Abstract
In Vehicular Ad-Hoc Networks (VANETs), applications are typically realized by forwarding and exchanging messages among vehicles. The integrity and trustworthiness of messages directly impacts the quality of the applications. Though there have been extensive works on authentication protocols in VANETs, authentication can only certify message origin but cannot guarantee that the identity holders will send truthful and accurate messages. Therefore, in this paper, we propose a novel trust model to directly evaluate the trustworthiness of the content of a message received from other vehicles. The model is built based on various factors such as content similarity, content conflict and route similarity. Trustworthiness of message content will be evaluated at the individual vehicle level and will not introduce any additional architectural assumptions. We have conducted extensive experiments and the results indicate both efficiency and effectiveness of the proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Buchegger, S., Boudec, J.-Y.L.: A robust reputation system for peer-to-peer and mobile ad-hoc networks. In: Workshop on the Economics of Peer-to-Peer Systems (2004)
Castillo, C., Mendoza, M., Poblete, B.: Information credibility on twitter. In: ACM World Wide Web Conference, pp. 675–684 (2011)
Chen, C., Zhang, J., Cohen, R., Ho, P.: A trust-based message propagation and evaluation framework in vanets. In: Proceedings of the Int. Conf. on Information Technology Convergence and Services (2010)
Dai, C., Lin, D., Bertino, E., Kantarcioglu, M.: An approach to evaluate data trustworthiness based on data provenance. In: Jonker, W., Petković, M. (eds.) SDM 2008. LNCS, vol. 5159, pp. 82–98. Springer, Heidelberg (2008)
Dotzer, F., Fischer, L., Magiera, P.: Vars: A vehicle ad-hoc network reputation system. In: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, WoWMoM 2005, pp. 454–456. IEEE (2005)
Eschenauer, L., Gligor, V.D., Baras, J.: On Trust Establishment in Mobile Ad-Hoc Networks. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2002. LNCS, vol. 2845, pp. 47–66. Springer, Heidelberg (2004)
Ganeriwal, S., Srivastava, M.: Reputation-based framework for high integrity sensor networks. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 66–77 (2004)
Gerla, M., Gruteser, M.: Vehicular networks: Applications, protocols, and testbeds. In: Emerging Wireless Technologies and the Future Mobile Internet, pp. 201–241 (2011)
Gerlach, M.: Trust for vehicular applications. In: Proceedings of the Eighth International Symposium on Autonomous Decentralized Systems, pp. 295–304. IEEE Computer Society, Washington, DC (2007)
Mathur, S., Jin, T., Kasturirangan, N., Chandrasekaran, J., Xue, W., Gruteser, M., Trappe, W.: Parknet: drive-by sensing of road-side parking statistics. In: Proceedings of the 8th International Conference on Mobile Systems, Applications, and Services (MobiSys 2010), pp. 123–136 (2010)
Minhas, U., Zhang, J., Tran, T., Cohen, R.: Towards expanded trust management for agents in vehicular ad-hoc networks. International Journal of Computational Intelligence Theory and Practice (IJCITP) 5(1) (2010)
Mundinger, J., Boudec, J.-Y.L.: Reputation in self-organized communication systems and beyond. In: Workshop on Interdisciplinary Systems Approach in Performance Evaluation and Design of Computer & Communications Systems, p. 3 (2006)
Nakajima, Y., Watanabe, K., Hayashibara, N., Enokido, T., Takizawa, M., Deen, S.M.: Trustworthiness in peer-to-peer overlay networks. In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, p. 8 (2006)
Patwardhan, A., Joshi, A., Finin, T., Yesha, Y.: A data intensive reputation management scheme for vehicular ad hoc networks. In: 2006 Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, pp. 1–8. IEEE (2006)
Raya, M., Papadimitratos, P., Aad, I., Jungels, D., Hubaux, J.-P.: Eviction of misbehaving and faulty nodes in vehicular networks. IEEE Journal on Selected Areas in Communications 25(8), 1557–1568 (2007)
Raya, M., Papadimitratos, P., Gligor, V.D., Hubaux, J.-P.: On datacentric trust establishment in ephemeral ad hoc networks. In: IEEE International Conference on Computer Communications, INFOCOM (2008)
Richter, J., Kuntze, N., Rudolph, C.: Security digital evidence. In: IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, pp. 119–130 (2010)
Tonguz, O.K., Boban, M.: Multiplayer games over vehicular ad hoc networks: A new application. Ad Hoc Networks 8(5), 531–543 (2010)
Wagner, R.A., Fischer, M.J.: The string-to-string correction problem. J. ACM 21(1), 168–173 (1974)
WordNet, http://wordnet.princeton.edu/
Yin, X., Han, J., Yu, P.S.: Truth Discovery with Multiple Conflicting Information Providers on the Web. In: Proc. of ACM SIGKDD, pp. 1048–1052 (2007)
Zhang, J.: A survey on trust management for vanets. In: 2011 IEEE International Conference on Advanced Information Networking and Applications (AINA), pp. 105–112 (March 2011)
Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: Robust Cooperative Trust Establishment for MANETs. In: ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23–34 (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gurung, S., Lin, D., Squicciarini, A., Bertino, E. (2013). Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. In: Lopez, J., Huang, X., Sandhu, R. (eds) Network and System Security. NSS 2013. Lecture Notes in Computer Science, vol 7873. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-38631-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-38631-2_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-38630-5
Online ISBN: 978-3-642-38631-2
eBook Packages: Computer ScienceComputer Science (R0)