Abstract
In the past few years, vehicular ad hoc networks(VANETs) was studied extensively by researchers. VANETs is a type of P2P network, though it has some distinct characters (fast moving, short lived connection etc.). In this paper, we present several limitations of current trust management schemes in VANETs and propose ways to counter them. We first review several trust management techniques in VANETs and argue that the ephemeral nature of VANETs render them useless in practical situations. We identify that the problem of information cascading and oversampling, which commonly arise in social networks, also adversely affects trust management schemes in VANETs. To the best of our knowledge, we are the first to introduce information cascading and oversampling to VANETs. We show that simple voting for decision making leads to oversampling and gives incorrect results in VANETs. To overcome this problem, we propose a novel voting scheme. In our scheme, each vehicle has different voting weight according to its distance from the event. The vehicle which is more closer to the event possesses higher weight. Simulations show that our proposed algorithm performs better than simple voting, increasing the correctness of voting.
References
Raya M (2009) Data-centric trust in ephemeral networks. PhD thesis. EPFL, Lausanne
Wasef A, Shen X (2009) Maac: message authentication acceleration protocol for vehicular ad hoc networks. In: IEEE GLOBECOM, pp 1–6
Zhu H, Lin X, Lu R, Ho P-H, Shen X (2008) Aema: an aggregated emergency message authentication scheme for enhancing the security of vehicular ad hoc networks. In: IEEE ICC, pp 1436–1440
Lu R, Lin X, Shen X (2010) SPRING: a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. In: Proc. IEEE INFOCOM’10, San Diego, California, USA, 14–19 March 2010
Lin X, Lu R, Liang X, Shen X (2011) STAP: a social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs. In: Proc. IEEE INFOCOM’11, Shanghai, China, 10–15 April 2011
Lu R, Lin X, Liang X, Shen X (2010) Sacrificing the plum tree for the peach tree: a socialspot tactic for protecting receiver-location privacy in VANET. In: Proc. IEEE Globecom’10, Miami, Florida, USA, 6–10 Dec 2010
Ruj S, Cavenaghi MA, Huang Z, Nayak A, Stojmenovic I (2011) On data centric misbehavior detection in VANETs. In: IEEE 74th Vehicular Technology Conference, VTC-Fall, San Francisco, USA
Papadimitratos P, Buttyan L, Holczer T, Schoch E, Freudiger J, Raya M, Ma Z, Kargl F, Kung A, Hubaux JP (2008) Secure vehicular communication systems: design and architecture. IEEE Wirel Commun Mag 46(11):100–109
Papadimitratos P, Buttyan L, Hubaux J-P, Kargl F, Kung A, Raya M (2007) Architecture for secure and private vehicular communications. In: IEEE ITST, pp 1–6
Buttyán L, Holczer T, Vajda I (2007) On the effectiveness of changing pseudonyms to provide location privacy in vanets. In: ESAS. Lecture notes in computer science, vol 4572, pp 129–141
Freudiger J, Manshaei MH, Le Boudec J-Y, Hubaux J-P (2010) On the age of pseudonyms in mobile ad hoc networks. In: IEEE INFOCOM, pp 1577–1585
Calandriello G, Papadimitratos P, Hubaux J-P, Lioy A (2007) Efficient and robust pseudonymous authentication in vanet. In: Holfelder W, Santi P, Hu Y-C, Hubaux J-P (eds) Vehicular ad hoc networks, pp 19–28
Zhang J (2011) A survey on trust management for vanets. In: 25th IEEE international conference on advanced information networking and applications, pp 105–112
Easley D, Kleinberg J (2010). Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press
Acemoglu D, Dahleh MA, Lobel I, Ozdaglar A (2010) Bayesian learning in social networks. Available at http://web.mit.edu/newsoffice/2010/crowd-wisdom-1115.html
Huang Z, Ruj S, Cavenaghi MA, Nayak A (2011) Limitations of trust management schemes in VANET and countermeasures. In: IEEE PIMRC
Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. In: Baye MR (ed) The economics of the internet and E-commerce. Advances in applied microeconomics. Elsevier Science, pp 127–157
Dotzer F, Fischer L, Magiera P (2005) Vars: a vehicle ad-hoc network reputation system. In: IEEE international symposium on a world of wireless mobile and multimedia networks, pp 454–456
Lo N-W, Tsai H-C (2009) A reputation system for traffic safety event on vehicular ad hoc networks. EURASIP - Journal on Wireless Communications and Networking. doi:10.1155/2009/125348
Minhas UF, Zhang J, Tran T, Cohen R (2010) Towards expanded trust management for agents in vehicular ad-hoc networks. IJCITP 5(1):3–15
Minhas UF, Zhang J, Tran T, Cohen R, Cheriton DR (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: IEEE/WIC/ACM international conference on web intelligence and intelligent agent technology, pp 243–247
Raya M, Shokri R, Hubaux J-P (2010) On the tradeoff between trust and privacy in wireless ad hoc networks. In: ACM WISEC, pp 75–80
Schmidt RK, Leinmuller T, Schoch E, Held A, Schafer G (2008) Vehicle behavior analysis to enhance security in vanets. In: Workshop on vehicle to vehicle communications
Zhang J, Chen C, Cohen R (2010) A scalable and effective trust-based framework for vehicular ad-hoc networks. JoWUA 1(4):3–15
Adams WJ, Davis NJ (2005) Toward a decentralized trust-based access control system for dynamic collaboration. In: IEEE workshop on information assurance, pp 317–324
Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In: Proceedings of the security protocols workshop, pp 47–66
Sun YL, Han Z, Ray Liu KJ (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Areas Commun 24(2):305–317
Lu R, Li X, Liang X, Lin X, Shen X (2011) GRS: The green, reliability, and security of emergingmachine to machine communications. IEEE Commun Mag (Feature topic on recent progress in machine to machine communications) 49(4):28–35
Li X, Li Z, Stojmenovic M, Narasimhan V, Nayak A (2012) Autoregressive trust management in wireless Ad Hoc networks. In: Ad Hoc sensor wireless networks, (to appear)
Marti S, Giuli TJ, Lai K, Baker M (2000) Mitigating routing misbehavior in mobile ad hoc networks. In: MOBICOM, pp 255–265
Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In: Mobile ad hoc networks. communication and multimedia security
Fahnrich S, Obreiter P (2004) The buddy system—a distributed reputation system based on social structure. Technical report, Universitat Karlsruhe, Faculty of Informatics
Dewan P, Dasgupta P, Bhattacharya A (2004) On using reputations in ad hoc networks to counter malicious nodes. In: IEEE international conference on parallel and distributed systems, pp 665–672
Zhang J, Cohen R (2006) Trusting advice from other buyers in e-marketplaces: the problem of unfair ratings. In: 8th international conference on electronic commerce: the new e-commerce—innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internet, pp 225–234
Gerlach M (2007) Trust for vehicular applications. In: International symposium on autonomous decentralized systems, pp 295–304
Minhas U, Zhang J, Tran T, Cohen R (2010) Intelligent agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty, pp 243–247
Acknowledgements
This work is partially supported by NSERC Grant CRDPJ386874-09 and “Digital signal processing, and the synthesis of an information security system”, TR32054, Serbian Ministry of Science and Education.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, Z., Ruj, S., Cavenaghi, M.A. et al. A social network approach to trust management in VANETs. Peer-to-Peer Netw. Appl. 7, 229–242 (2014). https://doi.org/10.1007/s12083-012-0136-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-012-0136-8