)
54.
Zurück zum Zitat Aslam, B.; Park, S.; Zou, C.C.; Turgut, D.: Secure traffic data propagation in vehicular ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 6(1), 24–39 (2010)CrossRef Aslam, B.; Park, S.; Zou, C.C.; Turgut, D.: Secure traffic data propagation in vehicular ad hoc networks. Int. J. Ad Hoc Ubiquitous Comput. 6(1), 24–39 (2010)CrossRef
55.
Zurück zum Zitat Xia, H.; Zhang, S.S.; Li, Y.; Pan, Z.K.; Peng, X.; Cheng, X.Z.: An attack-resistant trust inference model for securing routing in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 68(7), 7108–7120 (2019)CrossRef Xia, H.; Zhang, S.S.; Li, Y.; Pan, Z.K.; Peng, X.; Cheng, X.Z.: An attack-resistant trust inference model for securing routing in vehicular ad hoc networks. IEEE Trans. Veh. Technol. 68(7), 7108–7120 (2019)CrossRef
56.
Zurück zum Zitat Ullah, N.; Kong, X.; Ning, Z.; Tolba, A.; Alrashoud, M.; Xia, F.: Emergency warning messages dissemination in vehicular social networks: a trust based scheme. Veh. Commun. 22, 100199 (2020) Ullah, N.; Kong, X.; Ning, Z.; Tolba, A.; Alrashoud, M.; Xia, F.: Emergency warning messages dissemination in vehicular social networks: a trust based scheme. Veh. Commun. 22, 100199 (2020)
57.
Zurück zum Zitat Ahmed, S.; Tepe, K.: Misbehaviour detection in vehicular networks using logistic trust. In 2016 IEEE Wireless Communications and Networking Conference, IEEE. (pp. 1–6). (2016) Ahmed, S.; Tepe, K.: Misbehaviour detection in vehicular networks using logistic trust. In 2016 IEEE Wireless Communications and Networking Conference, IEEE. (pp. 1–6). (2016)
58.
Zurück zum Zitat da Costa, J.B.; de Souza, A.M.; Rosário, D.; Cerqueira, E.; Villas, L.A.: Efficient data dissemination protocol based on complex networks’ metrics for urban vehicular networks. J. Internet Serv. Appl. 10(1), 1–13 (2019) da Costa, J.B.; de Souza, A.M.; Rosário, D.; Cerqueira, E.; Villas, L.A.: Efficient data dissemination protocol based on complex networks’ metrics for urban vehicular networks. J. Internet Serv. Appl. 10(1), 1–13 (2019)
60.
Zurück zum Zitat Husain, A.; Sharma, S.C.: Comparative analysis of location and zone based routing in VANET with IEEE802. 11p in city scenario. In 2015 International Conference on Advances in Computer Engineering and Applications, IEEE. (pp. 294–299). (2015) Husain, A.; Sharma, S.C.: Comparative analysis of location and zone based routing in VANET with IEEE802. 11p in city scenario. In 2015 International Conference on Advances in Computer Engineering and Applications, IEEE. (pp. 294–299). (2015)
61.
Zurück zum Zitat Gurung, S.; Lin, D.; Squicciarini, A.; Bertino, E.: Information-oriented trustworthiness evaluation in vehicular ad-hoc networks. In International Conference on Network and System Security (pp. 94–108). Springer, Berlin, Heidelberg. (2013) Gurung, S.; Lin, D.; Squicciarini, A.; Bertino, E.: Information-oriented trustworthiness evaluation in vehicular ad-hoc networks. In International Conference on Network and System Security (pp. 94–108). Springer, Berlin, Heidelberg. (2013)
62.
Zurück zum Zitat Wan, J.; Gu, X.; Wang, J.; Chen, L.: A trust scheme based on vehicles reports of events in VANETs. Wireless Pers. Commun. 105(1), 121–143 (2019)CrossRef Wan, J.; Gu, X.; Wang, J.; Chen, L.: A trust scheme based on vehicles reports of events in VANETs. Wireless Pers. Commun. 105(1), 121–143 (2019)CrossRef
Metadaten
Titel
TREE: Trust-Based Authenticated and Secure Dissemination of Emergency Event Information for the Network of Connected Vehicles
verfasst von
Kuldeep Narayan Tripathi
Ashish Mohan Yadav
S. C. Sharma
Publikationsdatum
21.03.2022
Verlag
Springer Berlin Heidelberg
Erschienen in
Arabian Journal for Science and Engineering / Ausgabe 8/2022
Print ISSN: 2193-567X
Elektronische ISSN: 2191-4281
DOI
https://doi.org/10.1007/s13369-022-06753-1

Weitere Artikel der Ausgabe 8/2022

Arabian Journal for Science and Engineering 8/2022 Zur Ausgabe

Research Article-Computer Engineering and Computer Science

Enhanced Border and Hole Detection for Energy Utilization in Wireless Sensor Networks

Research Article-Computer Engineering and Computer Science

Watermarking Techniques for the Security of Medical Images and Image Sequences

Research Article-Computer Engineering and Computer Science

Multiple Ant Colony Algorithm Combining Community Relationship Network

Research Article-Computer Engineering and Computer Science

SR-Mine: Adaptive Transaction Compression Method for Frequent Itemsets Mining

    Marktübersichten

    Die im Laufe eines Jahres in der „adhäsion“ veröffentlichten Marktübersichten helfen Anwendern verschiedenster Branchen, sich einen gezielten Überblick über Lieferantenangebote zu verschaffen.