skip to main content
research-article

Toward a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles

Published:13 July 2023Publication History
Skip Abstract Section

Abstract

Recent considerable state-of-the-art advancements within the automotive sector, coupled with an evolution of the promising paradigms of vehicle-to-everything communication and the Internet of Vehicles (IoV), have facilitated vehicles to generate and, accordingly, disseminate an enormous amount of safety-critical and non-safety infotainment data in a bid to guarantee a highly safe, convenient, and congestion-aware road transport. These dynamic networks require intelligent security measures to ensure that the malicious messages, along with the vehicles that disseminate them, are identified and subsequently eliminated in a timely manner so that they are not in a position to harm other vehicles. Failing to do so could jeopardize the entire network, leading to fatalities and injuries amongst road users. Several researchers, over the years, have envisaged conventional cryptographic-based solutions employing certificates and the public key infrastructure for enhancing the security of vehicular networks. Nevertheless, cryptographic-based solutions are not optimum for an IoV network primarily, since the cryptographic schemes could be susceptible to compromised trust authorities and insider attacks that are highly deceptive in nature and cannot be noticed immediately and are, therefore, capable of causing catastrophic damage. Accordingly, in this article, a distributed trust management system has been proposed that ascertains the trust of all the reputation segments within an IoV network. The envisaged system takes into consideration the salient characteristics of familiarity, i.e., assessed via a subjective logic approach, similarity, and timeliness to ascertain the weights of all the reputation segments. Furthermore, an intelligent trust threshold mechanism has been developed for the identification and eviction of the misbehaving vehicles. The experimental results suggest the advantages of our proposed IoV-based trust management system in terms of optimizing the misbehavior detection and its resilience to various sorts of attacks.

REFERENCES

  1. [1] Sun Aljawharah Alnasser and Hongjian. 2019. Global roaming trust-based model for V2X Communications. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’19). IEEE, 16.Google ScholarGoogle Scholar
  2. [2] Jiang Aljawharah Alnasser, Hongjian Sun, and Jing. 2020. Recommendation-based trust model for vehicle-to-everything (V2X). IEEE IoT J. 7, 1 (2020), 440450.Google ScholarGoogle Scholar
  3. [3] Wang Baofeng Ji, Xueru Zhang, Shahid Mumtaz, Congzheng Han, Chunguo Li, Hong Wen, and Dan. 2020. A survey on the internet of vehicles: Network architectures and applications. IEEE Commun. Stand. Mag. 4, 1 (2020), 3441.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Kleinschmidt Carolina V. L. Mendoza and João H.. 2016. Defense for selective attacks in the IoT with a distributed trust management scheme. In Proceedings of the IEEE International Symposium on Consumer Electronics (ISCE’16). IEEE, Sao Paulo, Brazil, 5354.Google ScholarGoogle Scholar
  5. [5] Vegni Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Rasheed Hussain, Syed Hassan Ahmed, Abderrahim Benslimane, Carlos T. Calafate, Juan-Carlos Cano, and Anna Maria. 2019. TACASHI: Trust-aware communication architecture for social internet of vehicles. IEEE IoT J. 6, 4 (2019), 58705877.Google ScholarGoogle Scholar
  6. [6] Chandrasekaran Partheeban and Esfandiari Babak. 2015. Toward a testbed for evaluating computational trust models: Experiments and analysis. J. Trust Manage. 2, 1 (2015), 8.Google ScholarGoogle ScholarCross RefCross Ref
  7. [7] Chen Ing-Ray and Guo Jia. 2014. Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection. In Proceedings of the IEEE 28th International Conference on Advanced Information Networking and Applications. IEEE, 4956.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Sarma Dajiang Suo and Sanjay E.. 2019. Real-time trust-building schemes for mitigating malicious behaviors in connected & automated vehicles. In Proceedings of the IEEE Intelligent Transportation Systems Conference (ITSC’19). IEEE, 11421149.Google ScholarGoogle Scholar
  9. [9] Sayed Hesham El, Zeadally Sherali, and Puthal Deepak. 2020. Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks. Vehic. Commun. 24 (2020), 100227.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Phillips Farhan Ahmad, Asma Adnane, Chaker A. Kerrache, Fatih Kurugollu, and Iain. 2019. On the design, development, and implementation of trust evaluation mechanism in vehicular networks. In Proceedings of the IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA’19). IEEE, 17.Google ScholarGoogle Scholar
  11. [11] Hussain Farhan Ahmad, Fatih Kurugollu, Asma Adnane, Rasheed Hussain, and Fatima. 2020. MARINE: Man-in-the-middle attack resistant trust model in connected vehicles. IEEE IoT J. 7, 4 (2020), 33103322.Google ScholarGoogle Scholar
  12. [12] Liu Farhan Ahmad, Fatih Kurugollu, Chaker Abdelaziz Kerrache, Sakir Sezer, Lu. 2021. NOTRINO: A NOvel hybrid TRust management scheme for INternet-Of-vehicles. IEEE Trans. Vehic. Technol. 70, 9 (2021), 92449257.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Adnane Farhan Ahmad, Virginia N. L. Franqueira, and Asma. 2018. TEAM: A trust evaluation and management framework in context-enabled vehicular ad-hoc networks. IEEE Access 6 (2018), 2864328660.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Frittella Sabine, Manoorkar Krishna, Palmigiano Alessandra, Tzimoulis Apostolos, and Wijnberg Nachoem. 2020. Toward a dempster-shafer theory of concepts. Int. J. Approx. Reas. 125 (2020), 1425.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Gai Fangyu, Zhang Jiexin, Zhu Peidong, and Jiang Xinwen. 2017. Trust on the Ratee: A trust management system for social internet of vehicles. Wireless Commun. Mobile Comput. 2017 (2017), 11 Pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Muhammad Ghani-Ur Rehman, Anwar Ghani, Muhammad Zubair, Syed Husnain A. Naqvi, Dhananjay Singh, and Shad. 2019. IPS: Incentive and punishment scheme for omitting selfishness in the internet of vehicles (IoV). IEEE Access 7 (2019), 109026109037.Google ScholarGoogle ScholarCross RefCross Ref
  17. [17] Hsu Hamideh Fatemidokht, Marjan Kuchaki Rafsanjani, Brij B. Gupta, and Ching-Hsien. 2021. Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Trans. Intell. Transport. Syst. 22, 7 (2021), 47574769.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Hasrouny Hamssa, Samhat Abed Ellatif, Bassil Carole, and Laouiti Anis. 2019. Trust model for secure group leader-based communications in VANET. Wireless Netw. 25, 8 (2019), 46394661.Google ScholarGoogle ScholarCross RefCross Ref
  19. [19] Hatzivasilis George, Soultatos Othonas, Ioannidis Sotiris, Spanoudakis George, Katos Vasilios, and Demetriou Giorgos. 2020. MobileTrust: Secure knowledge integration in VANETs. ACM Trans. Cyber-Phys. Syst. 4, 3, Article 33 (March2020), 25 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Hbaieb Amal, Ayed Samiha, and Chaari L.. 2022. A survey of trust management in the internet of vehicles. Comput. Netw. 203 (2022), 108558.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. [21] Hoffman Kevin, Zage David, and Nita-Rotaru Cristina. 2009. A survey of attack and defense techniques for reputation systems. Comput. Surv. 42, 1, Article 1 (December2009), 31 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22] Li Honghao Gao, Can Liu, Yuyu Yin, Yueshen Xu, and Yu. 2022. A hybrid approach to the trust node assessment and management for VANETs cooperative data communication: Historical interaction perspective. IEEE Trans. Intell. Transport. Syst. 23, 9 (2022), 1650416513.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23] Hu Zhengdi, Xu Guangquan, Zheng Xi, Liu Jiang, Li Zhangbing, Sheng Quan Z., Lian Wenjuan, and Xian Hequn. 2020. SSL-SVD: Semi-supervised learning–based sparse trust recommendation. ACM Trans. Internet Technol. 20, 1, Article 4 (January2020), 20 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. [24] Huang Xumin, Yu Rong, Kang Jiawen, and Zhang Yan. 2017. Distributed reputation management for secure and efficient vehicular edge computing and networks. IEEE Access 5 (2017), 2540825420.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Sekiya Hui Xia, Zhetao Li, Yuhui Zheng, Anfeng Liu, Young-June Choi, and Hiroo. 2020. A novel light-weight subjective trust inference framework in MANETs. IEEE Trans. Sust. Comput. 5, 2 (2020), 236248.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Ignat Claudia-Lavinia, Dang Quang-Vinh, and Shalin Valerie L.. 2019. The influence of trust score on cooperative behavior. ACM Trans. Internet Technol. 19, 4, Article 46 (September2019), 22 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Iqbal Razi, Butt Talal Ashraf, Afzaal Muhammad, and Salah Khaled. 2019. Trust management in social internet of vehicles: Factors, challenges, blockchain, and fog solutions. Int. J. Distrib. Sens. Netw. 15, 1 (2019), 22 Pages.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Lloret Iván García-Magariño, Sandra Sendra, Raquel Lacuesta, and Jaime. 2019. Security in vehicles with IoT by prioritization rules, vehicle certificates, and trust management. IEEE IoT J. 6, 4 (2019), 59275934.Google ScholarGoogle Scholar
  29. [29] Jafarian Besat, Yazdani Nasser, and Haghighi Mohammad Sayad. 2020. Discrimination-aware trust management for social internet of things. Comput. Netw. 178 (2020), 107254.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. [30] Panneerselvam Ji-Ming Chen, Ting-Ting Li, and John. 2019. TMEC: A trust management based on evidence combination on attack-resistant and collaborative internet of vehicles. IEEE Access 7 (2019), 148913148922.Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Shan Jiliang Li, Rui Xing, Zhou Su, Ning Zhang, Yilong Hui, Tom H. Luan, and Hangguan. 2020. Trust based secure content delivery in vehicular networks: A bargaining game theoretical approach. IEEE Trans. Vehic. Technol. 69, 3 (2020), 32673279.Google ScholarGoogle ScholarCross RefCross Ref
  32. [32] Chen Jin-Hee Cho, Ananthram Swami, and Ing-Ray. 2011. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutor. 13, 4 (2011), 562583.Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Yan Jinsong Zhang, Kangfeng Zheng, Dongmei Zhang, and Bo. 2020. AATMS: An anti-attack trust management scheme in VANET. IEEE Access 8 (2020), 2107721090.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Jøsang Audun. 2001. A logic for uncertain probabilities. Int. J. Uncert. Fuzz. Knowl.-Bas. Syst. 9, 3 (2001), 279311.Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. [35] Khayatian Mohammad, Mehrabian Mohammadreza, Andert Edward, Dedinsky Rachel, Choudhary Sarthake, Lou Yingyan, and Shirvastava Aviral. 2020. A survey on intersection management of connected autonomous vehicles. ACM Trans. Cyber-Phys. Syst. 4, 4, Article 48 (August2020), 27 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. [36] Li Longhua Guo, Mianxiong Dong, Kaoru Ota, Qiang Li, Tianpeng Ye, Jun Wu, and Jianhua. 2017. A secure mechanism for big data collection in large scale internet of vehicle. IEEE IoT J. 4, 2 (2017), 601610.Google ScholarGoogle Scholar
  37. [37] Mahmood Adnan, Sheng Quan Z., Siddiqui Sarah Ali, Sagar Subhash, Zhang Wei Emma, Suzuki Hajime, and Ni Wei. 2021. When trust meets the internet of vehicles: Opportunities, challenges, and future prospects. In Proceedings of the IEEE 7th International Conference on Collaboration and Internet Computing (CIC’21). IEEE, 6067.Google ScholarGoogle ScholarCross RefCross Ref
  38. [38] Mahmood Adnan, Siddiqui Sarah Ali, Sheng Quan Z., Zhang Wei Emma, Suzuki Hajime, and Ni Wei. 2022. Trust on wheels: Towards secure and resource efficient IoV networks. Computing 104, 6 (2022), 13371358.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Mahmood Adnan, Zhang Wei Emma, and Sheng Quan Z.. 2019. Software-defined heterogeneous vehicular networking: The architectural design and open challenges. Fut. Internet 11, 3 (2019), 70.Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Mahmood Adnan, Zhang Wei Emma, Sheng Quan Z., Siddiqui Sarah Ali, and Aljubairy Abdulwahab. 2019. Trust Management for Software-Defined Heterogeneous Vehicular Ad Hoc Networks. Springer International Publishing, Cham, 203226.Google ScholarGoogle Scholar
  41. [41] Marwah Gagan Preet Kour and Jain Anuj. 2022. A hybrid optimization with ensemble learning to ensure VANET network stability based on performance analysis. Sci. Rep. (Nat. Portfol.) 12, 1 (2022), 10287.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Meo Pasquale De. 2019. Trust prediction via matrix factorisation. ACM Trans. Internet Technol. 19, 4, Article 44 (September2019), 20 pages.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43] Hadjiefthymiades Michail Chatzidakis and Stathes. 2022. A trust change detection mechanism in mobile ad-hoc networks. Comput. Commun. 187 (2022), 155163.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. [44] Lee Nguyen B. Truong, Tai-Won Um, Bo Zhou, and Gyu Myoung. 2017. From personal experience to global reputation for trust evaluation in the social internet of things. In Proceedings of the IEEE Global Communications Conference (GLOBECOM’17). IEEE, 17.Google ScholarGoogle Scholar
  45. [45] Qazi Sameer, Sabir Farah, Khawaja Bilal A., Atif Syed Muhammad, and Mustaqim Muhammad. 2020. Why is internet of autonomous vehicles not as plug and play as we think? Lessons to be learnt from present internet and future directions. IEEE Access 8 (2020), 133015133033.Google ScholarGoogle ScholarCross RefCross Ref
  46. [46] Zeadally Rasheed Hussain, Jooyoung Lee, and Sherali. 2021. Trust in VANET: A survey of current solutions and future research opportunities. IEEE Trans. Intell. Transport. Syst. 22, 5 (2021), 25532571.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47] Ni Sarah Ali Siddiqui, Adnan Mahmood, Quan Z. Sheng, Hajime Suzuki, and Wei. 2021. A survey of trust management in the internet of vehicles. Electronics 10, 18 (2021), 2223.Google ScholarGoogle ScholarCross RefCross Ref
  48. [48] Sewalkar Parag and Seitz Jochen. 2019. Vehicle-to-pedestrian communication for vulnerable road users: Survey, design considerations, and challenges. Sensors 19, 2 (2019), 358.Google ScholarGoogle ScholarCross RefCross Ref
  49. [49] Manvi Shrikant S. Tangade and Sunilkumar S.. 2013. A survey on attacks, security, and trust management solutions in VANETs. In Proceedings of the International Conference on Computing, Communications, and Networking Technologies (ICCCNT’13). IEEE, 16.Google ScholarGoogle Scholar
  50. [50] Ji Siri Guleng, Celimuge Wu, Xianfu Chen, Xiaoyan Wang, Tsutomu Yoshinaga, and Yusheng. 2019. Decentralized trust evaluation in vehicular internet of things. IEEE Access 7 (2019), 1598015988.Google ScholarGoogle ScholarCross RefCross Ref
  51. [51] Kwon Sofia Azam, Maryum Bibi, Rabia Riaz, Sanam Shahla Rizvi, and Se Jin. 2022. Collaborative learning based sybil attack detection in vehicular AD-HOC networks (VANETS). Sensors 22, 18 (September2022), 6934.Google ScholarGoogle ScholarCross RefCross Ref
  52. [52] Hu Sohan Gyawali, Yi Qian, and Rose Qingyang. 2020. Machine learning and reputation based misbehavior detection in the vehicular communication networks. IEEE Trans. Vehic. Technol. 69, 8 (2020), 88718885.Google ScholarGoogle ScholarCross RefCross Ref
  53. [53] Stallings William. 2019. Computer Organization and Architecture—Designing for Performance (11th ed.). Pearson Education, Inc., Hoboken, NJ.Google ScholarGoogle Scholar
  54. [54] Wu Ting Ning, Yang Liu, Zhipeng Yang, and Hongyi. 2017. Incentive mechanisms for data dissemination in autonomous mobile social networks. IEEE Trans. Mobile Comput. 16, 11 (2017), 30843099.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. [55] Wang Jin, Zhang Yonghui, Wang Youyuan, and Gu Xiang. 2016. RPRep: A robust & privacy-preserving reputation management scheme for pseudonym-enabled VANETs. Int. J. Distrib. Sens. Netw. 12, 3 (2016), 6138251.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. [56] Sahraoui Dhelim, Nyothiri Aung, Mohand Tahar Kechadi, Huansheng Ning, Liming Chen, and Abderrahmane Lakas. 2023. Trust2Vec: Large-scale IoT trust management system based on signed network embeddings. IEEE Internet of Things Journal 10, 1 (2023), 553562.Google ScholarGoogle Scholar
  57. [57] Wang Shibin and Yao Nianmin. 2019. A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs. Wireless Netw. 25, 3 (2019), 10991115.Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. [58] Xu Xiaoya, Wang Yunpeng, Wang Pengcheng, and Ji Haojie. 2021. A secure and efficient authentication scheme in the internet of vehicle communication. Pers. Ubiq. Comput. (2021).Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. [59] Qu Yining Liu, Keqiu Li, Yong Zhang, and Wenyu. 2009. A novel reputation computation model based on subjective logic for mobile Ad Hoc networks. In Proceedings of the 3rd International Conference on Network and System Security. IEEE, 294301.Google ScholarGoogle Scholar
  60. [60] Chen Yuanyi Chen, Mingxuan Zhou, Zengwei Zheng, and Dan. 2020. Time-aware smart object recommendation in social internet of things. IEEE IoT J. 7, 3 (2020), 20142027.Google ScholarGoogle Scholar
  61. [61] Zhang Haibin, Liu Jiajia, Zhao Huanlei, Wang Peng, and Kato Nei. 2021. Blockchain-based trust management for internet of vehicles. IEEE Trans. Emerg. Top. Comput. 9, 3 (2021), 13971409.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Toward a Distributed Trust Management System for Misbehavior Detection in the Internet of Vehicles

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text