Appeal-Based Distributed Trust Management Model in VANETs Concerning Untrustworthy RSUs

被引:5
作者
Wang, Yu [1 ]
Zhang, Yu'ang [1 ]
Song, Yujie [1 ]
Cao, Yue [1 ]
Zhang, Lei [2 ]
Ren, Xuefeng [3 ]
机构
[1] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan, Peoples R China
[2] Univ Glasgow, Sch Engn, Glasgow, Lanark, Scotland
[3] Huali iSmartWays Technol Inc, Wuhan, Peoples R China
来源
2023 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC | 2023年
关键词
Vehicular ad-hoc networks; Internet of vehicles; Trust management; Dynamic trust threshold; Appeal mechanism;
D O I
10.1109/WCNC55385.2023.10118674
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Vehicular Ad-hoc Networks (VANETs) play an essential role in traffic safety and travel efficiency. However, due to the variable network topology of VANETs, malicious vehicles can easily invade the network to disrupt the network integrity. Moreover, compromised Roadside Units (RSUs) may pose a tremendous threat to network. Thus, we propose a distributed trust model to resist malicious vehicles and compromised RSUs by a mutual supervision mechanism between vehicles and RSUs. Three stages of this model ensure the trustworthiness of participants, including trust evaluation, adjudication, and vehicle appeal mechanism. In the trust evaluation stage, message receivers calculate three types of trust values (i.e., direct, indirect, and combined trust values) and upload them to RSUs. Then, RSUs dynamically update the trust threshold by aggregating vehicular trust values. In the adjudication stage, RSUs punish/reward vehicles by comparing the trust threshold to aggregated trust values. In the vehicle appeal stage, vehicles appeal to other RSUs if they have received the undesired punishment by an RSU. Then, multiple RSUs jointly judge whether a vehicle is successfully appealed, and the misjudging RSU will be punished. Extensive simulations show that the proposed model effectively identifies malicious vehicles with the presence of compromised RSUs.
引用
收藏
页数:6
相关论文
共 14 条
[1]   MARINE: Man-in-the-Middle Attack Resistant Trust Model in Connected Vehicles [J].
Ahmad, Farhan ;
Kurugollu, Fatih ;
Adnane, Asma ;
Hussain, Rasheed ;
Hussain, Fatima .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (04) :3310-3322
[2]   Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing [J].
Chen, Ing-Ray ;
Bao, Fenye ;
Chang, MoonJeong ;
Cho, Jin-Hee .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (05) :1200-1210
[3]  
Dai CY, 2008, LECT NOTES COMPUT SC, V5159, P82
[4]   A K-NEAREST NEIGHBOR CLASSIFICATION RULE-BASED ON DEMPSTER-SHAFER THEORY [J].
DENOEUX, T .
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS, 1995, 25 (05) :804-813
[5]   A social network approach to trust management in VANETs [J].
Huang, Zhen ;
Ruj, Sushmita ;
Cavenaghi, Marcos A. ;
Stojmenovic, Milos ;
Nayak, Amiya .
PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (03) :229-242
[6]  
Keranen A., 2009, P 2 INT C SIM TOOLS, P1, DOI 10.4108/ICST.SIMUTOOLS2009.5674
[7]   ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks [J].
Li, Wenjia ;
Song, Houbing .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2016, 17 (04) :960-969
[8]   A Trust-Based Active Detection for Cyber-Physical Security in Industrial Environments [J].
Liu, Yuxin ;
Liu, Anfeng ;
Liu, Xiao ;
Ma, Ming .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (12) :6593-6603
[9]   A Security and Privacy Review of VANETs [J].
Qu, Fengzhong ;
Wu, Zhihui ;
Wang, Fei-Yue ;
Cho, Woong .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (06) :2985-2996
[10]  
Rawat DB, 2015, AD HOC SENS WIREL NE, V24, P283