A security authentication method based on trust evaluation in VANETs

被引:0
|
作者
Ao Zhou
Jinglin Li
Qibo Sun
Cunqun Fan
Tao Lei
Fangchun Yang
机构
[1] Beijing University of Posts and Telecommunications,State Key Laboratory of Networking and Switching Technology
[2] China Meteorological Administration,National Satellite Meteorological Centre
关键词
VANETs; Direct trust; Indirect trust; Correlation coefficient; Security;
D O I
暂无
中图分类号
学科分类号
摘要
Vehicular ad hoc networks (VANETs) have a high degree of openness. Therefore, if a new vehicle node wants to access the network, we need to validate the vehicle node carefully to ensure the security of the entire networking. There are a large number of vehicle nodes, and the strange degree among the nodes is very high in VANETs. In addition, VANETs are human-oriented networks. All vehicle nodes in the VANET have the right to decide whether to accept a new node. To attack this challenge, this paper proposes a security authentication method based on trust evaluation. The security authentication method consists of two parts: secure authentication based on direct trust evaluation and secure authentication based on indirect trust evaluation. In the direct trust evaluation, the security vector model is established based on the security behaviors of the new vehicle node. The historical security evaluation from the authority units (AU) is collected to calculate the final direct trust. In the indirect trust evaluation, the trust degree is calculated based on the recommendation trust vectors from the vehicle nodes in the network. The method employs correlation coefficient for distinguishing the malicious vehicle. Then, the recommendations from the malicious vehicle nodes are removed. The final recommended trust is gained by calculating the average recommendation trusts of remained vehicle nodes. Simulation results show the advantage of our proposed method.
引用
收藏
相关论文
共 50 条
  • [1] A security authentication method based on trust evaluation in VANETs
    Zhou, Ao
    Li, Jinglin
    Sun, Qibo
    Fan, Cunqun
    Lei, Tao
    Yang, Fangchun
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2015, : 1 - 8
  • [2] Trust-Based Distributed Authentication Method for Collision Attack Avoidance in VANETs
    Tolba, Amr
    IEEE ACCESS, 2018, 6 : 62747 - 62755
  • [3] Anonymous Authentication Scheme Based on Trust and Blockchain in VANETs
    Zhang, Li
    Xu, Jianbo
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2021, PT II, 2022, 13156 : 473 - 488
  • [4] A trust based adaptive privacy preserving authentication scheme for VANETs
    Zhang, Song
    Liu, Yanbing
    Xiao, Yunpeng
    He, Rui
    VEHICULAR COMMUNICATIONS, 2022, 37
  • [5] An indirect security trust method based on credibility evaluation
    Xianghe, Wei
    Hong, Zhang
    Zhen, Liu
    Qianmu, Li
    Bin, Xia
    Journal of Digital Information Management, 2014, 12 (02): : 139 - 150
  • [6] On the Security of a Threshold Anonymous Authentication Protocol for VANETs
    Zhang, Jianhong
    Sun, Zhibin
    Liu, Shuai
    Liu, Pengyan
    SECURITY, PRIVACY, AND ANONYMITY IN COMPUTATION, COMMUNICATION, AND STORAGE, 2016, 10066 : 145 - 155
  • [7] Privacy-preserving blockchain-based authentication and trust management in VANETs
    Ahmed, Waheeb
    Di, Wu
    Mukathe, Daniel
    IET NETWORKS, 2022, 11 (3-4) : 89 - 111
  • [8] Multi-attribute Authentication Method Based on Continuous Trust Evaluation
    Guo, Jing
    Li, Bingsen
    Du, Ping
    Xin, Ziyi
    Zhang, Jianjun
    Chen, Jiawei
    SMART COMPUTING AND COMMUNICATION, 2022, 13202 : 90 - 100
  • [9] ECG-Based User Authentication and Identification Method on VANETs
    Santos, Alex
    Medeiros, Iago
    Resque, Paulo
    Rosario, Denis
    Nogueira, Michele
    Santos, Aldri
    Cerqueira, Eduardo
    Chowdhury, Kaushik Roy
    PROCEEDINGS OF THE 10TH LATIN AMERICAN NETWORKING CONFERENCE (LANC 2018), 2018, : 119 - 122
  • [10] An authentication service based on trust and clustering in wireless ad hoc networks: Description and security evaluation
    Ngai, Edith C. H.
    Lyu, Michael R.
    IEEE INTERNATIONAL CONFERENCE ON SENSOR NETWORKS, UBIQUITOUS, AND TRUSTWORTHY COMPUTING, VOL 1, PROCEEDINGS, 2006, : 94 - +