GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model

被引:12
作者
Paranjothi, Anirudh [1 ]
Khan, Mohammad S. [2 ]
Zeadally, Sherali [3 ]
Pawar, Ajinkya [4 ]
Hicks, David [4 ]
机构
[1] Univ Oklahoma, Sch Comp Sci, Norman, OK 73019 USA
[2] East Tennessee State Univ, Dept Comp, Johnson City, TN 37614 USA
[3] Univ Kentucky, Coll Commun & Informat, Lexington, KY USA
[4] Texas A&M Univ, Dept Elect Engn & Comp Sci, Kingsville, TX USA
关键词
Social networks; Authentication; Multi-hop message dissemination; Trustworthiness; VANET; CLOUD; ARCHITECTURES; CHALLENGES; MANAGEMENT;
D O I
10.1016/j.iot.2019.100071
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of connected vehicles paradigm has made secure communication a key concern amongst the connected vehicles. Communication between the vehicles and Road Side Units (RSUs) is critical to disseminate message among the vehicles. We focus on secure message transmission in connected vehicles using multi-hop social networks environment to deliver the message with varying trustworthiness. We proposed a Geographic Social Trust Routing (GSTR) approach; messages are propagated using multiple hops and by considering the various available users in the vehicular network. GSTR is proposed in an application perspective with an assumption that the users are socially connected. The users are selected based on trustworthiness as defined by social connectivity. The route to send a message is calculated based on the highest trust level of each node by using the node's social network connections along the path in the network. GSTR determines the shortest route using the trusted nodes along the route for message dissemination. GSTR is made delay tolerant by introducing message storage in the cloud if a trustworthy node is unavailable to deliver the message. We compared the proposed approach with Geographic and Traffic Load based Routing (GTLR), Greedy Perimeter Stateless Routing (GPSR), Trust-based GPSR (T-GPSR). The performance results obtained show that GSTR ensures efficient resource utilization, lower packet losses at high vehicle densities. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:20
相关论文
共 28 条
  • [1] A comprehensive survey on vehicular Ad Hoc network
    Al-Sultan, Saif
    Al-Doori, Moath M.
    Al-Bayatti, Ali H.
    Zedan, Hussien
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 37 : 380 - 392
  • [2] Multi-Hop Reliability for Broadcast-based VANET in City Environments
    Benrhaiem, Wiem
    Hafid, Abdelhakim Senhaji
    Sahu, Pratap Kumar
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [3] VANET-CLOUD: A GENERIC CLOUD COMPUTING MODEL FOR VEHICULAR AD HOC NETWORKS
    Bitam, Salim
    Mellouk, Abdelhamid
    Zeadally, Sherali
    [J]. IEEE WIRELESS COMMUNICATIONS, 2015, 22 (01) : 96 - 102
  • [4] Exploring Trusted Data Dissemination in a Vehicular Social Network with a Formal Compositional Approach
    Chen, Xiao
    Wang, Liangmin
    [J]. PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSAC), VOL 2, 2016, : 616 - 617
  • [5] Cui J., 2017, P 13 INT C ED UK 11, P508
  • [6] VANET security surveys
    Engoulou, Richard Gilles
    Bellaiche, Martine
    Pierre, Samuel
    Quintero, Alejandro
    [J]. COMPUTER COMMUNICATIONS, 2014, 44 : 1 - 13
  • [7] Security Risk Analysis of a Trust Model for Secure Group Leader-Based Communication in VANET
    Hasrouny, Hamssa
    Bassil, Carole
    Samhat, Abed Ellatif
    Laouiti, Anis
    [J]. VEHICULAR AD-HOC NETWORKS FOR SMART CITIES, 2017, 548 : 71 - 83
  • [8] A social network approach to trust management in VANETs
    Huang, Zhen
    Ruj, Sushmita
    Cavenaghi, Marcos A.
    Stojmenovic, Milos
    Nayak, Amiya
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2014, 7 (03) : 229 - 242
  • [9] Security attacks and solutions for vehicular ad hoc networks
    Isaac, J. T.
    Zeadally, S.
    Camara, J. S.
    [J]. IET COMMUNICATIONS, 2010, 4 (07) : 894 - 903
  • [10] Karp B., 2000, MobiCom 2000. Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, P243, DOI 10.1145/345910.345953