Trust in VANET: A Survey of Current Solutions and Future Research Opportunities

被引:144
作者
Hussain, Rasheed [1 ]
Lee, Jooyoung [2 ]
Zeadally, Sherali [3 ]
机构
[1] Innopolis Univ, Inst Informat Secur & Cyber Phys Syst, Networks & Blockchain Lab, Innopolis 420500, Russia
[2] Australian Natl Univ, Coll Engn & Comp Sci, Canberra, ACT 0200, Australia
[3] Univ Kentucky, Coll Commun & Informat, Lexington, KY 40506 USA
关键词
Vehicular ad hoc networks; Privacy; Automobiles; reputation; security; trust; vehicular networks; AD-HOC NETWORKS; DATA DISSEMINATION; SECURITY ATTACKS; MANAGEMENT; MODEL; INFORMATION; SYSTEM; FRAMEWORK; ARCHITECTURE; 5G;
D O I
10.1109/TITS.2020.2973715
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
Security and privacy will play a pivotal role in the commercialization of Vehicular Ad-hoc NETworks (VANETs). Traditionally, both cryptographic and non-cryptographic approaches have been used by researchers to address security and privacy issues and achieve secure Intelligent Transportation System (ITS) applications. However, some security goals such as trust and reputation, are still hard to achieve through conventional cryptographic approaches. Trust is the degree of certainty with which the received information is accepted and acted upon. Historically trust has been computed for both the content generator and the content itself with former known as entity trust and the latter known as data trust. Both entity and content trust are equally important to support trustworthy communication in VANET. We review, analyze, and compare some of the recently proposed trust establishment and management mechanisms (from 2014 to 2019) in vehicular networks. Furthermore, we also discuss the weaknesses and inadequacies of existing trust establishment and management approaches when deployed in a VANET environment. Finally, we discuss some future challenges that will need to be addressed for trustworthy communications in vehicular networks.
引用
收藏
页码:2553 / 2571
页数:19
相关论文
共 148 条
[1]   A Survey of Security Attacks in Information-Centric Networking [J].
AbdAllah, Eslam G. ;
Hassanein, Hossam S. ;
Zulkernine, Mohammad .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03) :1441-1454
[2]   A survey on trust based detection and isolation of malicious nodes in ad-hoc and sensor networks [J].
Ahmed, Adnan ;
Abu Bakar, Kamalrulnizam ;
Channa, Muhammad Ibrahim ;
Haseeb, Khalid ;
Khan, Abdul Waheed .
FRONTIERS OF COMPUTER SCIENCE, 2015, 9 (02) :280-296
[3]  
Ahmed S., 2016, P IEEE WIR COMM NETW, P1
[4]   Novel Trust Framework for Vehicular Networks [J].
Ahmed, Saneeha ;
Al-Rubeaai, Sarab ;
Tepe, Kemal .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (10) :9498-9511
[5]   VANSec: Attack-Resistant VANET Security Algorithm in Terms of Trust Computation Error and Normalized Routing Overhead [J].
Ahmed, Sheeraz ;
Rehman, Mujeeb Ur ;
Ishtiaq, Atif ;
Khan, Sarmadullah ;
Ali, Armughan ;
Begum, Shabana .
JOURNAL OF SENSORS, 2018, 2018
[6]  
Alishev D, 2017, IEEE VTS VEH TECHNOL
[7]   A Trust-Based Predictive Model for Mobile Ad Hoc Network in Internet of Things [J].
Alnumay, Waleed ;
Ghosh, Uttam ;
Chatterjee, Pushpita .
SENSORS, 2019, 19 (06)
[8]  
[Anonymous], 2018, IEEE T INTELL TRANSP
[9]  
[Anonymous], 2005, Proc. IEEE Global Telecommunications Conference, DOI DOI 10.1109/GL0C0M.2005.1577971
[10]  
[Anonymous], 2019, ARXIV190301541