Skip to main content
Log in

A social network approach to trust management in VANETs

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

References

  1. Raya M (2009) Data-centric trust in ephemeral networks. PhD thesis. EPFL, Lausanne

  2. Wasef A, Shen X (2009) Maac: message authentication acceleration protocol for vehicular ad hoc networks. In: IEEE GLOBECOM, pp 1–6

  3. Zhu H, Lin X, Lu R, Ho P-H, Shen X (2008) Aema: an aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In: IEEE ICC, pp 1436–1440

  4. Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: Proc. IEEE INFOCOM’10, San Diego, California, USA, 14–19 March 2010

  5. Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. IEEE INFOCOM’11, Shanghai, China, 10–15 April 2011

  6. Lu R, Lin X, Liang X, Shen X (2010) Sacrificing the plum tree for the peach tree: a socialspot tactic for protecting receiver-location privacy in VANET. In: Proc. IEEE Globecom’10, Miami, Florida, USA, 6–10 Dec 2010

  7. Ruj S, Cavenaghi MA, Huang Z, Nayak A, Stojmenovic I (2011) On data centric misbehavior detection in VANETs. In: IEEE 74th Vehicular Technology Conference, VTC-Fall, San Francisco, USA

  8. Papadimitratos P, Buttyan L, Holczer T, Schoch E, Freudiger J, Raya M, Ma Z, Kargl F, Kung A, Hubaux JP (2008) Secure vehicular communication systems: design and architecture. IEEE Wirel Commun Mag 46(11):100–109

    Article  Google Scholar 

  9. Papadimitratos P, Buttyan L, Hubaux J-P, Kargl F, Kung A, Raya M (2007) Architecture for secure and private vehicular communications. In: IEEE ITST, pp 1–6

  10. Buttyán L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: ESAS. Lecture notes in computer science, vol 4572, pp 129–141

  11. Freudiger J, Manshaei MH, Le Boudec J-Y, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. In: IEEE INFOCOM, pp 1577–1585

  12. Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A (2007) Efficient and robust pseudonymous authentication in vanet. In: Holfelder W, Santi P, Hu Y-C, Hubaux J-P (eds) Vehicular ad hoc networks, pp 19–28

  13. Zhang J (2011) A survey on trust management for vanets. In: 25th IEEE international conference on advanced information networking and applications, pp 105–112

  14. Easley D, Kleinberg J (2010). Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press

  15. Acemoglu D, Dahleh MA, Lobel I, Ozdaglar A (2010) Bayesian learning in social networks. Available at http://web.mit.edu/newsoffice/2010/crowd-wisdom-1115.html

  16. Huang Z, Ruj S, Cavenaghi MA, Nayak A (2011) Limitations of trust management schemes in VANET and countermeasures. In: IEEE PIMRC

  17. Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. In: Baye MR (ed) The economics of the internet and E-commerce. Advances in applied microeconomics. Elsevier Science, pp 127–157

  18. Dotzer F, Fischer L, Magiera P (2005) Vars: a vehicle ad-hoc network reputation system. In: IEEE international symposium on a world of wireless mobile and multimedia networks, pp 454–456

  19. Lo N-W, Tsai H-C (2009) A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP - Journal on Wireless Communications and Networking. doi:10.1155/2009/125348

    Google Scholar 

  20. Minhas UF, Zhang J, Tran T, Cohen R (2010) Towards expanded trust management for agents in vehicular ad-hoc networks. IJCITP 5(1):3–15

    Google Scholar 

  21. Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology, pp 243–247

  22. Raya M, Shokri R, Hubaux J-P (2010) On the tradeoff between trust and privacy in wireless ad hoc networks. In: ACM WISEC, pp 75–80

  23. Schmidt RK, Leinmuller T, Schoch E, Held A, Schafer G (2008) Vehicle behavior analysis to enhance security in vanets. In: Workshop on vehicle to vehicle communications

  24. Zhang J, Chen C, Cohen R (2010) A scalable and effective trust-based framework for vehicular ad-hoc networks. JoWUA 1(4):3–15

    Google Scholar 

  25. Adams WJ, Davis NJ (2005) Toward a decentralized trust-based access control system for dynamic collaboration. In: IEEE workshop on information assurance, pp 317–324

  26. Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In: Proceedings of the security protocols workshop, pp 47–66

  27. Sun YL, Han Z, Ray Liu KJ (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Areas Commun 24(2):305–317

    Article  MATH  Google Scholar 

  28. Lu R, Li X, Liang X, Lin X, Shen X (2011) GRS: The green, reliability, and security of emergingmachine to machine communications. IEEE Commun Mag (Feature topic on recent progress in machine to machine communications) 49(4):28–35

    Google Scholar 

  29. Li X, Li Z, Stojmenovic M, Narasimhan V, Nayak A (2012) Autoregressive trust management in wireless Ad Hoc networks. In: Ad Hoc sensor wireless networks, (to appear)

  30. Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: MOBICOM, pp 255–265

  31. Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Mobile ad hoc networks. communication and multimedia security

  32. Fahnrich S, Obreiter P (2004) The buddy system—a distributed reputation system based on social structure. Technical report, Universitat Karlsruhe, Faculty of Informatics

  33. Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: IEEE international conference on parallel and distributed systems, pp 665–672

  34. Zhang J, Cohen R (2006) Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings. In: 8th international conference on electronic commerce: the new e-commerce—innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, pp 225–234

  35. Gerlach M (2007) Trust for vehicular applications. In: International symposium on autonomous decentralized systems, pp 295–304

  36. Minhas U, Zhang J, Tran T, Cohen R (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty, pp 243–247

Download references

Acknowledgements

This work is partially supported by NSERC Grant CRDPJ386874-09 and “Digital signal processing, and the synthesis of an information security system”, TR32054, Serbian Ministry of Science and Education.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhen Huang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, Z., Ruj, S., Cavenaghi, M.A. et al. A social network approach to trust management in VANETs. Peer-to-Peer Netw. Appl. 7, 229–242 (2014). https://doi.org/10.1007/s12083-012-0136-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-012-0136-8

Keywords

Navigation