Trust Management Schemes for Secure Routing in VANETs - A Survey

被引:0
|
作者
Gillani, Maryam [1 ]
Ullah, Ata [2 ]
Niaz, Hafiz Adnan [1 ]
机构
[1] Natl Univ Sci & Technol, Coll EME, Dept Comp Engn, Rawalpindi 46000, Pakistan
[2] NUML, Dept Comp Sci, Islamabad 44000, Pakistan
来源
2018 12TH INTERNATIONAL CONFERENCE ON MATHEMATICS, ACTUARIAL SCIENCE, COMPUTER SCIENCE AND STATISTICS (MACS) | 2018年
关键词
Trust Management; VANETs; Routing; Security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the dynamic growth of smart devices and connectivity with vehicles, researchers are getting growing interest due to variety of enormous application scenarios. Vehicular ad hoc networks (VANETs) comprises of huge number of vehicles and roadside units that communicate with each other in several realtime scenarios and internet application services. Security in VANET is more crucial, because of different network layers and trusting on unknown intermediate vehicles. There is critical demand of efficient trust management for VANETs, because it prevents fabricated information directed by suspicious nodes connected to the network. A number of factors including lack of infrastructure, autonomous modules, auto-pilot support and dynamic topology due to mobility can result in hardening the reliable trust management solutions. In this paper, we present a comprehensive overview of trust management schemes for routing protocols. This survey specifically elaborates Trust management approaches applicable for secure release of information for real time application services. Moreover, these schemes are analyzed and presented in a tabular form to highlight the concept, methodology, algorithm, QoS and performance capabilities. It can help the researcher in this field to quickly identify the weak and strong features of schemes. We have also provided categorical discussion for comparative overview. As a finals task, we have identified open research challenges.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] A survey on authentication schemes in VANETs for secured communication
    Manvi, Sunilkumar S.
    Tangade, Shrikan
    VEHICULAR COMMUNICATIONS, 2017, 9 : 19 - 30
  • [22] A survey of trust management in the Internet of Vehicles
    Hbaieb, Amal
    Ayed, Samiha
    Chaari, Lamia
    COMPUTER NETWORKS, 2022, 203
  • [23] Secure and Efficient Protocol for Position-based Routing in VANETs
    Hou, Jie
    Han, Lei
    Liu, Jiqiang
    Zhao, Jia
    2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 142 - 148
  • [24] Survey of secure multipath routing protocols for WSNs
    Zin, Shazana Md
    Anuar, Nor Badrul
    Kiah, Miss Laiha Mat
    Ahmedy, Ismail
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 55 : 123 - 153
  • [25] Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future Directions
    Almarshoud, Mishri
    Kiraz, Mehmet Sabir
    Al-Bayatti, Ali H.
    ACM COMPUTING SURVEYS, 2024, 56 (10)
  • [26] A Path-Backtracking-based Trust Management Scheme for VANETs
    Cheong, Chaklam
    Song, Yujie
    Zhang, Yu'ang
    Cao, Yue
    Leow, Chee Yen
    Wang, Xinyuan
    2024 IEEE 99TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2024-SPRING, 2024,
  • [27] Multidimensional Trust Evidence Fusion and Path-Backtracking Mechanism for Trust Management in VANETs
    Cheong, Chaklam
    Song, Yujie
    Cao, Yue
    Zhang, Yuang
    Cai, Bo
    Ni, Qiang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (10): : 18619 - 18634
  • [28] Centralized Trust-Based Secure Routing in Wireless Networks
    Yun, Jusik
    Seo, Sunho
    Chung, Jong-Moon
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (06) : 1066 - 1069
  • [29] Routing Schemes in FANETs: A Survey
    Khan, Muhammad Fahad
    Yau, Kok-Lim Alvin
    Noor, Rafidah Md
    Imran, Muhammad Ali
    SENSORS, 2020, 20 (01)
  • [30] Key Management Schemes for Secure Group Communication in Wireless Networks - A Survey
    Renugadevi, N.
    Swaminathan, G.
    Kumar, Aditya S.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 446 - 450